All 3 billion Yahoo accounts confirmed hacked in 2013 breach
http://ift.tt/2fNYoLY
Submitted October 04, 2017 at 03:52AM by 7heJoker
via reddit http://ift.tt/2fItroN
http://ift.tt/2fNYoLY
Submitted October 04, 2017 at 03:52AM by 7heJoker
via reddit http://ift.tt/2fItroN
Fox News
Yahoo now says all 3B of its accounts were hacked
Yahoo! parent company Verizon said that all 3 billion of Yahoo!'s accounts were hacked, up from the original figure of 1 billion.
Code-execution flaws threaten users of routers, Linux, and other OSes
http://ift.tt/2xR3CuS
Submitted October 04, 2017 at 03:16AM by NISMO1968
via reddit http://ift.tt/2kkAoRO
http://ift.tt/2xR3CuS
Submitted October 04, 2017 at 03:16AM by NISMO1968
via reddit http://ift.tt/2kkAoRO
Ars Technica
Code-execution flaws threaten users of routers, Linux, and other OSes
Bugs in widely used Dnsmasq give attackers remote control of vulnerable systems.
National Cyber Security Awareness Month
http://ift.tt/1oCDc9S
Submitted October 04, 2017 at 04:19AM by ourlifeintoronto
via reddit http://ift.tt/2kkUtre
http://ift.tt/1oCDc9S
Submitted October 04, 2017 at 04:19AM by ourlifeintoronto
via reddit http://ift.tt/2kkUtre
www.dhs.gov
National Cyber Security Awareness Month | Homeland Security
October is National Cyber Security Awareness Month which is an annual campaign to raise awareness about cybersecurity. We live in a world that is more connected than ever before.
ELI5: Networking for Dummies 101
Hey folks, any recommended free online resources to learn the background of networking?I know an IP address is #.#.#.# but what does that structure mean?What are all the common connection protocols, what are the differences, what are they used for?How does all the hardware work? Routers, switches, firewalls, load balancers, servers, etcA lot of the resources I’ve checked assume the viewer/reader already has this technical knowledge and background.... need to basically start from day 1
Submitted October 04, 2017 at 05:41AM by krr463
via reddit http://ift.tt/2xPx86r
Hey folks, any recommended free online resources to learn the background of networking?I know an IP address is #.#.#.# but what does that structure mean?What are all the common connection protocols, what are the differences, what are they used for?How does all the hardware work? Routers, switches, firewalls, load balancers, servers, etcA lot of the resources I’ve checked assume the viewer/reader already has this technical knowledge and background.... need to basically start from day 1
Submitted October 04, 2017 at 05:41AM by krr463
via reddit http://ift.tt/2xPx86r
reddit
ELI5: Networking for Dummies 101 • r/security
Hey folks, any recommended free online resources to learn the background of networking? I know an IP address is #.#.#.# but what does that...
Yahoo Breach Estimate Raised to Full 3 Billion Accounts | Fortune
http://ift.tt/2kimFuV
Submitted October 04, 2017 at 05:57AM by wewewawa
via reddit http://ift.tt/2xdm6Zb
http://ift.tt/2kimFuV
Submitted October 04, 2017 at 05:57AM by wewewawa
via reddit http://ift.tt/2xdm6Zb
Fortune
Yahoo raises breach estimate to full 3 billion accounts
Verizon-owned Yahoo tripled its estimate for the number of accounts affected by a 2013 data breach from 1 billion to a full 3 billion.
Square 2017 CTF (starts tomorrow)
https://squarectf.com/
Submitted October 04, 2017 at 08:15AM by alokmenghrajani
via reddit http://ift.tt/2xZzBLB
https://squarectf.com/
Submitted October 04, 2017 at 08:15AM by alokmenghrajani
via reddit http://ift.tt/2xZzBLB
reddit
Square 2017 CTF (starts tomorrow) • r/netsec
4 points and 0 comments so far on reddit
How about getting a comfortable and secured ride via an executive vehicle service
The executive car hire services have become immensely popular these days. When you hire the services of such organizations your ride is not only comfortable and pleasant, but there is a high level of security measures as well.
Submitted October 04, 2017 at 12:56PM by closeunit123
via reddit http://ift.tt/2xfTXfa
The executive car hire services have become immensely popular these days. When you hire the services of such organizations your ride is not only comfortable and pleasant, but there is a high level of security measures as well.
Submitted October 04, 2017 at 12:56PM by closeunit123
via reddit http://ift.tt/2xfTXfa
reddit
How about getting a comfortable and secured ride via... • r/security
The executive car hire services have become immensely popular these days. When you hire the services of such organizations your ride is not only...
