What is the difference between Image based authentication and Captcha?
I have been searching for the difference between the two but couldn’t find any good info. Any insights would be appreciated :)
Submitted October 16, 2017 at 01:59AM by siddhartharao17
via reddit http://ift.tt/2yje9BA
I have been searching for the difference between the two but couldn’t find any good info. Any insights would be appreciated :)
Submitted October 16, 2017 at 01:59AM by siddhartharao17
via reddit http://ift.tt/2yje9BA
reddit
What is the difference between Image based... • r/security
I have been searching for the difference between the two but couldn’t find any good info. Any insights would be appreciated :)
This is a core protocol-level flaw in WPA2 wi-fi and it looks bad. Possible impact: wi-fi decrypt, connection hijacking, content injection.
http://ift.tt/2yqHqKq
Submitted October 16, 2017 at 04:25AM by nadroj_r
via reddit http://ift.tt/2ykdFLx
http://ift.tt/2yqHqKq
Submitted October 16, 2017 at 04:25AM by nadroj_r
via reddit http://ift.tt/2ykdFLx
Airheads Community
A disclosure looks imminent from some researchers about a serious flaw in WPA2. https://twitter.com/kennwhite/status/919522184384729089 Reserved CVEs are: CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080 CVE-2017-13081 CVE-2017-13082 CVE…
New Android Ransomware.. Do you have common sense?
http://ift.tt/2zqIThE
Submitted October 16, 2017 at 09:07AM by securitynewsIO
via reddit http://ift.tt/2ymBYG9
http://ift.tt/2zqIThE
Submitted October 16, 2017 at 09:07AM by securitynewsIO
via reddit http://ift.tt/2ymBYG9
Security News iO
New Android Ransomware Encrypts Data & Locks User Out
There is a new Android Ransomware, DoubleLocker, that encrypts user data and then changes the PIN code, effectively locking users out of their phones.
[OpenSource] iOS app blackbox assessment tool with web ui, powered by frida.re and vuejs
http://ift.tt/2gF4MlB
Submitted October 16, 2017 at 08:52AM by CodeColorist
via reddit http://ift.tt/2yqGlle
http://ift.tt/2gF4MlB
Submitted October 16, 2017 at 08:52AM by CodeColorist
via reddit http://ift.tt/2yqGlle
GitHub
chaitin/passionfruit
passionfruit - [WIP] Crappy iOS app analyzer
Pizza Hut was Hacked and Late Notification Was Sent
http://ift.tt/2zqEewk
Submitted October 16, 2017 at 09:36AM by securitynewsIO
via reddit http://ift.tt/2zcqzI7
http://ift.tt/2zqEewk
Submitted October 16, 2017 at 09:36AM by securitynewsIO
via reddit http://ift.tt/2zcqzI7
Security News iO
Pizza Hut was Hacked and Late Notification Sent | Security News iO
Clients were told on Saturday that Pizza Hut was hacked two weeks ago and their personal information may have been compromised.
Paranormal activity
Hi all. Seems that the "Computer Misuse Act" in the UK does not contain any provision for people affecting computers by mere proximity due to telekinetic activity. This is an interesting theoretical defense as it would require the courts to admit that said ability exists in order to prosecute someone for "interfering with a computer or its programs".As I verifiably have this ability and also seem to be able to scramble storage devices, its an interesting problem and very hard to defend against. It appears that devices with specific components are more vulnerable than others (eg GL827) and on one occasion was able to crash three machines just by walking past them (2*BSOD, one lockup) Haven't dared try this experiment again, was tinkering with things I shouldn't have been without better safety precautions.
Submitted October 16, 2017 at 10:04AM by Conundrum1859
via reddit http://ift.tt/2xJGu4M
Hi all. Seems that the "Computer Misuse Act" in the UK does not contain any provision for people affecting computers by mere proximity due to telekinetic activity. This is an interesting theoretical defense as it would require the courts to admit that said ability exists in order to prosecute someone for "interfering with a computer or its programs".As I verifiably have this ability and also seem to be able to scramble storage devices, its an interesting problem and very hard to defend against. It appears that devices with specific components are more vulnerable than others (eg GL827) and on one occasion was able to crash three machines just by walking past them (2*BSOD, one lockup) Haven't dared try this experiment again, was tinkering with things I shouldn't have been without better safety precautions.
Submitted October 16, 2017 at 10:04AM by Conundrum1859
via reddit http://ift.tt/2xJGu4M
reddit
Paranormal activity • r/security
Hi all. Seems that the "Computer Misuse Act" in the UK does not contain any provision for people affecting computers by mere proximity due to...
