Hacking Cryptocurrency Miners with OSINT Techniques
http://ift.tt/2gHgyiC
Submitted October 26, 2017 at 02:42AM by teknoseyfo
via reddit http://ift.tt/2zDOyAc
http://ift.tt/2gHgyiC
Submitted October 26, 2017 at 02:42AM by teknoseyfo
via reddit http://ift.tt/2zDOyAc
Medium
Hacking Cryptocurrency Miners with OSINT Techniques
NOTE: All the methods I have explained are at your own risk
Yi Cameras- Nightmare or okay?
Hey guys! I'm in need of a dirt cheap wifi security system to get alerts on my phone when motion is detected upstairs at our house during parties. I won't be using it 24/7 likely and I'm not too concerned about the obvious security loopholes of a Wifi camera just because of my use scenario. My search has lead me to Xiaomi's cheap Yi series- almost every review seems to point out the amount of permissions the app asks for on Android. I use an iPhone but obviously I'm still concerned. It seems to me that people are worried about the app trying to get device ID information and stuff, but I've been on other forums where devs are explaining that it needs the scary looking permissions in order for a feature of another Yi product, the GoPro competitor, and everything is handled through the same app.Bottom line- I'm not worried about the usual IoT concerns, but does anyone know if these Xiaomi products are safe to begin with?
Submitted October 26, 2017 at 04:28AM by Funkbass
via reddit http://ift.tt/2zDPg0p
Hey guys! I'm in need of a dirt cheap wifi security system to get alerts on my phone when motion is detected upstairs at our house during parties. I won't be using it 24/7 likely and I'm not too concerned about the obvious security loopholes of a Wifi camera just because of my use scenario. My search has lead me to Xiaomi's cheap Yi series- almost every review seems to point out the amount of permissions the app asks for on Android. I use an iPhone but obviously I'm still concerned. It seems to me that people are worried about the app trying to get device ID information and stuff, but I've been on other forums where devs are explaining that it needs the scary looking permissions in order for a feature of another Yi product, the GoPro competitor, and everything is handled through the same app.Bottom line- I'm not worried about the usual IoT concerns, but does anyone know if these Xiaomi products are safe to begin with?
Submitted October 26, 2017 at 04:28AM by Funkbass
via reddit http://ift.tt/2zDPg0p
reddit
Yi Cameras- Nightmare or okay? • r/security
Hey guys! I'm in need of a dirt cheap wifi security system to get alerts on my phone when motion is detected upstairs at our house during parties....
Third Man Charged in Hacking Celebrities' iCloud ...
http://ift.tt/2zD39vS
Submitted October 26, 2017 at 03:22AM by magnum100
via reddit http://ift.tt/2xnmSPB
http://ift.tt/2zD39vS
Submitted October 26, 2017 at 03:22AM by magnum100
via reddit http://ift.tt/2xnmSPB
Dark Reading
Third Man Charged in Hacking Celebrities' iCloud and Gmail Accounts
An Illinois man is charged with hacking into more than 550 accounts that belong to entertainment industry figures and others.
Help with security cameras
My uncles doing a job for a man that wants security cameras that can record footage up to a week long but also give a live feed to his phone is this doable without going through a company like xfinity?
Submitted October 26, 2017 at 04:52AM by muckballs
via reddit http://ift.tt/2iCKwoQ
My uncles doing a job for a man that wants security cameras that can record footage up to a week long but also give a live feed to his phone is this doable without going through a company like xfinity?
Submitted October 26, 2017 at 04:52AM by muckballs
via reddit http://ift.tt/2iCKwoQ
reddit
Help with security cameras • r/security
My uncles doing a job for a man that wants security cameras that can record footage up to a week long but also give a live feed to his phone is...
PIA VPN Android App Can Be Crashed via Large Download [CVE-2017-15882]
http://ift.tt/2gJpnsd
Submitted October 26, 2017 at 06:55AM by nightwatchcyber
via reddit http://ift.tt/2zDRxsu
http://ift.tt/2gJpnsd
Submitted October 26, 2017 at 06:55AM by nightwatchcyber
via reddit http://ift.tt/2zDRxsu
Nightwatch Cybersecurity
Advisory: Private Internet Access (PIA) Android App Can Be Crashed via Large Download [CVE-2017-15882]
Summary The Android application provided by Private Internet Access (PIA) VPN service can be crashed by downloading a large file containing a list of current VPN servers. This can be exploited by a…
Whatsapp privacy questions
Whatsapp as marketed is using end-to-end encryption in message transfer.i.e. if bob sends message to alice. only in this world alice has capability to decrypt that message.If alice meanwhile losses her set of pre-keys (ephemeral private keys) then those messages should remain un-decryptable forever (considering current state of hardware)Question:1 How can facebook ad and "Facebook families of companies" can utilize this data ? re:http://ift.tt/2rSXj8M2 When Bob uses two client (phone and chrome application). In ideal world of private communication there can not be anyway that ephemeral private keys leaves the client.How can Bob see message that Bob sent to alice from phone and his chrome app ?2.1. Are they sharing ephemeral private keys across device ?2.2. Are they treating each client as another user and self sending message ?3 Apart from this what metadata of messages are available to FB and what are they using for ?
