Forget stealing data — these hackers broke into Amazon's cloud to mine bitcoin
http://ift.tt/2fUHhV7
Submitted October 09, 2017 at 03:52PM by GemmaJ123
via reddit http://ift.tt/2z7szlP
http://ift.tt/2fUHhV7
Submitted October 09, 2017 at 03:52PM by GemmaJ123
via reddit http://ift.tt/2z7szlP
Business Insider
Forget stealing data — these hackers broke into Amazon's cloud to mine bitcoin
RedLock discovered nearly 100 administration consuls with no password protection.
Security In 5: Episode 85 - Cloud Services Don't Remove Your Security Responsibilities
http://ift.tt/2hXvxW8
Submitted October 09, 2017 at 06:33PM by BinaryBlog
via reddit http://ift.tt/2kBbVIg
http://ift.tt/2hXvxW8
Submitted October 09, 2017 at 06:33PM by BinaryBlog
via reddit http://ift.tt/2kBbVIg
Libsyn
Security In Five Podcast: Episode 85 - Cloud Services Don't Remove Your Security Responsibilities
Moving to the cloud has many pros and cons for a business. One growing misconception is the amount of security a cloud provider will provide. In most cases the perimeter is protected but you are still responsible for your application and data. Don't overlook…
Read on the Web: Security researcher found roughly 700 Brother printers left exposed online
http://ift.tt/2i0xGjB
Submitted October 09, 2017 at 06:15PM by MicheeLengronne
via reddit http://ift.tt/2kxcAdu
http://ift.tt/2i0xGjB
Submitted October 09, 2017 at 06:15PM by MicheeLengronne
via reddit http://ift.tt/2kxcAdu
Limawi
Read on the Web: Security researcher found roughly 700 Brother printers left exposed online
Read on the Web: A security researcher has discovered nearly 700 Brother printers left exposed online exposing corporate and government networks to hack.
Vendors, and Third-Parties; From Chaos to Management
http://ift.tt/2wIqtr6
Submitted October 09, 2017 at 08:07PM by cyberfeminist
via reddit http://ift.tt/2za4tH5
http://ift.tt/2wIqtr6
Submitted October 09, 2017 at 08:07PM by cyberfeminist
via reddit http://ift.tt/2za4tH5
Peerlyst
Vendors, and Third-Parties; From Chaos to Management, by Dawid and Magda
Tips from Poland to Singapore There have been various reports out there from Cyber Exposure Index to national cyber reports, researched by governmental entities.A 2016 Cyber Maturity report by the ASPI International Cyber Policy Centre includes an as
Risk perception and risk management in cloud computing demystified by a CyberFeminist
http://ift.tt/2yAxdvL
Submitted October 09, 2017 at 08:41PM by cyberfeminist
via reddit http://ift.tt/2y7KOrm
http://ift.tt/2yAxdvL
Submitted October 09, 2017 at 08:41PM by cyberfeminist
via reddit http://ift.tt/2y7KOrm
Cloud Security Expo Singapore 2017
Conference Programme 2017
As Asia's dedicated cloud security event for business, the 2-day event has been nothing short of ground-breaking, inspiring, productive, power-packed with knowledge sharing, education and business opportunities galore!
VMware Escapology – How to Houdini the Hypervisor
http://ift.tt/2gbnqRQ
Submitted October 09, 2017 at 08:31PM by speckz
via reddit http://ift.tt/2y7KRDy
http://ift.tt/2gbnqRQ
Submitted October 09, 2017 at 08:31PM by speckz
via reddit http://ift.tt/2y7KRDy
Zero Day Initiative
VMware Escapology – How to Houdini the Hypervisor
Recently at the DerbyCon conference in Louisville, KY, Jasiel and I
presented “VMware Escapology: How to Houdini The Hypervisor.” My colleague
Abdul-Aziz Hariri has blogged about VMware escapes in the past.
Unfortunately, circumstances prevented Abdul…
presented “VMware Escapology: How to Houdini The Hypervisor.” My colleague
Abdul-Aziz Hariri has blogged about VMware escapes in the past.
