How does Pretty Good Privacy work?
http://ift.tt/2y8JbuV
Submitted October 08, 2017 at 09:46PM by radu_raicea
via reddit http://ift.tt/2kyNWte
http://ift.tt/2y8JbuV
Submitted October 08, 2017 at 09:46PM by radu_raicea
via reddit http://ift.tt/2kyNWte
Medium
How does Pretty Good Privacy work?
It’s Pretty Simple.
Testing U2F Security Keys
http://ift.tt/2yymsdx
Submitted October 09, 2017 at 02:04AM by quarrelyank
via reddit http://ift.tt/2wFC5Lj
http://ift.tt/2yymsdx
Submitted October 09, 2017 at 02:04AM by quarrelyank
via reddit http://ift.tt/2wFC5Lj
reddit
Testing U2F Security Keys • r/netsec
3 points and 0 comments so far on reddit
Cyber Operators — Differences Matter – the grugq
http://ift.tt/2k6iPEU
Submitted October 09, 2017 at 05:50AM by imr2017
via reddit http://ift.tt/2xtc0ik
http://ift.tt/2k6iPEU
Submitted October 09, 2017 at 05:50AM by imr2017
via reddit http://ift.tt/2xtc0ik
Medium
Cyber Operators — Differences Matter
A mini rant disguised as a cybersecurity taxonomy
Computer virus infects US military drone fleet: report
http://ift.tt/2kxHRNL
Submitted October 09, 2017 at 09:13AM by berthaegan
via reddit http://ift.tt/2fVEECt
http://ift.tt/2kxHRNL
Submitted October 09, 2017 at 09:13AM by berthaegan
via reddit http://ift.tt/2fVEECt
TheHill
Computer virus infects US military drone fleet: report
Editor's note: This story inadvertently went off reporting from a Wired.com article published in 2011. The story, as published by The Hill, incorrectly stated that the military had detected the virus two weeks
Reverse Engineering macOS High Sierra Supplemental Update
http://ift.tt/2kw2EBg
Submitted October 09, 2017 at 12:42PM by Mempodipper
via reddit http://ift.tt/2yR0AG8
http://ift.tt/2kw2EBg
Submitted October 09, 2017 at 12:42PM by Mempodipper
via reddit http://ift.tt/2yR0AG8
Cocoa Engineering
Reverse Engineering macOS High Sierra Supplemental Update
Reported by Matheus Mariano, a Brazilian software developer, a programming error was discovered in Apple’s most recent operating system, High Sierra, that exposed passwords of encrypted volum…
Recent Cyber Security Breaches News - Cyware
http://ift.tt/2y3m5XF
Submitted October 09, 2017 at 12:13PM by cywarelabs
via reddit http://ift.tt/2gngP6S
http://ift.tt/2y3m5XF
Submitted October 09, 2017 at 12:13PM by cywarelabs
via reddit http://ift.tt/2gngP6S
Cyware
Recent Cyber Security Breaches News | Latest Security Breaches | Cyware
Get recent news about Cyber Security Breaches. Cyware will keep you updated with latest data, information, cyber security news and be updated with all the security awareness techniques.
Sri Lanka police arrest two men over cyber theft at the Taiwan Bank
http://ift.tt/2wHyfla
Submitted October 09, 2017 at 02:35PM by MicheeLengronne
via reddit http://ift.tt/2yRQrct
http://ift.tt/2wHyfla
Submitted October 09, 2017 at 02:35PM by MicheeLengronne
via reddit http://ift.tt/2yRQrct
Security Affairs
Sri Lanka police arrest two men over cyber theft at the Taiwan Bank
The Sri Lanka authorities have arrested two men allegedly involved in cyber heist at an unnamed Taiwan bank that occurred last week.
Forget stealing data — these hackers broke into Amazon's cloud to mine bitcoin
http://ift.tt/2fUHhV7
Submitted October 09, 2017 at 03:52PM by GemmaJ123
via reddit http://ift.tt/2z7szlP
http://ift.tt/2fUHhV7
Submitted October 09, 2017 at 03:52PM by GemmaJ123
via reddit http://ift.tt/2z7szlP
Business Insider
Forget stealing data — these hackers broke into Amazon's cloud to mine bitcoin
RedLock discovered nearly 100 administration consuls with no password protection.
