Man in the Middle attacks
http://ift.tt/2gkBs3E
Submitted October 08, 2017 at 01:57PM by WTSxDev
via reddit http://ift.tt/2xqCK2N
http://ift.tt/2gkBs3E
Submitted October 08, 2017 at 01:57PM by WTSxDev
via reddit http://ift.tt/2xqCK2N
Kali Linux Tutorial
Kali Linux Tutorial: Man in the Middle attacks
Man in the middle attacks are methods (which have been discussed since 1995), in which the attacker latches into a communication link, and then sits in the middle between the two communication endpoints
Finding Diamonds in the Rough- Parsing for Pentesters
http://ift.tt/2kvUBEl
Submitted October 08, 2017 at 04:03PM by maxxori
via reddit http://ift.tt/2yPA284
http://ift.tt/2kvUBEl
Submitted October 08, 2017 at 04:03PM by maxxori
via reddit http://ift.tt/2yPA284
bluescreenofjeff.com - a blog about penetration testing and red teaming
Finding Diamonds in the Rough- Parsing for Pentesters
Parsing data is a fundamental ability that anyone serious about information security should consider putting time and effort into understanding. It can mean the difference between spamming Ctrl+F in a text editor and pulling out exactly what you need with…
Security.txt
https://securitytxt.org
Submitted October 08, 2017 at 05:59PM by modelop
via reddit http://ift.tt/2yQdWT7
https://securitytxt.org
Submitted October 08, 2017 at 05:59PM by modelop
via reddit http://ift.tt/2yQdWT7
security.txt
A proposed standard that allows websites to define security policies.
Wi-Fi packet sniffing / monitoring on Windows using Raspberry Pi - inspired by Wimonitor
http://ift.tt/2gjNBpx
Submitted October 08, 2017 at 07:09PM by zone13_io
via reddit http://ift.tt/2wF02CH
http://ift.tt/2gjNBpx
Submitted October 08, 2017 at 07:09PM by zone13_io
via reddit http://ift.tt/2wF02CH
Zone13.io
Wi-Fi packet sniffing / monitoring on Windows using Raspberry Pi - inspired by Wimonitor · Zone13.io
Information Security Blog
One ring to rule them all - Same RCE on multiple Trend Micro products
http://ift.tt/2yPoi5C
Submitted October 08, 2017 at 08:53PM by wtfse
via reddit http://ift.tt/2y9goqQ
http://ift.tt/2yPoi5C
Submitted October 08, 2017 at 08:53PM by wtfse
via reddit http://ift.tt/2y9goqQ
How does Pretty Good Privacy work?
http://ift.tt/2y8JbuV
Submitted October 08, 2017 at 09:46PM by radu_raicea
via reddit http://ift.tt/2kyNWte
http://ift.tt/2y8JbuV
Submitted October 08, 2017 at 09:46PM by radu_raicea
via reddit http://ift.tt/2kyNWte
Medium
How does Pretty Good Privacy work?
It’s Pretty Simple.