Unfortunately, circumstances prevented Abdul…
LinkedIn Profile of a CyberFeminist to Follow
http://ift.tt/2yAaGPP
Submitted October 09, 2017 at 08:14PM by cyberfeminist
via reddit http://ift.tt/2y5TfTP
http://ift.tt/2yAaGPP
Submitted October 09, 2017 at 08:14PM by cyberfeminist
via reddit http://ift.tt/2y5TfTP
reddit
LinkedIn Profile of a CyberFeminist to Follow • r/security
0 points and 0 comments so far on reddit
Hi guys, I invented a simple device that makes it easy to remember passwords. What do you think?
Here's a linkhttp://ift.tt/2yykLMT
Submitted October 09, 2017 at 09:02PM by Randomusername8347
via reddit http://ift.tt/2y56N4u
Here's a linkhttp://ift.tt/2yykLMT
Submitted October 09, 2017 at 09:02PM by Randomusername8347
via reddit http://ift.tt/2y56N4u
Kickstarter
SPEK - Passwords in the Palm of your Hand
Tired of remembering passwords? The SPEK USB keypad provides a simple, secure and economic way for generating and entering passwords.
Introducing Mythril: A framework for bug hunting on the Ethereum blockchain
http://ift.tt/2yARPEb
Submitted October 09, 2017 at 09:31PM by berndtzl
via reddit http://ift.tt/2ySYrd5
http://ift.tt/2yARPEb
Submitted October 09, 2017 at 09:31PM by berndtzl
via reddit http://ift.tt/2ySYrd5
Medium
Introducing Mythril: A framework for bug hunting on the Ethereum blockchain
Unless you’ve been living under a rock for the past three years, you have surely taken notice of an industry buzzword that has been giving…
MetaTwin - Borrowing Microsoft MetaData and Signatures to Hide Binary Payloads
http://ift.tt/2kAr4cL
Submitted October 09, 2017 at 10:24PM by campuscodi
via reddit http://ift.tt/2ybjn1n
http://ift.tt/2kAr4cL
Submitted October 09, 2017 at 10:24PM by campuscodi
via reddit http://ift.tt/2ybjn1n
Threat Express
MetaTwin - Borrowing Microsoft MetaData and Signatures to Hide Binary Payloads
MetaTwin is a tool created by @joevest to clone binary metadata and digital signatures in efforts to disguise or otherwise help a binary payload "blend-in".
Android App Lets Users Detect Credit Card Skimmers at Gas Pumps
http://ift.tt/2hZEf6a
Submitted October 09, 2017 at 11:39PM by DJRWolf
via reddit http://ift.tt/2z9SSYG
http://ift.tt/2hZEf6a
Submitted October 09, 2017 at 11:39PM by DJRWolf
via reddit http://ift.tt/2z9SSYG
BleepingComputer
Android App Lets Users Detect Credit Card Skimmers at Gas Pumps
There is now an Android app that can search and detect gas pump skimmers based on their Bluetooth fingerprint.
Reverse engineering a Gameboy ROM with radare2
http://ift.tt/2kDnKxI
Submitted October 10, 2017 at 12:12AM by Megabeets
via reddit http://ift.tt/2gpP2my
http://ift.tt/2kDnKxI
Submitted October 10, 2017 at 12:12AM by Megabeets
via reddit http://ift.tt/2gpP2my
Megabeets
Reverse engineering a Gameboy ROM with radare2 – Megabeets
In this article I'll show you more of the powers within radare2, this time its capabilities to analyze a non-trivial binary – a Gameboy ROM. The challenge was taken from the crackmes competition in r2con 2017.
