nCircle - a Tripwire Company

1,421 Followers Follow
Ask nCircle - a Tripwire Company a question
Author Janet Jordan
janet jordan
Jan 3, 2014 at 21:19 UTC | nCircle - a Tripwire Company

lock icon windows file content test

I am having trouble reading the content for a file using the windows file content test in CCM. I have used it in the past and it has worked just fine. The only differents between then and now is the content that i am trying to read is a path to another folder. Can anybody help

Author vendorpageid_987

lock icon Security News August 8

Aug 8, 2013 at 22:20 UTC | nCircle - a Tripwire Company

    White House to offer companies cyber security incentives

http://news.cnet.com/8301-1009_3-57597303-83/white-house-to-offer-companies-cybersecurity-incentives/ Opens a new window


The government hopes to entice power utilities, water infrastructure, and transportation networks to sign onto its upcoming Cybersecurity Framework with incentives



   Compliance no longer main driver of security measures

http://www.net-security.org/secworld.php?id=15374 Opens a new window


In theory, compliance should no longer be the primary consideration of CIOs when planning IT risk and security measures



   Why storing passwords in Chrome is a bad idea

http://www.pcworld.com/article/2046105/why-storing-passwords-in-chrome-is-a-bad-idea.html Opens a new window


Passwords are stored in plain-text, and can be exposed by simply clicking the “show” button next to the password field



   Cyber threats eclipse natural disasters as top business risk

http://www.infosecurity-magazine.com/view/33881/cyber-threats-eclipse-natural-disasters-as-top-business-risk/ Opens a new window


76% of companies put data breaches at the top of their threat lists



   DHS building actionable response plans for cyber attacks on critical infrastructure

http://www.federalnewsradio.com/473/3415445/DHS-building-actionable-response-plans-for-cyber-attacks-on-critical-infrastructure Opens a new window


National Cybersecurity and Communications Integration Center (NCCIC) say they're working to build concrete plans that public and private sector responders can act on in the event of a major attack


   US Airways customers lose air miles in data breach

http://www.bizjournals.com/charlotte/blog/morning-edition/2013/08/us-airways-customers-lose-miles-in.html Opens a new window


Although the number of accounts compromised was relatively small (7,700) this is the second data breach by US Airways in a month

Read More Opens a new window
Author vendorpageid_987

lock icon Security News August 6

Aug 7, 2013 at 00:00 UTC | nCircle - a Tripwire Company

 Infographic: Where Are You Most at Risk for Identity Theft?

http://securitywatch.pcmag.com/identity/314442-infographic-where-are-you-most-at-risk-for-identity-theftOpens a new window


Miami is the number one city for identity theft



 FBI's new iGuardian portal aims to ease cyber crime reporting

http://www.csoonline.com/article/737669/fbi-s-new-iguardian-portal-aims-to-ease-cyber-crime-reportingOpens a new window


“Just the fact that they're providing a one-stop, information submission is actually very valuable to these customers”



 Digital stakeout of Chinese hacker gang reveals 100+ victims

http://www.computerworld.com/s/article/9241399/Digital_stakeout_of_Chinese_hacker_gang_reveals_100_victimsOpens a new window


Crew behind 'Comfoo' RAT orchestrated more than 64 different campaigns



 How Vulnerable Are Power Companies to Cyberattack?

http://www.forbes.com/sites/davidferris/2013/08/06/how-vulnerable-are-power-companies-to-cyberattack/Opens a new window


“Electricity underpins everything we do and supports all other infrastructure”



 Ok, who uses their pet's name as their password?

http://nakedsecurity.sophos.com/2013/08/06/ok-who-uses-their-pets-name-as-their-password/Opens a new window


People are much more likely to use their pet’s name as their password than their child’s



 Twitter’s Killer New Two Factor Solution Kicks SMS to the Curb

http://www.wired.com/threatlevel/2013/08/twitter-new-two-facto/?mbid=social10522764Opens a new window


“We realize social engineering is a real threat”



 White House publishes preliminary list of cybersecurity incentives

http://thehill.com/blogs/hillicon-valley/technology/315795-white-house-publishes-preliminary-list-of-cybersecurity-incentivesOpens a new window


The incentives were compiled in accordance with the cybersecurity executive order signed by President Obama in February

Read MoreOpens a new window
Author vendorpageid_987

lock icon Security News August 5

Aug 6, 2013 at 00:00 UTC | nCircle - a Tripwire Company

 How CISOs Help Lower Breach Costs

http://www.govinfosecurity.com/how-cisos-help-lower-breach-costs-a-5965 Opens a new window


