Attacks on Smart contracts
http://ift.tt/2zfLQBN
Submitted October 12, 2017 at 04:58AM by poopinspace
via reddit http://ift.tt/2kIOCMv
http://ift.tt/2zfLQBN
Submitted October 12, 2017 at 04:58AM by poopinspace
via reddit http://ift.tt/2kIOCMv
www.cryptologie.net
Attacks on Ethereum Smart Contracts
I just made a video covering common attacks on Ethereum's smart contracts. I used live0verflow's techniques to record and edit this one so it's going to feel different from the others :)
It's a tl;dr of A survey of attacks on Ethereum smart contracts by…
It's a tl;dr of A survey of attacks on Ethereum smart contracts by…
Reddit is now beta testing 2FA!
I just got this message.Hello there! You are receiving this message because you have been selected to be a part of our trial group for Two-Factor Authentication (2FA). Initially we are rolling this out to a small number of users to work out any unanticipated bugs. While it is optional whether or not you wish to enable 2FA, we strongly suggest doing so.To enable 2FA, you'll need to have an email address verified to your account, as well as an authentication app such as Authy or Google Authenticator. From the desktop site visit your password/email preferences, then select "click to enable" at the bottom of the page. Follow the on-screen instructions to complete the set up. We strongly advise you to generate and print out backup codes in case you lose access to your trusted device or authentication app.Once you have enabled 2FA, the next time you attempt to log in to reddit you'll be asked to enter a 6-digit verification code generated by your authentication app. You can also use one of your single-use backup codes if necessary.If you have any trouble enabling 2FA, please refer to our Help Center for initial troubleshooting. If you need additional assistance please contact us via modmail using this link, or via contact@reddit.com from your verified email address with the subject set to Two-Factor Authentication beta.Thank you for helping us beta test 2FA!”
Submitted October 12, 2017 at 07:46AM by bdonvr
via reddit http://ift.tt/2i3TCdJ
I just got this message.Hello there! You are receiving this message because you have been selected to be a part of our trial group for Two-Factor Authentication (2FA). Initially we are rolling this out to a small number of users to work out any unanticipated bugs. While it is optional whether or not you wish to enable 2FA, we strongly suggest doing so.To enable 2FA, you'll need to have an email address verified to your account, as well as an authentication app such as Authy or Google Authenticator. From the desktop site visit your password/email preferences, then select "click to enable" at the bottom of the page. Follow the on-screen instructions to complete the set up. We strongly advise you to generate and print out backup codes in case you lose access to your trusted device or authentication app.Once you have enabled 2FA, the next time you attempt to log in to reddit you'll be asked to enter a 6-digit verification code generated by your authentication app. You can also use one of your single-use backup codes if necessary.If you have any trouble enabling 2FA, please refer to our Help Center for initial troubleshooting. If you need additional assistance please contact us via modmail using this link, or via contact@reddit.com from your verified email address with the subject set to Two-Factor Authentication beta.Thank you for helping us beta test 2FA!”
Submitted October 12, 2017 at 07:46AM by bdonvr
via reddit http://ift.tt/2i3TCdJ
reddit
Reddit is now beta testing 2FA! • r/security
I just got this message. > Hello there! You are receiving this message because you have been selected to be a part of our trial group for...
Security Now 632 The DNSSEC Challenge | TWiT.TV
http://ift.tt/2gaJHCS
Submitted October 12, 2017 at 08:51AM by dmp1ce
via reddit http://ift.tt/2gxxZim
http://ift.tt/2gaJHCS
Submitted October 12, 2017 at 08:51AM by dmp1ce
via reddit http://ift.tt/2gxxZim
TWiT.tv
Security Now 632 The DNSSEC Challenge | TWiT.TV
This week we take a look at a well-handled breach-response at Disqus, a rather horrifying mistake Apple made in the implementation of their APFS encryption (and the difficulty to t…
Hackers stole Australian Secret Files on Jets and Navy Ships
http://ift.tt/2kJlwN1
Submitted October 12, 2017 at 10:40AM by securitynewsIO
via reddit http://ift.tt/2wPbRpK
http://ift.tt/2kJlwN1
Submitted October 12, 2017 at 10:40AM by securitynewsIO
via reddit http://ift.tt/2wPbRpK
Security News iO
Hackers Stole Secret Files on Jets and Navy Ships | Security News iO
The hackers had full access to secret files for four months in 2016 before the Australian Signals Directorate was tipped about the breach last November.
