Browser security beyond sandboxing in Chrome
http://ift.tt/2yvbiD7
Submitted October 18, 2017 at 10:23PM by werrett
via reddit http://ift.tt/2zjTfPy
http://ift.tt/2yvbiD7
Submitted October 18, 2017 at 10:23PM by werrett
via reddit http://ift.tt/2zjTfPy
reddit
Browser security beyond sandboxing in Chrome • r/netsec
1 points and 0 comments so far on reddit
Hack.lu 2017 [youtube playlist]
https://www.youtube.com/playlist?list=PLCxOaebc_2yNlOGhuOjInlJvr0Ktb_FYz
Submitted October 18, 2017 at 04:32PM by Maijin
via reddit http://ift.tt/2zjWmac
https://www.youtube.com/playlist?list=PLCxOaebc_2yNlOGhuOjInlJvr0Ktb_FYz
Submitted October 18, 2017 at 04:32PM by Maijin
via reddit http://ift.tt/2zjWmac
test your APs if are affected by KRACK attack
http://ift.tt/2x5sfTo
Submitted October 18, 2017 at 11:06PM by debaakram2000
via reddit http://ift.tt/2yym5Pe
http://ift.tt/2x5sfTo
Submitted October 18, 2017 at 11:06PM by debaakram2000
via reddit http://ift.tt/2yym5Pe
GitHub
vanhoefm/krackattacks-test-ap-ft
Contribute to krackattacks-test-ap-ft development by creating an account on GitHub.
Testing AP's Vulnerable to KRACK
http://ift.tt/2x5sfTo
Submitted October 18, 2017 at 11:54PM by stbernardy
via reddit http://ift.tt/2yxNGQ8
http://ift.tt/2x5sfTo
Submitted October 18, 2017 at 11:54PM by stbernardy
via reddit http://ift.tt/2yxNGQ8
GitHub
vanhoefm/krackattacks-test-ap-ft
Contribute to krackattacks-test-ap-ft development by creating an account on GitHub.
WaterMiner – a New Evasive Crypto-Miner
http://ift.tt/2yxk57O
Submitted October 19, 2017 at 12:24AM by GelosSnake
via reddit http://ift.tt/2kYD9c4
http://ift.tt/2yxk57O
Submitted October 19, 2017 at 12:24AM by GelosSnake
via reddit http://ift.tt/2kYD9c4
Minerva-Labs
WaterMiner – a New Evasive Crypto-Miner
Minerva Labs has uncovered malicious software that implements a new evasive cryptocurrency mining campaign.
Week 41 in Information Security, 2017
http://ift.tt/2ySNWub
Submitted October 19, 2017 at 12:23AM by undercomm
via reddit http://ift.tt/2hOpVtu
http://ift.tt/2ySNWub
Submitted October 19, 2017 at 12:23AM by undercomm
via reddit http://ift.tt/2hOpVtu
Malgregator
InfoSec Week 41, 2017
SensePost researchers found out that the Microsoft Office home page is able to compromise user by loading ActiveX component with...
5 cybersecurity predictions (that might actually come true)
http://ift.tt/2yw86Yd
Submitted October 19, 2017 at 12:35AM by volci
via reddit http://ift.tt/2hNSZRW
http://ift.tt/2yw86Yd
Submitted October 19, 2017 at 12:35AM by volci
via reddit http://ift.tt/2hNSZRW
Naked Security
6 cybersecurity predictions (that might actually come true)
We asked some security professionals what they’re actually planning to deal with
HydraPOS — Operation of Brazilian fraudsters has accumulated, at least, 1.4 million card data
http://ift.tt/2xOEgvX
Submitted October 19, 2017 at 12:58AM by mykeush
via reddit http://ift.tt/2yxUAog
http://ift.tt/2xOEgvX
Submitted October 19, 2017 at 12:58AM by mykeush
via reddit http://ift.tt/2yxUAog
SideChannel
HydraPOS — Operation of Brazilian fraudsters has accumulated, at least, 1.4 million card data
Fraud scheme went unnoticed for four years, targeting several merchants in Brazil
BoundHook: Exception Based, Kernel-Controlled UserMode Hooking - CyberArk
http://ift.tt/2kXs8aZ
Submitted October 19, 2017 at 01:38AM by campuscodi
via reddit http://ift.tt/2hOvZ5n
http://ift.tt/2kXs8aZ
Submitted October 19, 2017 at 01:38AM by campuscodi
via reddit http://ift.tt/2hOvZ5n
CyberArk
BoundHook: Exception Based, Kernel-Controlled UserMode Hooking - CyberArk
In this article, we’ll present a new hooking technique that we have found during our research work. Hooking techniques give you control over the way an operating system or a piece of software behaves. Some...