According to a recent Ponemon report, organizations that have a CISO have lower costs for each breach than companies that lacked one



 What CIOs Know About Mobile

http://www.forbes.com/sites/emc/2013/08/05/what-cios-should-know-about-mobile/ Opens a new window


45% of CIOs view mobile security as a major challenge



 IT pros' most feared breach consequence is workload

http://www.zdnet.com/it-pros-most-feared-breach-consequence-is-workload-7000018957/ Opens a new window


Bad media coverage was the second largest fear



 Which sectors are the biggest threats for data breaches?

http://gcn.com/research/2013/08/data-breach-threats-by-sector.aspx Opens a new window


People are most concerned about the banking industry and least concerned about the travel sector



 Online iPhone Scam Serves Up Real Apples

http://www.pcmag.com/article2/0,2817,2422706,00.asp Opens a new window


“If something seems too good to be true, it probably is”

Read More Opens a new window
Author vendorpageid_987

lock icon Security Slice Podcast: The Ghosts of Java’s Past

Aug 5, 2013 at 16:25 UTC | nCircle - a Tripwire Company

According to a recent report from Bit9Opens a new window, less than 1% of enterprises are running the most current version of Java. In fact, more than 90% of organizations use a version of Java that is at least five years old.


Why are so many enterprises still using older versions of Java that are riddled with security holes? 


Listen to Dwayne Melançon and Tim Erlin discuss Java and more on Tripwire's State of Security blogOpens a new window

Read MoreOpens a new window
Author vendorpageid_987

lock icon Security News August 2

Aug 3, 2013 at 00:00 UTC | nCircle - a Tripwire Company

 'Smart homes' are vulnerable, say hackers

http://www.cnn.com/2013/08/02/tech/innovation/hackable-homes/index.html Opens a new window


DefCon shows us that even toilets can be hacked



 Why waiting for Congress to fix cybersecurity is a waste of time

http://www.washingtonpost.com/blogs/the-switch/wp/2013/08/01/why-waiting-for-congress-to-fix-cybersecurity-is-a-waste-of-time/ Opens a new window


“Placing [cybersecurity] expectations in the hands of bureaucrats rather than lawmakers might be a safer bet”



 Russia's Massive Android Malware Industry Revealed

http://securitywatch.pcmag.com/mobile-security/314386-russia-s-massive-android-malware-industry-revealed Opens a new window


“They can make it look like Skype, Google Play, anything to entice a user into downloading it and believing that it's real”



 Humans still the weakest link as phishing gets smarter and more focused

http://nakedsecurity.sophos.com/2013/08/02/humans-still-the-weakest-link-as-phishing-gets-smarter-and-more-focused/ Opens a new window


92% of people misclassify phishing emails



 Facebook transitions to secure browsing by default for everyone

http://www.scmagazine.com/facebook-transitions-to-secure-browsing-by-default-for-everyone/article/305725/ Opens a new window


Now nearly every Facebook URL will be prefaced by 'HTTPS



 Majority of Enterprises Are Vulnerable to Malware Threats

http://www.esecurityplanet.com/network-security/majority-of-enterprises-are-vulnerable-to-malware-threats.html Opens a new window


62% of enterprises say their endpoint security software isn't effective for detecting zero-day and/or polymorphic malware


Read More Opens a new window
Author vendorpageid_987

lock icon Security News August 1

Aug 2, 2013 at 00:00 UTC | nCircle - a Tripwire Company

 The App Economy: A Ticking Cybersecurity Timebomb

http://www.forbes.com/sites/ciocentral/2013/08/01/the-app-economy-a-ticking-cybersecurity-timebomb/ Opens a new window


“Perhaps, the days of ‘App Warfare’ are not far away!”



 Trusting iPhones plugged into bogus chargers get a dose of malware

http://arstechnica.com/security/2013/07/trusting-iphones-plugged-into-bogus-chargers-get-a-dose-of-malware/ Opens a new window


Should iPhones be more suspicious of USB-attached computers?



 FTC issues guidance to avoid getting hacked

http://thehill.com/blogs/hillicon-valley/technology/315053-ftc-issues-guidance-to-avoid-getting-hacked Opens a new window


The tips are pretty basic, but is a simple guideline better than nothing?