Testing U2F Security Keys
http://ift.tt/2yymsdx
Submitted October 09, 2017 at 02:04AM by quarrelyank
via reddit http://ift.tt/2wFC5Lj
http://ift.tt/2yymsdx
Submitted October 09, 2017 at 02:04AM by quarrelyank
via reddit http://ift.tt/2wFC5Lj
reddit
Testing U2F Security Keys • r/netsec
3 points and 0 comments so far on reddit
Cyber Operators — Differences Matter – the grugq
http://ift.tt/2k6iPEU
Submitted October 09, 2017 at 05:50AM by imr2017
via reddit http://ift.tt/2xtc0ik
http://ift.tt/2k6iPEU
Submitted October 09, 2017 at 05:50AM by imr2017
via reddit http://ift.tt/2xtc0ik
Medium
Cyber Operators — Differences Matter
A mini rant disguised as a cybersecurity taxonomy
Computer virus infects US military drone fleet: report
http://ift.tt/2kxHRNL
Submitted October 09, 2017 at 09:13AM by berthaegan
via reddit http://ift.tt/2fVEECt
http://ift.tt/2kxHRNL
Submitted October 09, 2017 at 09:13AM by berthaegan
via reddit http://ift.tt/2fVEECt
TheHill
Computer virus infects US military drone fleet: report
Editor's note: This story inadvertently went off reporting from a Wired.com article published in 2011. The story, as published by The Hill, incorrectly stated that the military had detected the virus two weeks
Reverse Engineering macOS High Sierra Supplemental Update
http://ift.tt/2kw2EBg
Submitted October 09, 2017 at 12:42PM by Mempodipper
via reddit http://ift.tt/2yR0AG8
http://ift.tt/2kw2EBg
Submitted October 09, 2017 at 12:42PM by Mempodipper
via reddit http://ift.tt/2yR0AG8
Cocoa Engineering
Reverse Engineering macOS High Sierra Supplemental Update
Reported by Matheus Mariano, a Brazilian software developer, a programming error was discovered in Apple’s most recent operating system, High Sierra, that exposed passwords of encrypted volum…
Recent Cyber Security Breaches News - Cyware
http://ift.tt/2y3m5XF
Submitted October 09, 2017 at 12:13PM by cywarelabs
via reddit http://ift.tt/2gngP6S
http://ift.tt/2y3m5XF
Submitted October 09, 2017 at 12:13PM by cywarelabs
via reddit http://ift.tt/2gngP6S
Cyware
Recent Cyber Security Breaches News | Latest Security Breaches | Cyware
Get recent news about Cyber Security Breaches. Cyware will keep you updated with latest data, information, cyber security news and be updated with all the security awareness techniques.
Sri Lanka police arrest two men over cyber theft at the Taiwan Bank
http://ift.tt/2wHyfla
Submitted October 09, 2017 at 02:35PM by MicheeLengronne
via reddit http://ift.tt/2yRQrct
http://ift.tt/2wHyfla
Submitted October 09, 2017 at 02:35PM by MicheeLengronne
via reddit http://ift.tt/2yRQrct
Security Affairs
Sri Lanka police arrest two men over cyber theft at the Taiwan Bank
The Sri Lanka authorities have arrested two men allegedly involved in cyber heist at an unnamed Taiwan bank that occurred last week.
Forget stealing data — these hackers broke into Amazon's cloud to mine bitcoin
http://ift.tt/2fUHhV7
Submitted October 09, 2017 at 03:52PM by GemmaJ123
via reddit http://ift.tt/2z7szlP
http://ift.tt/2fUHhV7
Submitted October 09, 2017 at 03:52PM by GemmaJ123
via reddit http://ift.tt/2z7szlP
Business Insider
Forget stealing data — these hackers broke into Amazon's cloud to mine bitcoin
RedLock discovered nearly 100 administration consuls with no password protection.
Security In 5: Episode 85 - Cloud Services Don't Remove Your Security Responsibilities
http://ift.tt/2hXvxW8
Submitted October 09, 2017 at 06:33PM by BinaryBlog
via reddit http://ift.tt/2kBbVIg
http://ift.tt/2hXvxW8
Submitted October 09, 2017 at 06:33PM by BinaryBlog
via reddit http://ift.tt/2kBbVIg
Libsyn
Security In Five Podcast: Episode 85 - Cloud Services Don't Remove Your Security Responsibilities
Moving to the cloud has many pros and cons for a business. One growing misconception is the amount of security a cloud provider will provide. In most cases the perimeter is protected but you are still responsible for your application and data. Don't overlook…
Read on the Web: Security researcher found roughly 700 Brother printers left exposed online
http://ift.tt/2i0xGjB
Submitted October 09, 2017 at 06:15PM by MicheeLengronne
via reddit http://ift.tt/2kxcAdu
http://ift.tt/2i0xGjB
Submitted October 09, 2017 at 06:15PM by MicheeLengronne
via reddit http://ift.tt/2kxcAdu
Limawi
Read on the Web: Security researcher found roughly 700 Brother printers left exposed online
Read on the Web: A security researcher has discovered nearly 700 Brother printers left exposed online exposing corporate and government networks to hack.