Super-Stealthy Droppers - "Diskless" binary execution
http://ift.tt/2xXRZUJ
Submitted October 04, 2017 at 12:23PM by Evil1337
via reddit http://ift.tt/2fNwCis
http://ift.tt/2xXRZUJ
Submitted October 04, 2017 at 12:23PM by Evil1337
via reddit http://ift.tt/2fNwCis
reddit
Super-Stealthy Droppers - "Diskless" binary execution • r/netsec
3 points and 0 comments so far on reddit
There is no dearth or the lack of crowd management companies in the current market
Crowd management companies have become a necessity these days, especially when you are hosting a party or an event. The market is flooded with so many.
Submitted October 04, 2017 at 01:40PM by closeunit123
via reddit http://ift.tt/2yWOD2H
Crowd management companies have become a necessity these days, especially when you are hosting a party or an event. The market is flooded with so many.
Submitted October 04, 2017 at 01:40PM by closeunit123
via reddit http://ift.tt/2yWOD2H
reddit
There is no dearth or the lack of crowd management... • r/security
Crowd management companies have become a necessity these days, especially when you are hosting a party or an event. The market is flooded with so...
A new Ethereum ICO was hacked, the victim is Etherparty
http://ift.tt/2kla1ez
Submitted October 04, 2017 at 02:08PM by MicheeLengronne
via reddit http://ift.tt/2fP9PTm
http://ift.tt/2kla1ez
Submitted October 04, 2017 at 02:08PM by MicheeLengronne
via reddit http://ift.tt/2fP9PTm
Security Affairs
A new Ethereum ICO was hacked, the victim is Etherparty
The Etherparty website is the last victim in order of time of a cyber attack involving an Ethereum ICO (Initial Coin Offering) .
XSLT Server Side Injection Attacks
http://ift.tt/2hLEsK3
Submitted October 04, 2017 at 02:29PM by spudd01
via reddit http://ift.tt/2fLjRBx
http://ift.tt/2hLEsK3
Submitted October 04, 2017 at 02:29PM by spudd01
via reddit http://ift.tt/2fLjRBx
Context Information Security
XSLT Server Side Injection Attacks | Context Information Security
In this blog post we present a selection of attacks against XSLT to show the risks of using this technology in an insecure way.
An Interview With Purism CEO & Founder Todd Weaver: "Expect More Librem 5 Partnerships In Near Future"
http://ift.tt/2yFZ8Gn
Submitted October 04, 2017 at 04:20PM by casabanclock
via reddit http://ift.tt/2xSTlyl
http://ift.tt/2yFZ8Gn
Submitted October 04, 2017 at 04:20PM by casabanclock
via reddit http://ift.tt/2xSTlyl
Fossbytes
An Interview With Purism CEO & Founder Todd Weaver: "Expect More Librem 5 Partnerships In Near Future"
Recently, we chatted with Purism CEO and founder Todd Weaver via email, who shared some details regarding Librem 5 and future plans.
Forwarded from D a n i
Follow this channel for information about bug bounties, resources, write-ups, latest vulnerabilities and much more. Happy hunting! https://news.1rj.ru/str/thebugbountyhunter
Telegram
The Bug Bounty Hunter
Happy hunting!
thebugbountyhunter.com
hello@thebugbountyhunter.com
thebugbountyhunter.com
hello@thebugbountyhunter.com
Another Flip in the Wall of Rowhammer Defenses
http://ift.tt/2xSEeov
Submitted October 04, 2017 at 04:50PM by ranok
via reddit http://ift.tt/2gb2FpA
http://ift.tt/2xSEeov
Submitted October 04, 2017 at 04:50PM by ranok
via reddit http://ift.tt/2gb2FpA
US Studying Ways To End Use of Social Security Numbers For ID
U.S officials are studying ways to end the use of social security numbers for identification following a series of data breaches compromising the data for millions of Americans.The White House cybersecurity coordinator told a forum at the Washington Post that officials were studying ways to use "modern cryptographic identifiers" to replace social security numbers.His comments come after news that some 145 million Americans may have had personal information leaked, including the important social security numbers, in a breach at Equifax, one of three big US firms which collect data for credit applications.The administration has asked officials from several agencies to come up with ideas for "a better system" which may involve cryptography. This may involve "a public and private key" including something that could be revoked if it has been compromised.Get some more details here
Submitted October 04, 2017 at 05:02PM by karthikaag
via reddit http://ift.tt/2fIZRPJ
U.S officials are studying ways to end the use of social security numbers for identification following a series of data breaches compromising the data for millions of Americans.The White House cybersecurity coordinator told a forum at the Washington Post that officials were studying ways to use "modern cryptographic identifiers" to replace social security numbers.His comments come after news that some 145 million Americans may have had personal information leaked, including the important social security numbers, in a breach at Equifax, one of three big US firms which collect data for credit applications.The administration has asked officials from several agencies to come up with ideas for "a better system" which may involve cryptography. This may involve "a public and private key" including something that could be revoked if it has been compromised.Get some more details here
Submitted October 04, 2017 at 05:02PM by karthikaag
via reddit http://ift.tt/2fIZRPJ
YouTube
US Studying Ways To End Use of Social Security Numbers For ID
U.S officials are studying ways to end the use of social security numbers for identification following a series of data breaches compromising the data for mi...