Submitted October 26, 2017 at 07:45AM by 1ECx
via reddit http://ift.tt/2gJq9pn
Whatsapp as marketed is using end-to-end encryption in message transfer.i.e. if bob sends message to alice. only in this world alice has capability to decrypt that message.If alice meanwhile losses her set of pre-keys (ephemeral private keys) then those messages should remain un-decryptable forever (considering current state of hardware)Question:1 How can facebook ad and "Facebook families of companies" can utilize this data ? re:http://ift.tt/2rSXj8M2 When Bob uses two client (phone and chrome application). In ideal world of private communication there can not be anyway that ephemeral private keys leaves the client.How can Bob see message that Bob sent to alice from phone and his chrome app ?2.1. Are they sharing ephemeral private keys across device ?2.2. Are they treating each client as another user and self sending message ?3 Apart from this what metadata of messages are available to FB and what are they using for ?
Submitted October 26, 2017 at 07:45AM by 1ECx
via reddit http://ift.tt/2gJq9pn
WhatsApp.com
WhatsApp FAQ - How do I choose not to share my account information with Facebook to improve my Facebook ads and products experiences?
How do I choose not to share my account information with Facebook to improve my Facebook ads and products experiences? - If you are an existing user, you can choose not to share your account information with Facebook to improve your Facebook ads and products…
Security Now 634 IoT Flash Botnets | TWiT.TV
http://ift.tt/2zNJXg1
Submitted October 26, 2017 at 06:24AM by dmp1ce
via reddit http://ift.tt/2zPHUb0
http://ift.tt/2zNJXg1
Submitted October 26, 2017 at 06:24AM by dmp1ce
via reddit http://ift.tt/2zPHUb0
TWiT.tv
Security Now 634 IoT Flash Botnets | TWiT.TV
This week we discuss some ROCA fallout specifics, an example of PRNG misuse, the Kaspersky Lab controversy, a DNS security initiative for Android, another compromised download occu…
Automatic Boom Barriers
http://ift.tt/2yLTZ3i
Submitted October 26, 2017 at 12:50PM by anjali874
via reddit http://ift.tt/2gJV8BH
http://ift.tt/2yLTZ3i
Submitted October 26, 2017 at 12:50PM by anjali874
via reddit http://ift.tt/2gJV8BH
Fleet Tracking Services Indore
http://ift.tt/2gJZ19O
Submitted October 26, 2017 at 03:13PM by Easysecure
via reddit http://ift.tt/2yNQAkK
http://ift.tt/2gJZ19O
Submitted October 26, 2017 at 03:13PM by Easysecure
via reddit http://ift.tt/2yNQAkK
www.easysecure.co.in
Easy Secure GPS tracking device | Vehicle Security Device | Home security | Personal security | Fleet Security | Indore,India
Easy Secure is one of the best company which provide anti theft and anti hacking devices and services in Indore, India. Easy Secure provides all type of tracking solutions like Bike Tracking,Car tracking,Mobile tracking,Fleet tracking,Personal tracking and…
SSL|TLS Server Session
http://ift.tt/2y5fBs5
Submitted October 26, 2017 at 02:54PM by MicheeLengronne
via reddit http://ift.tt/2zRl0Ag
http://ift.tt/2y5fBs5
Submitted October 26, 2017 at 02:54PM by MicheeLengronne
via reddit http://ift.tt/2zRl0Ag
Limawi
SSL|TLS Server Session
SSL/TLS Server session protocol with Let’s Encrypt.
Any certificates I can get to have advantage in a job interview?
Hey guys. I am really interested in Information Security, tried applying for Security Intelligence Investigator job in United Kingdom and failed. The interview went well, I answered 90% of their questions and still was declined because of not having enough experience in IT. The job is mainly with LogRhytm tool. Analyzing threats. My question would be, what can I do to show them I am really prepared for the job? Any beginner certificates I can get? The requirements for that job are not very high. Thank you
Submitted October 26, 2017 at 02:43PM by bestr0ng
via reddit http://ift.tt/2xqdCKw
Hey guys. I am really interested in Information Security, tried applying for Security Intelligence Investigator job in United Kingdom and failed. The interview went well, I answered 90% of their questions and still was declined because of not having enough experience in IT. The job is mainly with LogRhytm tool. Analyzing threats. My question would be, what can I do to show them I am really prepared for the job? Any beginner certificates I can get? The requirements for that job are not very high. Thank you
Submitted October 26, 2017 at 02:43PM by bestr0ng
via reddit http://ift.tt/2xqdCKw
reddit
Any certificates I can get to have advantage in a job... • r/security
Hey guys. I am really interested in Information Security, tried applying for Security Intelligence Investigator job in United Kingdom and failed....