 Email from social media safest, financial services riskiest

http://www.csoonline.com/article/737389/email-from-social-media-safest-financial-services-riskiest Opens a new window


One in seven emails from financial brands poses risks to consumers



 The 3 Extremes of Corporate BYOD Policies

http://www.cio.com/article/737461/The_3_Extremes_of_Corporate_BYOD_Policies Opens a new window


“There's no official BYOD policy, devices are banned, or no one talks about it”



 Hackers targeting industrial control systems

http://www.computerworld.com/s/article/9241293/Hackers_targeting_industrial_control_systems Opens a new window


58% of attacks originated from Russia, but all of them were non-critical in nature

Read More Opens a new window
Author vendorpageid_987

lock icon Security News July 31

Aug 1, 2013 at 00:00 UTC | nCircle - a Tripwire Company

 NSA director heckled at Black Hat cybersecurity conference

http://www.cbsnews.com/8301-205_162-57596383/nsa-director-heckled-at-black-hat-cybersecurity-conference/Opens a new window


Was Keith Alexander’s keynote a success?



 Can Two-Factor Authentication Keep Your Company's Data Safe?

http://mashable.com/2013/07/31/two-factor-authentication/Opens a new window


“It's a good step — but two-factor authentication is not a panacea”



 Secure migration to the cloud: A not impossible mission

http://blogs.computerworld.com/cloud-security/22566/mission-not-impossible-secure-migration-cloudOpens a new window


The first step of cloud security is migration



 Twitter releases transparency report: U.S. government makes most data requests

http://thehill.com/blogs/hillicon-valley/technology/314813-twitter-releases-transparency-report-us-government-makes-most-data-requestsOpens a new window


U.S. makes up 78% of the government requests received worldwide by the company



 New Free Service Cracks Weak Passwords

http://www.darkreading.com/management/new-free-service-cracks-weak-passwords/240159192Opens a new window


“Passwords are often the frontline of digital defense, but also the weakest link”



 83% of Mobile Apps Exhibit Risky Behavior

http://www.infosecurity-us.com/view/33726/83-of-mobile-apps-exhibit-risky-behavior/Opens a new window


Interestingly, iOS apps are worse than Android apps

Read MoreOpens a new window
Author vendorpageid_987

lock icon Security News July 30

Jul 31, 2013 at 00:00 UTC | nCircle - a Tripwire Company

 How Not to Get Hacked at Black Hat and DefCon

http://securitywatch.pcmag.com/hacking/314250-how-not-to-get-hacked-at-black-hat-and-defcon Opens a new window


What security protocols should you take before, during and after leaving Vegas?



 Senate Commerce panel approves cybersecurity bill

http://thehill.com/blogs/hillicon-valley/technology/314433-senate-commerce-panel-approves-cybersecurity-bill Opens a new window


“[The bill] doesn’t do everything we need to do to improve our cybersecurity, but it’s a good start”



 Universities Putting Sensitive Data at Risk via Unsecure Email

http://www.csoonline.com/article/737246/universities-putting-sensitive-data-at-risk-via-unsecure-email Opens a new window


Universities “must operate in a culture of openness and sharing." Would encryption be detrimental to this environment?



 Shorter, Higher-Speed DDoS Attacks on the Rise

http://www.cio.com/article/737288/Shorter_Higher_Speed_DDoS_Attacks_on_the_Rise_Arbor_Networks_Says Opens a new window


86% of DDoS attacks last less than an hour and most reach speeds of over 1Gbps



 Thomson Reuters Twitter Account Hacked by Syrian Electronic Army

http://mashable.com/2013/07/29/thomson-reuters-twitter-account-hacked-by-syrian-electronic-army/ Opens a new window


The Twitter hack lasted roughly an hour and a half



 Don't Touch That Flash Drive! You Have No Idea Where It's Been.

http://www.slate.com/blogs/future_tense/2013/07/30/don_t_touch_that_flash_drive_you_have_no_idea_where_it_s_been.html Opens a new window


According a DHS survey, 90% of participants would plug in an unknown flash drive if it was outfitted with a logo

Read More Opens a new window
Author vendorpageid_987

lock icon Security Slice Podcast: SIM Card Security Flaws

Jul 30, 2013 at 15:24 UTC | nCircle - a Tripwire Company

After three years of study, security researcher Karsten NohlOpens a new window discovered a major vulnerability that affects more than 12% of SIM cards in mobile devices.


According to Nohl’s estimates, “an eighth of the world’s SIM cards could be vulnerable, or about half a billion mobile devices.” Will patching this SIM card vulnerability take longer than Nohl’s research?


Listen to Dwayne Melançon and Tim Erlin discuss SIM cards and more on Tripwire's State of SecurityOpens a new window blog. 

