Firefox takes a bite out of the canvas ‘super cookie’
http://ift.tt/2zgIIsx
Submitted October 31, 2017 at 12:39PM by wfpoulet
via reddit http://ift.tt/2hrk3al
http://ift.tt/2zgIIsx
Submitted October 31, 2017 at 12:39PM by wfpoulet
via reddit http://ift.tt/2hrk3al
Naked Security
Firefox takes a bite out of the canvas ‘super cookie’
Finally, one of the major browsers is doing something about canvas fingerprinting
Cybersecurity: Internet security 101: Six ways hackers can attack you and how to stay safe
http://ift.tt/2gUatj2
Submitted October 31, 2017 at 01:21PM by davidpatter
via reddit http://ift.tt/2A29Etf
http://ift.tt/2gUatj2
Submitted October 31, 2017 at 01:21PM by davidpatter
via reddit http://ift.tt/2A29Etf
The Economic Times
Internet security 101: Six ways hackers can attack you and how to stay safe
While an increasingly connected world makes our lives easier, it also poses great risk as we expose our personal data to cyber criminals or hackers.
A Finger Vibration-based Security System "VibWrite" can work on any Solid Surface
Rutgers engineers have created VibWrite, a smart access system that senses finger vibrations to verify users. The low-cost security system could eventually be used to gain access to homes, apartment buildings, cars, appliances – anything with a solid surface.Everyone’s finger bone structure is unique, and their fingers apply different pressures on surfaces, so sensors that detect subtle physiological and behavioral differences can identify and authenticate a person.The market for smart security access systems is expected to grow rapidly, reaching nearly $10 billion by 2022. Today’s smart security access systems mainly rely on traditional techniques that use intercoms, cameras, cards or fingerprints to authenticate users. But these systems require costly equipment, complex hardware installation and diverse maintenance needs.The goal of VibWrite is to allow user verification when fingers touch any solid surface. VibWrite integrates passcode, behavioral and physiological characteristics. It builds on a touch-sensing technique by using vibration signals. It’s different than traditional, password-based approaches, which validate passwords instead of legitimate users, as well as behavioral biometrics-based solutions, which typically involve touch screens, fingerprint readers or other costly hardware and lead to privacy concerns and “smudge attacks” that trace oily residues on surfaces from fingers.Smart access systems that use fingerprinting and iris-recognition are very secure, but they’re probably more than 10 times as expensive as this new VibWrite system.
Submitted October 31, 2017 at 02:55PM by karthikaag
via reddit http://ift.tt/2zVpp46
Rutgers engineers have created VibWrite, a smart access system that senses finger vibrations to verify users. The low-cost security system could eventually be used to gain access to homes, apartment buildings, cars, appliances – anything with a solid surface.Everyone’s finger bone structure is unique, and their fingers apply different pressures on surfaces, so sensors that detect subtle physiological and behavioral differences can identify and authenticate a person.The market for smart security access systems is expected to grow rapidly, reaching nearly $10 billion by 2022. Today’s smart security access systems mainly rely on traditional techniques that use intercoms, cameras, cards or fingerprints to authenticate users. But these systems require costly equipment, complex hardware installation and diverse maintenance needs.The goal of VibWrite is to allow user verification when fingers touch any solid surface. VibWrite integrates passcode, behavioral and physiological characteristics. It builds on a touch-sensing technique by using vibration signals. It’s different than traditional, password-based approaches, which validate passwords instead of legitimate users, as well as behavioral biometrics-based solutions, which typically involve touch screens, fingerprint readers or other costly hardware and lead to privacy concerns and “smudge attacks” that trace oily residues on surfaces from fingers.Smart access systems that use fingerprinting and iris-recognition are very secure, but they’re probably more than 10 times as expensive as this new VibWrite system.
Submitted October 31, 2017 at 02:55PM by karthikaag
via reddit http://ift.tt/2zVpp46
YouTube
Finger Vibration-based Security System "VibWrite" can work on any Solid Surface
Rutgers engineers have created VibWrite, a smart access system that senses finger vibrations to verify users. The low-cost security system could eventually b...