How Ukraine’s Cyber Chief Can Help the US Beat Russia
http://ift.tt/2xQreD4
Submitted October 19, 2017 at 02:16AM by SecurityTrust
via reddit http://ift.tt/2l0ECyw
http://ift.tt/2xQreD4
Submitted October 19, 2017 at 02:16AM by SecurityTrust
via reddit http://ift.tt/2l0ECyw
SmartUp
How Ukraine’s Cyber Chief Can Help the US Beat Russia
Welcome to the age of cyber warfare. “We are all easy to influence,” warned Dmytro Shymkiv, Deputy Head of the Presidential Administration of Ukraine and Secretary of Ukraine’s National Reforms Council, at the chilling start of a computer security panel at...
Smartwatches for Kids Could be Hacked!
http://ift.tt/2hP8j0y
Submitted October 19, 2017 at 07:05AM by securitynewsIO
via reddit http://ift.tt/2zzYonR
http://ift.tt/2hP8j0y
Submitted October 19, 2017 at 07:05AM by securitynewsIO
via reddit http://ift.tt/2zzYonR
Security News iO
Smartwatches for kids could be hacked | Security News iO
Hackers could exploit security holes allowing them to speak with kids, even spoof the address to let parents think that their kids are somewhere else.
Newly Disclosed Vulnerability in MS Word Allows Code Execution Without Macros Enabled blog.cloudmark.com
http://ift.tt/2xPvjr7
Submitted October 19, 2017 at 07:04AM by infinityprime
via reddit http://ift.tt/2gtkCTR
http://ift.tt/2xPvjr7
Submitted October 19, 2017 at 07:04AM by infinityprime
via reddit http://ift.tt/2gtkCTR
Cloudmark Security Blog
Newly Disclosed Vulnerability in MS Word Allows Code Execution Without Macros Enabled
Macros in Microsoft Word documents have been used for malware delivery for a long time. Any document that asks you to “Enable Content” should raise a big red flag. However, a newly disc…
Internet of Ships falling down on security basics - We may not think of ships as industrial control... http://ift.tt/2gQB8tN
No text found
Submitted October 19, 2017 at 12:00PM by XYZInfosec
via reddit http://ift.tt/2im6f44
No text found
Submitted October 19, 2017 at 12:00PM by XYZInfosec
via reddit http://ift.tt/2im6f44
reddit
Internet of Ships falling down on security basics -... • r/security
1 points and 0 comments so far on reddit
Attacking a co-hosted VM with row-hammer. Pwning the Libpam
http://ift.tt/2zjKTrm
Submitted October 19, 2017 at 01:55PM by _cacao
via reddit http://ift.tt/2yyzq9K
http://ift.tt/2zjKTrm
Submitted October 19, 2017 at 01:55PM by _cacao
via reddit http://ift.tt/2yyzq9K
This is Security :: by Stormshield
Attacking a co-hosted VM: A hacker, a hammer and two memory modules - This is Security :: by Stormshield
Row-hammer is hardware bug that can cause bit-flips in physical RAM. Mark Seaborn and Thomas Dullien were the first to exploit the DRAM row-hammer bug to gain kernel privileges. Kaveh Razavi et al. pushed the exploitation of row-hammer bugs to the next level.…
The 6-step "Happy Path" to HTTPS
http://ift.tt/2yqXzzM
Submitted October 19, 2017 at 03:08PM by liotier
via reddit http://ift.tt/2zlr3vV
http://ift.tt/2yqXzzM
Submitted October 19, 2017 at 03:08PM by liotier
via reddit http://ift.tt/2zlr3vV
Troy Hunt
The 6-Step "Happy Path" to HTTPS
It's finally time: it's time the pendulum swings further towards the "secure by default" end of the scale than what it ever has before. At least insofar as securing web traffic goes because as of this week's Chrome 62's launch, any website with an input box…
How can I improve my websites security and optimize its performance?