Automatic authorization enforcement detection extension for burp suite
http://ift.tt/1IXHfEl
Submitted October 12, 2017 at 12:55AM by quitten11
via reddit http://ift.tt/2z13vMs
http://ift.tt/1IXHfEl
Submitted October 12, 2017 at 12:55AM by quitten11
via reddit http://ift.tt/2z13vMs
GitHub
Quitten/Autorize
Autorize - Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily in order to ease application security people work and allow them perfor...
atomic-red-team: Small and highly portable detection tests mapped to the Mitre ATT&CK Framework.
http://ift.tt/2geBv4d
Submitted October 12, 2017 at 12:11PM by 2xyo
via reddit http://ift.tt/2zhrkRa
http://ift.tt/2geBv4d
Submitted October 12, 2017 at 12:11PM by 2xyo
via reddit http://ift.tt/2zhrkRa
GitHub
redcanaryco/atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK. - redcanaryco/atomic-red-team
Biometric Products, Biometric Solution Providers - About Us
http://ift.tt/2z26Cnk
Submitted October 12, 2017 at 12:14PM by FaceKeyCorporation
via reddit http://ift.tt/2zh3zbU
http://ift.tt/2z26Cnk
Submitted October 12, 2017 at 12:14PM by FaceKeyCorporation
via reddit http://ift.tt/2zh3zbU
Facekey
About Us - Facekey
FaceKey, security access control, biometric access control and fingerprint access control, face recognition, facial recognition, card access, biometrics
Kovter Group malvertising campaign exposes millions to potential ad fraud malware infections
http://ift.tt/2glU9UX
Submitted October 12, 2017 at 01:55PM by paran0ide
via reddit http://ift.tt/2yinlW0
http://ift.tt/2glU9UX
Submitted October 12, 2017 at 01:55PM by paran0ide
via reddit http://ift.tt/2yinlW0
Proofpoint
Kovter Group malvertising campaign exposes millions to potential ad fraud malware infections
Proofpoint researchers describe recent malvertising activity by the so-called “KovCoreG group” impacting several high-ranking websites.
Home Security Alarm
http://ift.tt/2zhLies
Submitted October 12, 2017 at 03:03PM by Sophiaalice2
via reddit http://ift.tt/2xBmcu4
http://ift.tt/2zhLies
Submitted October 12, 2017 at 03:03PM by Sophiaalice2
via reddit http://ift.tt/2xBmcu4
Home Security System | Wireless DIY Home Security Systems - HNS
NBN Ready Security Alarm System & Alarm Monitoring Service
HNS smart home security solution provides NBN ready security system with professional back to base monitoring keeping you, your home and family safe and secure.
Kernel Pool Overflow Exploitation In Real World – Windows 7
http://ift.tt/2tV7Nn6
Submitted October 12, 2017 at 03:45PM by maxxori
via reddit http://ift.tt/2zhE0aE
http://ift.tt/2tV7Nn6
Submitted October 12, 2017 at 03:45PM by maxxori
via reddit http://ift.tt/2zhE0aE
TRACKWATCH
Kernel Pool Overflow Exploitation In Real World – Windows 7 | TRACKWATCH
1) IntroductionThis article will focus on a vulnerability (CVE-2017-6008) we identified in the HitmanPro standalone scan version 3.7.15 - Build 281. This tool is a part of the HitmanPro.Alert solution and has been integrated in the Sophos
Over The Air Conclusion: Exploiting The Wi-Fi Stack on Apple Devices
http://ift.tt/2ygncSW
Submitted October 12, 2017 at 02:28PM by albinowax
via reddit http://ift.tt/2yiqKnV
http://ift.tt/2ygncSW
Submitted October 12, 2017 at 02:28PM by albinowax
via reddit http://ift.tt/2yiqKnV
googleprojectzero.blogspot.co.uk
Over The Air - Vol. 2, Pt. 3: Exploiting The Wi-Fi Stack on Apple Devices
Posted by Gal Beniamini, Project Zero In this blog post we’ll complete our goal of achieving remote kernel code execution on the iPhone ...
Kernel Pool Overflow Exploitation In Real World – Windows 10
http://ift.tt/2hDq7vt
Submitted October 12, 2017 at 03:57PM by maxxori
via reddit http://ift.tt/2yejAPF
http://ift.tt/2hDq7vt
Submitted October 12, 2017 at 03:57PM by maxxori
via reddit http://ift.tt/2yejAPF
TRACKWATCH
Kernel Pool Overflow Exploitation In Real World – Windows 10 | TRACKWATCH
1) IntroductionThis article is the sequel of the article Kernel Pool Overflow Exploitation In Real World - Windows 7.We will exploit the very same vulnerability on Windows 10, which is pretty challenging since Microsoft did a great jo
Read on the Web: Scammers demand Bitcoin in DDoS extortion scheme, deliver empty threats
http://ift.tt/2yiBQJj
Submitted October 12, 2017 at 04:38PM by MicheeLengronne
via reddit http://ift.tt/2xAOHDr
http://ift.tt/2yiBQJj
Submitted October 12, 2017 at 04:38PM by MicheeLengronne
via reddit http://ift.tt/2xAOHDr
Limawi
Read on the Web: Scammers demand Bitcoin in DDoS extortion scheme, deliver empty threats
Read on the Web: The FBI has issued an advisory to businesses over a recent string of DDoS extortion attempts. The perpetrators are claiming to be affiliated with Anonymous or Lizard S...