One more week of the Humble Book Bundle: Hacking Reloaded presented by No Starch Press
http://ift.tt/2xBlV8K
Submitted October 04, 2017 at 06:44PM by 13378
via reddit http://ift.tt/2fQOmK1
http://ift.tt/2xBlV8K
Submitted October 04, 2017 at 06:44PM by 13378
via reddit http://ift.tt/2fQOmK1
Humble Bundle
Humble Book Bundle: Hacking Reloaded presented by No Starch Press
Pay what you want for hacking books from No Starch and support charity!
Cybereason/siofra - Automated DLL hijacking vulnerability scanner and PE infector tool
http://ift.tt/2xZWVZv
Submitted October 04, 2017 at 06:40PM by petermal67
via reddit http://ift.tt/2yI4Rvq
http://ift.tt/2xZWVZv
Submitted October 04, 2017 at 06:40PM by petermal67
via reddit http://ift.tt/2yI4Rvq
GitHub
Cybereason/siofra
Contribute to siofra development by creating an account on GitHub.
Behind the Masq: Yet more DNS, and DHCP, vulnerabilities
http://ift.tt/2x9SLdB
Submitted October 04, 2017 at 07:19PM by TromPete_pete
via reddit http://ift.tt/2fRx67c
http://ift.tt/2x9SLdB
Submitted October 04, 2017 at 07:19PM by TromPete_pete
via reddit http://ift.tt/2fRx67c
Google Online Security Blog
Behind the Masq: Yet more DNS, and DHCP, vulnerabilities
Posted by Fermin J. Serna, Staff Software Engineer, Matt Linton, Senior Security Engineer and Kevin Stadmeyer, Technical Program Manager O...
Security In 5: Episode 82 - CIS 19 Incident Response
http://ift.tt/2xSXu59
Submitted October 04, 2017 at 06:41PM by BinaryBlog
via reddit http://ift.tt/2xYpki4
http://ift.tt/2xSXu59
Submitted October 04, 2017 at 06:41PM by BinaryBlog
via reddit http://ift.tt/2xYpki4
Libsyn
Security In Five Podcast: Episode 82 - CIS 19 Incident Response
Continuing in the Critical Security Controls we are at number nineteen. Incident Response. Now that you have all the tools, policies and procedures in place what do you do with the alerts? How you respond to an incident is vital and makes your investments…
The Stuxnet of Mobile Malware (for Android)
http://ift.tt/2xV3XwJ
Submitted October 04, 2017 at 08:00PM by Mi3Security
via reddit http://ift.tt/2yq7w0E
http://ift.tt/2xV3XwJ
Submitted October 04, 2017 at 08:00PM by Mi3Security
via reddit http://ift.tt/2yq7w0E
VMware Escapology - Researchers from ZDI release Metasploit modules for VMware Escapes
http://ift.tt/2gbnqRQ
Submitted October 04, 2017 at 09:08PM by RedmondSecGnome
via reddit http://ift.tt/2xYOhtD
http://ift.tt/2gbnqRQ
Submitted October 04, 2017 at 09:08PM by RedmondSecGnome
via reddit http://ift.tt/2xYOhtD
Zero Day Initiative
VMware Escapology – How to Houdini the Hypervisor
Recently at the DerbyCon conference in Louisville, KY, Jasiel and I
presented “VMware Escapology: How to Houdini The Hypervisor.” My colleague
Abdul-Aziz Hariri has blogged about VMware escapes in the past.
Unfortunately, circumstances prevented Abdul…
presented “VMware Escapology: How to Houdini The Hypervisor.” My colleague
Abdul-Aziz Hariri has blogged about VMware escapes in the past.
Unfortunately, circumstances prevented Abdul…