Security In 5: Episode 85 - Cloud Services Don't Remove Your Security Responsibilities
http://ift.tt/2hXvxW8
Submitted October 09, 2017 at 06:33PM by BinaryBlog
via reddit http://ift.tt/2kBbVIg
http://ift.tt/2hXvxW8
Submitted October 09, 2017 at 06:33PM by BinaryBlog
via reddit http://ift.tt/2kBbVIg
Libsyn
Security In Five Podcast: Episode 85 - Cloud Services Don't Remove Your Security Responsibilities
Moving to the cloud has many pros and cons for a business. One growing misconception is the amount of security a cloud provider will provide. In most cases the perimeter is protected but you are still responsible for your application and data. Don't overlook…
Read on the Web: Security researcher found roughly 700 Brother printers left exposed online
http://ift.tt/2i0xGjB
Submitted October 09, 2017 at 06:15PM by MicheeLengronne
via reddit http://ift.tt/2kxcAdu
http://ift.tt/2i0xGjB
Submitted October 09, 2017 at 06:15PM by MicheeLengronne
via reddit http://ift.tt/2kxcAdu
Limawi
Read on the Web: Security researcher found roughly 700 Brother printers left exposed online
Read on the Web: A security researcher has discovered nearly 700 Brother printers left exposed online exposing corporate and government networks to hack.
Vendors, and Third-Parties; From Chaos to Management
http://ift.tt/2wIqtr6
Submitted October 09, 2017 at 08:07PM by cyberfeminist
via reddit http://ift.tt/2za4tH5
http://ift.tt/2wIqtr6
Submitted October 09, 2017 at 08:07PM by cyberfeminist
via reddit http://ift.tt/2za4tH5
Peerlyst
Vendors, and Third-Parties; From Chaos to Management, by Dawid and Magda
Tips from Poland to Singapore There have been various reports out there from Cyber Exposure Index to national cyber reports, researched by governmental entities.A 2016 Cyber Maturity report by the ASPI International Cyber Policy Centre includes an as
Risk perception and risk management in cloud computing demystified by a CyberFeminist
http://ift.tt/2yAxdvL
Submitted October 09, 2017 at 08:41PM by cyberfeminist
via reddit http://ift.tt/2y7KOrm
http://ift.tt/2yAxdvL
Submitted October 09, 2017 at 08:41PM by cyberfeminist
via reddit http://ift.tt/2y7KOrm
Cloud Security Expo Singapore 2017
Conference Programme 2017
As Asia's dedicated cloud security event for business, the 2-day event has been nothing short of ground-breaking, inspiring, productive, power-packed with knowledge sharing, education and business opportunities galore!
VMware Escapology – How to Houdini the Hypervisor
http://ift.tt/2gbnqRQ
Submitted October 09, 2017 at 08:31PM by speckz
via reddit http://ift.tt/2y7KRDy
http://ift.tt/2gbnqRQ
Submitted October 09, 2017 at 08:31PM by speckz
via reddit http://ift.tt/2y7KRDy
Zero Day Initiative
VMware Escapology – How to Houdini the Hypervisor
Recently at the DerbyCon conference in Louisville, KY, Jasiel and I
presented “VMware Escapology: How to Houdini The Hypervisor.” My colleague
Abdul-Aziz Hariri has blogged about VMware escapes in the past.
Unfortunately, circumstances prevented Abdul…
presented “VMware Escapology: How to Houdini The Hypervisor.” My colleague
Abdul-Aziz Hariri has blogged about VMware escapes in the past.
Unfortunately, circumstances prevented Abdul…
LinkedIn Profile of a CyberFeminist to Follow
http://ift.tt/2yAaGPP
Submitted October 09, 2017 at 08:14PM by cyberfeminist
via reddit http://ift.tt/2y5TfTP
http://ift.tt/2yAaGPP
Submitted October 09, 2017 at 08:14PM by cyberfeminist
via reddit http://ift.tt/2y5TfTP
reddit
LinkedIn Profile of a CyberFeminist to Follow • r/security
0 points and 0 comments so far on reddit
Hi guys, I invented a simple device that makes it easy to remember passwords. What do you think?