Librem 5 funded! Hooray! • r/linux
http://ift.tt/2fWw06v
Submitted October 10, 2017 at 01:29AM by casabanclock
via reddit http://ift.tt/2g6ozxp
http://ift.tt/2fWw06v
Submitted October 10, 2017 at 01:29AM by casabanclock
via reddit http://ift.tt/2g6ozxp
reddit
Librem 5 funded! Hooray! • r/linux
26 points and 9 comments so far on reddit
How to: Avoid Phishing Attacks
http://ift.tt/1MbUch9
Submitted October 10, 2017 at 01:03AM by lastagilto
via reddit http://ift.tt/2y7hVLT
http://ift.tt/1MbUch9
Submitted October 10, 2017 at 01:03AM by lastagilto
via reddit http://ift.tt/2y7hVLT
Surveillance Self-Defense
How to: Avoid Phishing Attacks
On your path to improving your digital security, you may encounter bad actors who attempt to undermine your security goals. We call these bad actors adversaries, or attackers. When an attacker sends an email or link that looks innocent, but is actually malicious…
Australia: Australia seeks thousands of cybersecurity experts
http://ift.tt/2hyG99Z
Submitted October 10, 2017 at 02:16AM by SecurityTrust
via reddit http://ift.tt/2gpC48g
http://ift.tt/2hyG99Z
Submitted October 10, 2017 at 02:16AM by SecurityTrust
via reddit http://ift.tt/2gpC48g
The Economic Times
Australia seeks thousands of cybersecurity experts
Coding expert Tim Edwards said that in a world which continues to rely on the Internet and computers, the art of coding needed to become "common knowledge
Cloud, Digitalization and Advanced Attacks are Breaking the Old Stack
http://ift.tt/2hZhMGo
Submitted October 10, 2017 at 04:26AM by SecurityTrust
via reddit http://ift.tt/2fXN8Jm
http://ift.tt/2hZhMGo
Submitted October 10, 2017 at 04:26AM by SecurityTrust
via reddit http://ift.tt/2fXN8Jm
Vidder
Cloud, Digitalization and Advanced Attacks are Breaking the Old Stack
The current security stack of firewalls amalgamated with a dozen other security products has been rendered irrelevant by advanced cyberthreats.
Cameradar: a tool to attack CCTV cameras
http://ift.tt/2qDdnHZ
Submitted October 10, 2017 at 04:23AM by Ullaakut
via reddit http://ift.tt/2zaCPK2
http://ift.tt/2qDdnHZ
Submitted October 10, 2017 at 04:23AM by Ullaakut
via reddit http://ift.tt/2zaCPK2
GitHub
EtixLabs/cameradar
cameradar - Cameradar hacks its way into RTSP CCTV cameras
People are getting kicked off of Venmo for not reading the fine print
http://ift.tt/2ybw4d1
Submitted October 10, 2017 at 03:53AM by samp615
via reddit http://ift.tt/2g7zZky
http://ift.tt/2ybw4d1
Submitted October 10, 2017 at 03:53AM by samp615
via reddit http://ift.tt/2g7zZky
The Hustle
People are getting kicked off of Venmo for not reading the fine print
Venmo, a popular payments app, is freezing and completely removing people from its platform for not reading their 27-page-long user agreement.
Exposed Brother Printers could allow copies of printed documents to be sent to an attacker!
http://ift.tt/2wJtTd6
Submitted October 10, 2017 at 08:07AM by securitynewsIO
via reddit http://ift.tt/2yVhjbh
http://ift.tt/2wJtTd6
Submitted October 10, 2017 at 08:07AM by securitynewsIO
via reddit http://ift.tt/2yVhjbh
Security News iO
Possibly Thousands of Exposed Brother Printers Online | Security News iO
Security researcher Ankit Anubhav, principal researcher at NewSky Security, has discovered a bunch of Brother printers exposed online.
Metasploit Module for Tomcat JSP Upload via PUT Bypass (CVE-2017-12615)
http://ift.tt/2ycE7G8
Submitted October 10, 2017 at 08:34AM by peewpw
via reddit http://ift.tt/2fYMLhC
http://ift.tt/2ycE7G8
Submitted October 10, 2017 at 08:34AM by peewpw
via reddit http://ift.tt/2fYMLhC
Peew.pw
New Vulnerability, Same Old Tomcat: CVE-2017-12615
Tomcat has been a staple target for penetration testers and malicious
actors for years. With ample opportunities to exploit security
misconfigurations in the management GUI (tomcat:tomcat….) or technical
vulnerabilities, it’s no wonder attackers continue…
actors for years. With ample opportunities to exploit security
misconfigurations in the management GUI (tomcat:tomcat….) or technical
vulnerabilities, it’s no wonder attackers continue…
Allies' North Korean War Plans hacked
http://ift.tt/2yDGrqU
Submitted October 10, 2017 at 09:11AM by securitynewsIO
via reddit http://ift.tt/2grmTLK
http://ift.tt/2yDGrqU
Submitted October 10, 2017 at 09:11AM by securitynewsIO
via reddit http://ift.tt/2grmTLK
Security News iO
Allies' North Korean War Plans hacked | Security News iO
The North Korean war plans included classified military documents, including a joint South Korea-US wartime operational plans for a conflict by Pyongyang.