Read MoreOpens a new window
Author vendorpageid_987

lock icon Security News July 29

Jul 30, 2013 at 00:00 UTC | nCircle - a Tripwire Company

 Two big obstacles hinder cybersleuths

http://www.usatoday.com/story/cybertruth/2013/07/29/two-big-obstacles-hinder-cyber-invetigations/2595651/ Opens a new window


“Complexities of the Internet cloud and the patchwork quilt of data privacy laws can make this challenging”



 51,000 New Mobile Malware Threats Uncovered in First Half of 2013

http://www.esecurityplanet.com/mobile-security/51000-new-mobile-malware-threats-uncovered-in-first-half-of-2013.html Opens a new window


Approximately 21 million mobile devices were infected in the same timeframe



 Feds target spammers using text messages

http://thehill.com/blogs/regwatch/court-battles/314167-feds-target-spammers-using-text-messages Opens a new window


“There were no free gifts or gift cards, but there were plenty of follow-up illegal robocalls”



 Critics urge end of passwords, but alternatives not ready for prime time

http://www.csoonline.com/article/737016/critics-urge-end-of-passwords-but-alternatives-not-ready-for-prime-time Opens a new window


Don’t count on sites using electronic tattoos or measuring brainwaves any time soon…



 Cyber-Security Measures: Confidence in Them Lacking Among Execs

http://www.eweek.com/small-business/cyber-security-confidence-lacking-among-executives/ Opens a new window


82% of financial firms are concerned about APTs and sophisticated attacks, but only half of them employ advanced malware analysis tools



 Lawmakers draft bill that would increase enforcement against U.S. trade secret theft

http://www.scmagazine.com/lawmakers-draft-bill-that-would-increase-enforcement-against-us-trade-secret-theft/article/305037/ Opens a new window


“This proposal would ensure that the statute would apply to a hacker whose code passes through American computers, but who is never physically present in the United States”


Read More Opens a new window
Author vendorpageid_987

lock icon Security News July 26

Jul 27, 2013 at 00:10 UTC | nCircle - a Tripwire Company

    Security vendors: Do no harm, heal thyself

http://krebsonsecurity.com/2013/07/security-vendors-do-no-harm-heal-thyself/Opens a new window


Krebs suggests that we should hold security vendors to a higher standard than Google’s recently announced policy; do you agree?



   The scandal of computer security

http://www.wired.com/insights/2013/07/the-scandal-of-computer-security/Opens a new window


“How are companies and consumers supposed to feel confident in their cyber-defense systems when security giants themselves fall victim to attacks?”



   Cybersecurity and the board of directors: Avoiding personal liability

http://blogs.reuters.com/financial-regulatory-forum/2013/07/25/cybersecurity-and-the-board-of-directors-avoiding-personal-liability-part-i-of-iii/Opens a new window


“Directors have a fiduciary duty to protect their corporation’s important assets but, cue to the evolving nature of the risk, there is a lack of authority discussing the scope of a board’s obligation to address cybersecurity”



   Good cyber security starts at the board level

http://www.guardian.co.uk/media-network/media-network-blog/2013/jul/25/cyber-security-board-level-information-technologyOpens a new window


“When it comes to the life blood of an organisation, its critical business information, there is often a distinct lack of collective educationOpens a new window



   ISACA Releases COBIT 5 Guide for Managing Vendor-based Security-risks/

http://www.infosecurity-magazine.com/view/33654/isaca-releases-cobit-5-guide-for-managing-vendorbased-security-risks/Opens a new window


ISACA just released a new guide applying the COBIT 5 business framework to help enterprises effectively manage vendors



   McAfee asks for your face and your voice in exchange for access

http://www.itbusiness.ca/news/mcafee-asks-for-your-face-and-your-voice-in-exchange-for-access/38530Opens a new window


McAfee Inc. just rolled out a new facial recognition service to keep their data from prying eyes



   Oil and gas field sensors vulnerable to attack via radiowaves

http://www.computerworld.com/s/article/9241109/Oil_gas_field_sensors_vulnerable_to_attack_via_radio_waves?taxonomyId=17Opens a new window


Researchers at IOActive say they can shut down a plant from up to 40 miles away by attacking industrial sensors

Read MoreOpens a new window
Author vendorpageid_987

lock icon Security News July 25

Jul 25, 2013 at 22:57 UTC | nCircle - a Tripwire Company

 These Are the 300 Biggest Data Leaks Ever

http://techland.time.com/2013/07/25/these-are-the-300-biggest-data-leaks-ever/?iid=tl-main-lead Opens a new window