Here's a linkhttp://ift.tt/2yykLMT
Submitted October 09, 2017 at 09:02PM by Randomusername8347
via reddit http://ift.tt/2y56N4u
Here's a linkhttp://ift.tt/2yykLMT
Submitted October 09, 2017 at 09:02PM by Randomusername8347
via reddit http://ift.tt/2y56N4u
Kickstarter
SPEK - Passwords in the Palm of your Hand
Tired of remembering passwords? The SPEK USB keypad provides a simple, secure and economic way for generating and entering passwords.
Introducing Mythril: A framework for bug hunting on the Ethereum blockchain
http://ift.tt/2yARPEb
Submitted October 09, 2017 at 09:31PM by berndtzl
via reddit http://ift.tt/2ySYrd5
http://ift.tt/2yARPEb
Submitted October 09, 2017 at 09:31PM by berndtzl
via reddit http://ift.tt/2ySYrd5
Medium
Introducing Mythril: A framework for bug hunting on the Ethereum blockchain
Unless you’ve been living under a rock for the past three years, you have surely taken notice of an industry buzzword that has been giving…
MetaTwin - Borrowing Microsoft MetaData and Signatures to Hide Binary Payloads
http://ift.tt/2kAr4cL
Submitted October 09, 2017 at 10:24PM by campuscodi
via reddit http://ift.tt/2ybjn1n
http://ift.tt/2kAr4cL
Submitted October 09, 2017 at 10:24PM by campuscodi
via reddit http://ift.tt/2ybjn1n
Threat Express
MetaTwin - Borrowing Microsoft MetaData and Signatures to Hide Binary Payloads
MetaTwin is a tool created by @joevest to clone binary metadata and digital signatures in efforts to disguise or otherwise help a binary payload "blend-in".
Android App Lets Users Detect Credit Card Skimmers at Gas Pumps
http://ift.tt/2hZEf6a
Submitted October 09, 2017 at 11:39PM by DJRWolf
via reddit http://ift.tt/2z9SSYG
http://ift.tt/2hZEf6a
Submitted October 09, 2017 at 11:39PM by DJRWolf
via reddit http://ift.tt/2z9SSYG
BleepingComputer
Android App Lets Users Detect Credit Card Skimmers at Gas Pumps
There is now an Android app that can search and detect gas pump skimmers based on their Bluetooth fingerprint.
Reverse engineering a Gameboy ROM with radare2
http://ift.tt/2kDnKxI
Submitted October 10, 2017 at 12:12AM by Megabeets
via reddit http://ift.tt/2gpP2my
http://ift.tt/2kDnKxI
Submitted October 10, 2017 at 12:12AM by Megabeets
via reddit http://ift.tt/2gpP2my
Megabeets
Reverse engineering a Gameboy ROM with radare2 – Megabeets
In this article I'll show you more of the powers within radare2, this time its capabilities to analyze a non-trivial binary – a Gameboy ROM. The challenge was taken from the crackmes competition in r2con 2017.
Librem 5 funded! Hooray! • r/linux
http://ift.tt/2fWw06v
Submitted October 10, 2017 at 01:29AM by casabanclock
via reddit http://ift.tt/2g6ozxp
http://ift.tt/2fWw06v
Submitted October 10, 2017 at 01:29AM by casabanclock
via reddit http://ift.tt/2g6ozxp
reddit
Librem 5 funded! Hooray! • r/linux
26 points and 9 comments so far on reddit
How to: Avoid Phishing Attacks
http://ift.tt/1MbUch9
Submitted October 10, 2017 at 01:03AM by lastagilto
via reddit http://ift.tt/2y7hVLT
http://ift.tt/1MbUch9
Submitted October 10, 2017 at 01:03AM by lastagilto
via reddit http://ift.tt/2y7hVLT
Surveillance Self-Defense
How to: Avoid Phishing Attacks
On your path to improving your digital security, you may encounter bad actors who attempt to undermine your security goals. We call these bad actors adversaries, or attackers. When an attacker sends an email or link that looks innocent, but is actually malicious…