What's wrong with WPA2 security and how to fix it - WPA3 Proposal
http://ift.tt/2hIvOs5
Submitted October 16, 2017 at 10:40AM by _RME_
via reddit http://ift.tt/2yk4vP3
http://ift.tt/2hIvOs5
Submitted October 16, 2017 at 10:40AM by _RME_
via reddit http://ift.tt/2yk4vP3
GitHub
d33tah/call-for-wpa3
Contribute to call-for-wpa3 development by creating an account on GitHub.
Cyber Security Industry Trends and Growth - Cyware
http://ift.tt/2yk4QBn
Submitted October 16, 2017 at 10:49AM by cywarelabs
via reddit http://ift.tt/2geDmTg
http://ift.tt/2yk4QBn
Submitted October 16, 2017 at 10:49AM by cywarelabs
via reddit http://ift.tt/2geDmTg
Cyware
Cyber Security Industry Trends and Growth | Malware Analysis | Cyware
Cyber Security Industry Trends and Growth - Find news and articles about Latest trends and Analysis happening around cyber security industry. Also get cyber reports and case studies to improve your awareness.
The KRACK attack info will be available here after 5am PST
http://ift.tt/2kR33OH
Submitted October 16, 2017 at 11:50AM by Sephr
via reddit http://ift.tt/2ylOjNu
http://ift.tt/2kR33OH
Submitted October 16, 2017 at 11:50AM by Sephr
via reddit http://ift.tt/2ylOjNu
Krackattacks
KRACK Attacks: Breaking WPA2
This website presents the Key Reinstallation Attack (KRACK). It breaks the WPA2 protocol by forcing nonce reuse in encryption algorithms used by Wi-Fi.
Framework for collecting events (process creation, network connections, Window Event Logs, etc.) from a client machine (Windows 7) and performing CAR analytics to detect potential adversary activity.
http://ift.tt/2wY2YKD
Submitted October 16, 2017 at 01:21PM by 2xyo
via reddit http://ift.tt/2hIHdIh
http://ift.tt/2wY2YKD
Submitted October 16, 2017 at 01:21PM by 2xyo
via reddit http://ift.tt/2hIHdIh
GitHub
Unfetter Analytic
Krack attack paper live (it got leaked) (PDF)
http://ift.tt/2gIbJ5n
Submitted October 16, 2017 at 02:42PM by LivingInSyn
via reddit http://ift.tt/2zr8EhU
http://ift.tt/2gIbJ5n
Submitted October 16, 2017 at 02:42PM by LivingInSyn
via reddit http://ift.tt/2zr8EhU
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2
http://ift.tt/2icGTW9
Submitted October 16, 2017 at 02:34PM by secaggr
via reddit http://ift.tt/2gHD1ZO
http://ift.tt/2icGTW9
Submitted October 16, 2017 at 02:34PM by secaggr
via reddit http://ift.tt/2gHD1ZO
GitHub
vanhoefm/papers
Contribute to papers development by creating an account on GitHub.
WPA2 security flaw
http://ift.tt/2ifOu6k
Submitted October 16, 2017 at 03:25PM by yeongsheng-tan
via reddit http://ift.tt/2yrbB3r
http://ift.tt/2ifOu6k
Submitted October 16, 2017 at 03:25PM by yeongsheng-tan
via reddit http://ift.tt/2yrbB3r
Ars Technica
Severe flaw in WPA2 protocol leaves Wi-Fi traffic open to eavesdropping
KRACK attack allows other nasties, including connection hijacking and malicious injection.
Linux Hacking | Kimi Script
https://www.youtube.com/watch?v=3w6tuvyuLIg
Submitted October 16, 2017 at 03:24PM by techwhizashish
via reddit http://ift.tt/2xInKxi
https://www.youtube.com/watch?v=3w6tuvyuLIg
Submitted October 16, 2017 at 03:24PM by techwhizashish
via reddit http://ift.tt/2xInKxi
YouTube
How to hack linux using metasploit | Kimi Script 2017
How to hack linux using metasploit| Kali linux | Kimi Script 2017 This is only for educational purpose. Like, Comment, & Share this video. Subscribe to Techw...