iOS Password Prompts are Ripe for Abuse | Threatpost
http://ift.tt/2ye9Cy4
Submitted October 12, 2017 at 04:07PM by MicheeLengronne
via reddit http://ift.tt/2yiX0aC
http://ift.tt/2ye9Cy4
Submitted October 12, 2017 at 04:07PM by MicheeLengronne
via reddit http://ift.tt/2yiX0aC
Threatpost | The first stop for security news
iOS Password Prompts are Ripe for Abuse
Apple’s password prompts for iOS devices are an easy target for phishing attacks to steal iTunes passwords and IDs.
How A Cloud Leak Exposed Accenture's Business
http://ift.tt/2y9WN7J
Submitted October 12, 2017 at 05:20PM by janih
via reddit http://ift.tt/2g5gzZI
http://ift.tt/2y9WN7J
Submitted October 12, 2017 at 05:20PM by janih
via reddit http://ift.tt/2g5gzZI
Upguard
System Shock: How A Cloud Leak Exposed Accenture's Business
Multiple sensitive buckets belonging to the corporation were found publicly exposed, revealing credentials, keys, and customer information.
oss-security - Privilege escalation with kill(-1, SIGKILL) in XNU kernel of macOS High Sierra
http://ift.tt/2yGdA5u
Submitted October 12, 2017 at 06:47PM by adisbladis
via reddit http://ift.tt/2ygfmY6
http://ift.tt/2yGdA5u
Submitted October 12, 2017 at 06:47PM by adisbladis
via reddit http://ift.tt/2ygfmY6
reddit
oss-security - Privilege escalation with kill(-1,... • r/netsec
3 points and 0 comments so far on reddit
Security In 5: Episode 88 - Security Assessments Are Only Good At The Time You Conduct One, Do More
http://ift.tt/2g5BoEv
Submitted October 12, 2017 at 06:33PM by BinaryBlog
via reddit http://ift.tt/2ybX38L
http://ift.tt/2g5BoEv
Submitted October 12, 2017 at 06:33PM by BinaryBlog
via reddit http://ift.tt/2ybX38L
Libsyn
Security In Five Podcast: Episode 88 - Security Assessments Are Only Good At The Time You Conduct One, Do More
Security and Risk Assessments are a critical components of a security program. You will see that regular assessments will be asked for more often by regulations, partners and departments. They are the reasons for any security initiatives and are also the…
This "Security Talk" represents exactly the message we should not be spreading.
http://ift.tt/2zhZO60
Submitted October 12, 2017 at 07:15PM by RobsRemarks
via reddit http://ift.tt/2gellrH
http://ift.tt/2zhZO60
Submitted October 12, 2017 at 07:15PM by RobsRemarks
via reddit http://ift.tt/2gellrH
Robs Remarks
The Terrible Talk
Recently I went to the New York Metro Joint Cyber Security Conference.
Equifax website hacked again, this time to redirect to fake Flash update
http://ift.tt/2zfLgnD
Submitted October 12, 2017 at 08:35PM by DJRWolf
via reddit http://ift.tt/2yca8yJ
http://ift.tt/2zfLgnD
Submitted October 12, 2017 at 08:35PM by DJRWolf
via reddit http://ift.tt/2yca8yJ
Ars Technica
Equifax website borked again, this time to redirect to fake Flash update
Malware researcher encounters bogus download links during multiple visits.
Outlook Home Page – Another Ruler Vector
http://ift.tt/2gbP5Ft
Submitted October 12, 2017 at 08:50PM by mackwage
via reddit http://ift.tt/2z3nZV8
http://ift.tt/2gbP5Ft
Submitted October 12, 2017 at 08:50PM by mackwage
via reddit http://ift.tt/2z3nZV8
Sensepost
SensePost | Outlook home page – another ruler vector
Leaders in Information Security
Users aren't the weakest link in cybersecurity: 3 tips for IT leaders
http://ift.tt/2hCVoil
Submitted October 12, 2017 at 09:32PM by DEAF-LAMONT
via reddit http://ift.tt/2g6ArMn
http://ift.tt/2hCVoil
Submitted October 12, 2017 at 09:32PM by DEAF-LAMONT
via reddit http://ift.tt/2g6ArMn
TechRepublic
Users aren't the weakest link in cybersecurity: 3 tips for IT leaders
A Clemson University professor argues that end users are not the weakest link when it comes to information security. Find out how IT leaders can facilitate better cybersecurity practices.