Should You Consider AI To Look After Your Network?
http://ift.tt/2zFdqHT
Submitted October 26, 2017 at 05:25PM by Uminekoshi
via reddit http://ift.tt/2ham2zk
http://ift.tt/2zFdqHT
Submitted October 26, 2017 at 05:25PM by Uminekoshi
via reddit http://ift.tt/2ham2zk
Nehemiah Security
Should you consider AI to look after your network - Nehemiah Security
With companies like Nehemiah Security and Darktrace increasingly relying on Artificial Intelligence (AI) to protect networks, what happens when AI starts looking after the machines? In the world of Elon Musk, this puts us one step closer to the ‘singularity’…
DUHK Crypto Attack Recovers Encryption Keys, Exposes VPN Connections, More
http://ift.tt/2xj4c3e
Submitted October 26, 2017 at 04:39PM by Octogev
via reddit http://ift.tt/2zRQMgD
http://ift.tt/2xj4c3e
Submitted October 26, 2017 at 04:39PM by Octogev
via reddit http://ift.tt/2zRQMgD
BleepingComputer
DUHK Crypto Attack Recovers Encryption Keys, Exposes VPN Connections, More
After last week we had the KRACK and ROCA cryptographic attacks, this week has gotten off to a similarly "great" start with the publication of a new crypto attack known as DUHK (Don't Use Hard-coded Keys)
Security In 5: Episode 98 - Create A Culture Of Security To Be Successful
http://ift.tt/2i6tkEe
Submitted October 26, 2017 at 06:36PM by BinaryBlog
via reddit http://ift.tt/2gFV0zz
http://ift.tt/2i6tkEe
Submitted October 26, 2017 at 06:36PM by BinaryBlog
via reddit http://ift.tt/2gFV0zz
Slack SAML authentication bypass
http://ift.tt/2gL33i1
Submitted October 26, 2017 at 07:05PM by asanso
via reddit http://ift.tt/2yU3mh1
http://ift.tt/2gL33i1
Submitted October 26, 2017 at 07:05PM by asanso
via reddit http://ift.tt/2yU3mh1
Intothesymmetry
Slack SAML authentication bypass
tl;dr I found a severe issue in the Slack 's SAML implementation that allowed me to bypass the authentication. This has now been solved by...
United States Considers Making Revenge Hacking Legal
http://ift.tt/2zI0Asi
Submitted October 26, 2017 at 07:32PM by BCNGroup
via reddit http://ift.tt/2hbbX5y
http://ift.tt/2zI0Asi
Submitted October 26, 2017 at 07:32PM by BCNGroup
via reddit http://ift.tt/2hbbX5y
BCN
Resources | BCN
Guidance and insight into IT services, Cloud technology, Microsoft 365 Business Support and Cyber Security.
BugOps vs. DevOps
http://ift.tt/2hbRb5F
Submitted October 27, 2017 at 12:59AM by ju1i3k
via reddit http://ift.tt/2zJ0Ze2
http://ift.tt/2hbRb5F
Submitted October 27, 2017 at 12:59AM by ju1i3k
via reddit http://ift.tt/2zJ0Ze2
Cobalt.io
BugOps vs. DevOps
DevOps aims to release code quickly with confidence. Frequent, fast releases aren’t the hard part. The challenge is achieving justifiable…
A Bug in a popular maritime platform left ships exposed
http://ift.tt/2yS542q
Submitted October 27, 2017 at 12:27AM by Octogev
via reddit http://ift.tt/2yMPUfp
http://ift.tt/2yS542q
Submitted October 27, 2017 at 12:27AM by Octogev
via reddit http://ift.tt/2yMPUfp
WIRED
A Bug in a Popular Maritime Platform Left Ships Exposed
The AmosConnect 8 web platform has vulnerabilities that could allow data to be exposed—underscoring deeper problems with maritime security.
SELinux disabling exploit for Linux 4.12-4.13
http://ift.tt/2ljpSea
Submitted October 26, 2017 at 03:48PM by memorycorrupt
via reddit http://ift.tt/2z9GuuY
http://ift.tt/2ljpSea
Submitted October 26, 2017 at 03:48PM by memorycorrupt
via reddit http://ift.tt/2z9GuuY
reddit
SELinux disabling exploit for Linux 4.12-4.13 • r/netsec
1 points and 1 comments so far on reddit
Advanced mobile penetration testing with Brida – Slides HackInBo 2017 WE
http://ift.tt/2hbOAIX
Submitted October 26, 2017 at 02:18PM by 0xdea
via reddit http://ift.tt/2i7pfPY
http://ift.tt/2hbOAIX
Submitted October 26, 2017 at 02:18PM by 0xdea
via reddit http://ift.tt/2i7pfPY
reddit
Advanced mobile penetration testing with Brida – Slides... • r/netsec
1 points and 0 comments so far on reddit
BoundHook Attack Exploits Intel Skylake MPX Feature
http://ift.tt/2zkeYqN
Submitted October 27, 2017 at 01:32AM by rediii123
via reddit http://ift.tt/2yUFiun
http://ift.tt/2zkeYqN
Submitted October 27, 2017 at 01:32AM by rediii123
via reddit http://ift.tt/2yUFiun
Threatpost | The first stop for security news
BoundHook Attack Exploits Intel Skylake MPX Feature
A new attack method takes advantage a feature in Intel’s Skylake microprocessor allowing for post-intrusion application hooking and stealth manipulation of applications.