DNC Donor Database Vulnerability Patched
http://ift.tt/2yoqvG3
Submitted October 16, 2017 at 03:20PM by jalospinoso
via reddit http://ift.tt/2wZRVRj
http://ift.tt/2yoqvG3
Submitted October 16, 2017 at 03:20PM by jalospinoso
via reddit http://ift.tt/2wZRVRj
jlospinoso.github.io
Vulnerability Patched in Democratic Donor Database
The Blog of Josh Lospinoso
KRACK Attacks: Breaking WPA2
http://ift.tt/2kR33OH
Submitted October 16, 2017 at 02:49PM by kernelle
via reddit http://ift.tt/2hIPqMK
http://ift.tt/2kR33OH
Submitted October 16, 2017 at 02:49PM by kernelle
via reddit http://ift.tt/2hIPqMK
Krackattacks
KRACK Attacks: Breaking WPA2
This website presents the Key Reinstallation Attack (KRACK). It breaks the WPA2 protocol by forcing nonce reuse in encryption algorithms used by Wi-Fi.
Car, Truck, Bus, Vehicle Tracking System Dealers in Vadodara
http://ift.tt/2yoyxPb
Submitted October 16, 2017 at 03:45PM by wittagsolution
via reddit http://ift.tt/2wYgMF3
http://ift.tt/2yoyxPb
Submitted October 16, 2017 at 03:45PM by wittagsolution
via reddit http://ift.tt/2wYgMF3
WITTAG SOLUTION
Car | Truck | Bus | Vehicle Tracking System Dealers in Vadodara, Gujarat, India
Wittag Solution is renowned Vehicle Tracking System Dealers in Vadodara that we provide high quality Car, Truck, Bus Tracking System at affordable prices in Vadodara, Gujarat, India.
ROCA – Critical vulnerability in security chips - from bitlocker to Estonian ID cards
Masaryk University has published first information about the underlying problem behind several recent security announcements. The root problem is a bug in generating RSA keys in Infineon security chips used in about 25% of all TPM modules and a large number of smart cards (VPN access, secure email, EU qualified signatures, citizen ID cards).Technical info: http://ift.tt/2zrWIg3Disclosure process notes http://ift.tt/2gJFnYjRSA key test suite and a press release https://rocahelp.com
Submitted October 16, 2017 at 05:03PM by dc352
via reddit http://ift.tt/2ih7txl
Masaryk University has published first information about the underlying problem behind several recent security announcements. The root problem is a bug in generating RSA keys in Infineon security chips used in about 25% of all TPM modules and a large number of smart cards (VPN access, secure email, EU qualified signatures, citizen ID cards).Technical info: http://ift.tt/2zrWIg3Disclosure process notes http://ift.tt/2gJFnYjRSA key test suite and a press release https://rocahelp.com
Submitted October 16, 2017 at 05:03PM by dc352
via reddit http://ift.tt/2ih7txl
Magic of Security
ROCA – Critical vulnerability in Infineon security chips
Looking back, we can find many examples of errors in the algorithms used to create encryption keys. Not very many of them, however, were found in chips designed and sold as high-security devices fo…
Decrease in DDoS Attacks but intensity surges
http://ift.tt/2xarDLe
Submitted October 16, 2017 at 05:41PM by whitehattracker
via reddit http://ift.tt/2yrz0BY
http://ift.tt/2xarDLe
Submitted October 16, 2017 at 05:41PM by whitehattracker
via reddit http://ift.tt/2yrz0BY
reddit
Decrease in DDoS Attacks but intensity surges • r/security
1 points and 0 comments so far on reddit
Retire.js - vuln scanner for old javanoscript libs
http://ift.tt/1PPUV5Y
Submitted October 16, 2017 at 05:25PM by blackout-314
via reddit http://ift.tt/2yrdo8R
http://ift.tt/1PPUV5Y
Submitted October 16, 2017 at 05:25PM by blackout-314
via reddit http://ift.tt/2yrdo8R
retirejs.github.io
Retire.js
Retire.js : What you require you must also retire
Any flash drives reliably immune from badusb?
I work in a data center and have been tasked with purchasing some flash drives for emergency purposes. Is there any sort of list of known safe flash drives or manufacturers immune to badusb? I know they can swap out usb controllers at any point, so a safe manufacturer would be preferred. I get the feeling our security folks aren't even aware of the flaw.
Submitted October 16, 2017 at 06:17PM by g2g079
via reddit http://ift.tt/2yqSvsZ
I work in a data center and have been tasked with purchasing some flash drives for emergency purposes. Is there any sort of list of known safe flash drives or manufacturers immune to badusb? I know they can swap out usb controllers at any point, so a safe manufacturer would be preferred. I get the feeling our security folks aren't even aware of the flaw.
Submitted October 16, 2017 at 06:17PM by g2g079
via reddit http://ift.tt/2yqSvsZ
reddit
Any flash drives reliably immune from badusb? • r/security
I work in a data center and have been tasked with purchasing some flash drives for emergency purposes. Is there any sort of list of known safe...