The Heartland breach reigns supreme



 Report: U.S. mobile malware infections drop 63%

http://www.fiercemobilecontent.com/story/report-us-mobile-malware-infections-drop-63/2013-07-25 Opens a new window


China, however, has the most infected phones in the world



 Maryland and Estonian Civilian Take Up Arms Against Hackers

http://www.nextgov.com/cybersecurity/2013/07/maryland-and-estonian-civilians-take-arms-against-hackers/67370/ Opens a new window


The volunteer squad was put together after Russia allegedly shut Estonian’s Internet in 2007



 5 Hackers Charged in Largest Data-Breach Scheme in U.S.

http://www.bloomberg.com/news/2013-07-25/5-hackers-charged-in-largest-data-breach-scheme-in-u-s-.html Opens a new window


The hackers targeted some of the world’s biggest institutions and caused hundreds of millions of dollars in losses



 Poker player who won $1.5 million charged with running Android malware ring

http://arstechnica.com/information-technology/2013/07/poker-player-who-won-1-5-million-charged-with-running-android-malware-ring/ Opens a new window


The operation combined spam, Android malware, and a fake dating website to scam victims out of $3.9 million



 Five things to consider for a mobile security policy

http://www.csoonline.com/article/736920/five-things-to-consider-for-a-mobile-security-policy Opens a new window


“BYOD isn't a buzzword”

Read More Opens a new window
Author vendorpageid_987

lock icon Security Slice Podcast: Def Con, Black Hat and the Feds

Jul 25, 2013 at 17:17 UTC | nCircle - a Tripwire Company

In the wake of Edward Snowden’s NSA surveillance revelations, Defcon founder Jeff MossOpens a new window has urged federal government employees not to attend the conference in Las Vegas this year.


Meanwhile General Keith AlexanderOpens a new window, the Director of the NSA, will be the keynote speaker at Black Hat 2013. What are the repercussions of these two announcements?


Listen to  Lamar Bailey, Dwayne Melançon and Tim Erlin discuss Def Con, Black Hat and more on Tripwire's State of Security blogOpens a new window

Read MoreOpens a new window
Author vendorpageid_987

lock icon Security News July 24

Jul 25, 2013 at 00:28 UTC | nCircle - a Tripwire Company

    Feds put heat on web firm for master encryption keys

http://news.cnet.com/8301-13578_3-57595202-38/feds-put-heat-on-web-firms-for-master-encryption-keys/Opens a new window


Former DOJ official: "SSL has really impacted the capability of U.S. law enforcement. They're now going to the ultimate application layer provider."



    SIM card vulnerabilities easy to fix

http://www.computerworld.com/s/article/9241007/SIM_card_vulnerabilities_easy_to_fix_researcher_says?source=CTWNLE_nlt_dailyam_2013-07-24Opens a new window


More detail on how the vulnerability works along with the constructive atmosphere surrounding the discovery of the vulnerability



    Symantec spots two Android apps using 'master key' vulnerability

http://www.pcworld.com/article/2045087/symantec-spots-two-android-apps-using-master-key-vulnerability.htmlOpens a new window


A critical Android vulnerability is being used to modify smartphone applications



    Imperva says retailers hit by twice as many SQL attacks as other industries

http://itsecuritypro.co.uk/2013/07/23/imperva-says-retailers-hit-by-twice-as-many-sql-attacks-as-other-industries/Opens a new window


Research shows retailers are being hit by twice as many SQL injection attacks as other industries, with some sites being hit by many as 26 attacks every minute of the day



    Fear of prosecution hampers security researchers

http://www.scmagazine.com/fear-of-prosecution-hampers-security-research/article/303476/2/#Opens a new window


Charlie Miller is fine with hacking car computers but he won’t touch cloud services



    FEDRAMP could be the model to vet cyber security firms

http://www.federaltimes.com/article/20130723/IT01/307230007/FedRAMP-could-model-vet-cybersecurity-firms?odyssey=nav|headOpens a new window


Under the FedRAMP program, contractors that provide cloud computing services to agencies are required to meet strict security requirements and pass an independent, third-party review. according to one cybersecurity law expert, that model one day could serve as the basis for vetting companies that provide cybersecurity services to the government

Read MoreOpens a new window
Show more

nCircle - a Tripwire Company in Spiceworks

  • Anthony (Tripwire)
    May 13, 2013 at 17:45 UTC
  • Eva (nCircle)
    Sep 25, 2013 at 15:10 UTC
  • About nCircle - a Tripwire Company

    Similar Vendors