Vendors, and Third-Parties; From Chaos to Management
http://ift.tt/2wIqtr6
Submitted October 09, 2017 at 08:07PM by cyberfeminist
via reddit http://ift.tt/2za4tH5
http://ift.tt/2wIqtr6
Submitted October 09, 2017 at 08:07PM by cyberfeminist
via reddit http://ift.tt/2za4tH5
Peerlyst
Vendors, and Third-Parties; From Chaos to Management, by Dawid and Magda
Tips from Poland to Singapore There have been various reports out there from Cyber Exposure Index to national cyber reports, researched by governmental entities.A 2016 Cyber Maturity report by the ASPI International Cyber Policy Centre includes an as
Risk perception and risk management in cloud computing demystified by a CyberFeminist
http://ift.tt/2yAxdvL
Submitted October 09, 2017 at 08:41PM by cyberfeminist
via reddit http://ift.tt/2y7KOrm
http://ift.tt/2yAxdvL
Submitted October 09, 2017 at 08:41PM by cyberfeminist
via reddit http://ift.tt/2y7KOrm
Cloud Security Expo Singapore 2017
Conference Programme 2017
As Asia's dedicated cloud security event for business, the 2-day event has been nothing short of ground-breaking, inspiring, productive, power-packed with knowledge sharing, education and business opportunities galore!
VMware Escapology – How to Houdini the Hypervisor
http://ift.tt/2gbnqRQ
Submitted October 09, 2017 at 08:31PM by speckz
via reddit http://ift.tt/2y7KRDy
http://ift.tt/2gbnqRQ
Submitted October 09, 2017 at 08:31PM by speckz
via reddit http://ift.tt/2y7KRDy
Zero Day Initiative
VMware Escapology – How to Houdini the Hypervisor
Recently at the DerbyCon conference in Louisville, KY, Jasiel and I
presented “VMware Escapology: How to Houdini The Hypervisor.” My colleague
Abdul-Aziz Hariri has blogged about VMware escapes in the past.
Unfortunately, circumstances prevented Abdul…
presented “VMware Escapology: How to Houdini The Hypervisor.” My colleague
Abdul-Aziz Hariri has blogged about VMware escapes in the past.
Unfortunately, circumstances prevented Abdul…
LinkedIn Profile of a CyberFeminist to Follow
http://ift.tt/2yAaGPP
Submitted October 09, 2017 at 08:14PM by cyberfeminist
via reddit http://ift.tt/2y5TfTP
http://ift.tt/2yAaGPP
Submitted October 09, 2017 at 08:14PM by cyberfeminist
via reddit http://ift.tt/2y5TfTP
reddit
LinkedIn Profile of a CyberFeminist to Follow • r/security
0 points and 0 comments so far on reddit
Hi guys, I invented a simple device that makes it easy to remember passwords. What do you think?
Here's a linkhttp://ift.tt/2yykLMT
Submitted October 09, 2017 at 09:02PM by Randomusername8347
via reddit http://ift.tt/2y56N4u
Here's a linkhttp://ift.tt/2yykLMT
Submitted October 09, 2017 at 09:02PM by Randomusername8347
via reddit http://ift.tt/2y56N4u
Kickstarter
SPEK - Passwords in the Palm of your Hand
Tired of remembering passwords? The SPEK USB keypad provides a simple, secure and economic way for generating and entering passwords.
Introducing Mythril: A framework for bug hunting on the Ethereum blockchain
http://ift.tt/2yARPEb
Submitted October 09, 2017 at 09:31PM by berndtzl
via reddit http://ift.tt/2ySYrd5
http://ift.tt/2yARPEb
Submitted October 09, 2017 at 09:31PM by berndtzl
via reddit http://ift.tt/2ySYrd5
Medium
Introducing Mythril: A framework for bug hunting on the Ethereum blockchain
Unless you’ve been living under a rock for the past three years, you have surely taken notice of an industry buzzword that has been giving…