Netsec – Telegram
Netsec
7.4K subscribers
22.4K links
This channel posts the feed from r/netsec.
For any suggestions dm @streaak
Donate to keep the bot running https://www.paypal.me/akhilgv
Download Telegram
Forwarded from D a n i
Follow this channel for information about bug bounties, resources, write-ups, latest vulnerabilities and much more. Happy hunting! https://news.1rj.ru/str/thebugbountyhunter
Another Flip in the Wall of Rowhammer Defenses
http://ift.tt/2xSEeov

Submitted October 04, 2017 at 04:50PM by ranok
via reddit http://ift.tt/2gb2FpA
US Studying Ways To End Use of Social Security Numbers For ID
U.S officials are studying ways to end the use of social security numbers for identification following a series of data breaches compromising the data for millions of Americans.The White House cybersecurity coordinator told a forum at the Washington Post that officials were studying ways to use "modern cryptographic identifiers" to replace social security numbers.His comments come after news that some 145 million Americans may have had personal information leaked, including the important social security numbers, in a breach at Equifax, one of three big US firms which collect data for credit applications.The administration has asked officials from several agencies to come up with ideas for "a better system" which may involve cryptography. This may involve "a public and private key" including something that could be revoked if it has been compromised.Get some more details here

Submitted October 04, 2017 at 05:02PM by karthikaag
via reddit http://ift.tt/2fIZRPJ
One more week of the Humble Book Bundle: Hacking Reloaded presented by No Starch Press
http://ift.tt/2xBlV8K

Submitted October 04, 2017 at 06:44PM by 13378
via reddit http://ift.tt/2fQOmK1
Cybereason/siofra - Automated DLL hijacking vulnerability scanner and PE infector tool
http://ift.tt/2xZWVZv

Submitted October 04, 2017 at 06:40PM by petermal67
via reddit http://ift.tt/2yI4Rvq
The Stuxnet of Mobile Malware (for Android)
http://ift.tt/2xV3XwJ

Submitted October 04, 2017 at 08:00PM by Mi3Security
via reddit http://ift.tt/2yq7w0E
Privacy implications of email tracking
http://ift.tt/2fTcYym

Submitted October 04, 2017 at 08:05PM by tamir777
via reddit http://ift.tt/2koeIV2
Never before seen virus behaviour(?)
So I was looking to download an application called "iso2eboot" but every link I found did not work. So when I went to google it, the first suggestion was "iso2eboot v3 download" and so I clicked it and the first result was "http://ift.tt/2gbFRGl". I entered the website and at first I thought it's one of those websites that have downloads named after the program you're looking for but actually end up giving you a suspicious looking installer with a very generic icon on it. Anyway, the website itself wasn't at all related to the program I was looking for, and I thought it could just be a website that you can upload stuff but it looked like whatever I searched for in that website I would just find a fake upload that is just a virus(Virustotall says it's clean). So this file I found was a .zip named after the program I'm looking for. I opened it and inside it there was another .zip file (with the same name) instead of another folder (which is most common with archived folders). So I thought it was probably archived twice so that Antiviruses can't detect it. Anyways I extracted the .zip as a folder and the application had RAR Installer icon. I opened the app and it was some sort of installer and I noticed it said somewhere "Source:" and some long name like "torrentz-something". And I know that what I'm looking for doesn't have ANYTHING to do with torrenting. So I just closed the application, and then shortcuts from my desktop started disappearing. I noticed it was all the Google Chrome shortcuts (Chrome itself and two other website shortcuts with the icons of the websites) and soon after the two website shortcuts where "replaced" by two other shortcuts named exactly the same as the original ones but had and outdated version of the Chrome logo. I can't recall the Chrome browser shortcut being replaced another one other than the website shortcuts. My antivirus later found the threat and the shortcuts disappeared, I later checked on avast and the virus it found was a "component.exe" in my user Temp folder. The taskbar shortcut for Google Chrome was also missing it's icon. I tried creating the desktop icon for Chrome again and it said the shortcut already existed. I later chose the option on Windows Explorer to view hidden items and guess what? All my original shortcuts were hidden on my desktop with the appropriate icons, so I moved them to their original position.Was it some sort of hijacker that tried to make me click on the fake browser shortcuts? If so then why would it "hide" the original Icon's instead of just erase them entirely? I have past experience with web-browser hijackers and none of them worked like that, they all just somehow added a toolbar on your browser. What type of virus this one is, I don't know.

Submitted October 04, 2017 at 10:10PM by Mighty-Pirate
via reddit http://ift.tt/2xZ0zlS
Uncommon virus behaviour(?)
So I was looking to download an application called "iso2eboot" but every link I found did not work. So when I went to google it, the first suggestion was "iso2eboot v3 download" and so I clicked it and the first result was "http://ift.tt/2gbFRGl". I entered the website and at first I thought it's one of those websites that have downloads named after the program you're looking for but actually end up giving you a suspicious looking installer with a very generic icon on it. Anyway, the website itself wasn't at all related to the program I was looking for. I thought it could just be a file-hosting website, and it probably is but I'm not at all familiar with it (Virustotall says it's clean). So this file it got from there was a .zip named after the program I'm looking for. I opened it and inside it there was another .zip file (with the same name). So I thought it was probably archived twice so that Antiviruses can't detect it. Anyways I extracted the .zip as a folder and the application had a RAR Installer icon. I opened the app and it was some sort of installer and I noticed it said somewhere 'Source: torrentz' and something like a long URL. And I know that what I'm looking for doesn't have ANYTHING to do with torrenting. So I just closed the application, and then shortcuts from my desktop started disappearing. I noticed it was all the Google Chrome shortcuts (Chrome itself and two other website shortcuts with the icons of the websites) and soon after the shortcuts were "replaced" by other shortcuts named exactly the same as the original ones but had an outdated version of the Chrome logo as an icon. My antivirus later found the threat and the shortcuts disappeared, I later checked on Avast and the virus it found was a "component.exe" in my user Temp folder. The taskbar shortcut for Google Chrome was also missing it's icon. I tried creating the desktop icon for Chrome again and it said the shortcut already existed. I later chose the option on Windows Explorer to view hidden items and guess what? All my original shortcuts were hidden on my desktop with the appropriate icons, so I moved them to their original position. Was it some sort of hijacker that tried to make me click on the fake browser shortcuts? If so then why would it "hide" the original Icon's instead of just erase them entirely? I have past experience with web-browser hijackers and none of them worked like that, they all just somehow added a toolbar on your browser. What type of virus this one is, I don't know.

Submitted October 04, 2017 at 10:29PM by Mighty-Pirate
via reddit http://ift.tt/2yJ3Enw