No text found
Submitted October 19, 2017 at 04:02PM by spiritual0
via reddit http://ift.tt/2zzwMiq
No text found
Submitted October 19, 2017 at 04:02PM by spiritual0
via reddit http://ift.tt/2zzwMiq
reddit
How can I improve my websites security and optimize... • r/security
1 points and 0 comments so far on reddit
6 cybersecurity predictions (that might actually come true)
http://ift.tt/2ilbxgg
Submitted October 19, 2017 at 03:12PM by MicheeLengronne
via reddit http://ift.tt/2zy2wo5
http://ift.tt/2ilbxgg
Submitted October 19, 2017 at 03:12PM by MicheeLengronne
via reddit http://ift.tt/2zy2wo5
Naked Security
6 cybersecurity predictions (that might actually come true)
We asked some security professionals what they’re actually planning to deal with
Read on the Web: IDG Contributor Network: Being stupid isn’t an excuse
http://ift.tt/2yv65h4
Submitted October 19, 2017 at 04:42PM by MicheeLengronne
via reddit http://ift.tt/2gmaZlY
http://ift.tt/2yv65h4
Submitted October 19, 2017 at 04:42PM by MicheeLengronne
via reddit http://ift.tt/2gmaZlY
Limawi
Read on the Web: IDG Contributor Network: Being stupid isn’t an excuse
Read on the Web: It’s a fact that when we are inundated with news about a single topic repeatedly we tend to start ignoring it, pushing it out of our head and moving on to the next thi...
Security In 5: Episode 93 - Why You Shouldn't Accept Every LinkedIn Connection Request
http://ift.tt/2hPx7FH
Submitted October 19, 2017 at 06:41PM by BinaryBlog
via reddit http://ift.tt/2yTkFQa
http://ift.tt/2hPx7FH
Submitted October 19, 2017 at 06:41PM by BinaryBlog
via reddit http://ift.tt/2yTkFQa
Libsyn
Security In Five Podcast: Episode 93 - Why You Shouldn't Accept Every LinkedIn Connection Request
LinkedIn is the social network for our professional persona. Our careers and business contacts kept separate form our personal social lives. On LinkedIn we tend to accept connections more freely than on our personal social sites. Even though we are out to…
Is Endpoint Security Necessary?
Is it worth installing end-point security software on organizational clients?General Thoughts? Size of Organization? Service(s)/Provider(s)?
Submitted October 19, 2017 at 07:10PM by ciscoadmin55
via reddit http://ift.tt/2zAvhAA
Is it worth installing end-point security software on organizational clients?General Thoughts? Size of Organization? Service(s)/Provider(s)?
Submitted October 19, 2017 at 07:10PM by ciscoadmin55
via reddit http://ift.tt/2zAvhAA
reddit
Is Endpoint Security Necessary? • r/security
Is it worth installing end-point security software on organizational clients? General Thoughts? Size of Organization? Service(s)/Provider(s)?
Hollywood under hacker control: What can they do to protect themselves?
http://ift.tt/2gsc2o4
Submitted October 19, 2017 at 07:46PM by robthesecurityguy
via reddit http://ift.tt/2zmpL3G
http://ift.tt/2gsc2o4
Submitted October 19, 2017 at 07:46PM by robthesecurityguy
via reddit http://ift.tt/2zmpL3G
Proactive Cyber Defense Leader Cybersecurity SaaS
Hollywood under hacker control: What can they do to protect themselves? - Proactive Cyber Defense Leader Cybersecurity SaaS
hollywood hackers