PDF - ACIDRain: Concurrency-Related Attacks on Database-Backed Web Applications
http://ift.tt/2nmBJar
Submitted October 31, 2017 at 03:10PM by disclosure5
via reddit http://ift.tt/2z4CGKN
http://ift.tt/2nmBJar
Submitted October 31, 2017 at 03:10PM by disclosure5
via reddit http://ift.tt/2z4CGKN
Application Threat Modeling using STRIDE and DREAD
http://ift.tt/2z2vGfq
Submitted October 31, 2017 at 04:23PM by InformationSecurity
via reddit http://ift.tt/2z1gr6a
http://ift.tt/2z2vGfq
Submitted October 31, 2017 at 04:23PM by InformationSecurity
via reddit http://ift.tt/2z1gr6a
Haider Mahmood Infosec Blog
Application Threat Modeling using DREAD and STRIDE
Application Threat Modeling using DREAD and STRIDE, Risk assessment, Application Risk Modeling, risk Modeling, Application risk assessment methodology
Application Threat Modeling using DREAD and STRIDE
http://ift.tt/2z2vGfq
Submitted October 31, 2017 at 04:20PM by InformationSecurity
via reddit http://ift.tt/2hpMO71
http://ift.tt/2z2vGfq
Submitted October 31, 2017 at 04:20PM by InformationSecurity
via reddit http://ift.tt/2hpMO71
Haider Mahmood Infosec Blog
Application Threat Modeling using DREAD and STRIDE
Application Threat Modeling using DREAD and STRIDE, Risk assessment, Application Risk Modeling, risk Modeling, Application risk assessment methodology
Chrome Plugin that automatically checks software vulnerabilities in browsed websites
http://ift.tt/2yPWsaM
Submitted October 31, 2017 at 03:57PM by videns
via reddit http://ift.tt/2z4uRoh
http://ift.tt/2yPWsaM
Submitted October 31, 2017 at 03:57PM by videns
via reddit http://ift.tt/2z4uRoh
Google
Vulners Web Scanner
Tiny vulnerability scanner based on vulners.com vulnerability database. Scan websites while you surf internet!
What Is The TOR Network And How Does It Work-[Windows Setup]
http://ift.tt/2lx9l6v
Submitted October 31, 2017 at 05:33PM by kholio11
via reddit http://ift.tt/2yhxnse
http://ift.tt/2lx9l6v
Submitted October 31, 2017 at 05:33PM by kholio11
via reddit http://ift.tt/2yhxnse
Install Kali Linux [2017.2] On VMware Workstation
http://ift.tt/2z08iyU
Submitted October 31, 2017 at 05:19PM by kholio11
via reddit http://ift.tt/2yhxpQS
http://ift.tt/2z08iyU
Submitted October 31, 2017 at 05:19PM by kholio11
via reddit http://ift.tt/2yhxpQS
A Study of RATs - A comprehensive timeline covering 29 years and 152 different remote access Trojans
http://ift.tt/2zNz2lt
Submitted October 31, 2017 at 05:40PM by speckz
via reddit http://ift.tt/2zlIBvN
http://ift.tt/2zNz2lt
Submitted October 31, 2017 at 05:40PM by speckz
via reddit http://ift.tt/2zlIBvN
Veronica Valeros
A Study of RATs
In early 2017 I started a personal research on Remote Access Trojans (RATs). The goal of the research is to discover possible trends, similarities and other hidden aspects among RATs observed during the last 30 years.
Adversary/Social Engineering Tactics To Watch Out For
http://ift.tt/2z0j1Mb
Submitted October 31, 2017 at 05:37PM by Uminekoshi
via reddit http://ift.tt/2iMAKAj
http://ift.tt/2z0j1Mb
Submitted October 31, 2017 at 05:37PM by Uminekoshi
via reddit http://ift.tt/2iMAKAj
Nehemiah Security
Wake up Cyber World: Adversary Tactics to Watch Out For - Nehemiah Security
What does an adversary know about your company before they initiate an attack? Better yet, WHO have they contacted within your company before they initiated an attack? The answer may surprise you. The reconnaissance performed by an adversary has always been…
Security In 5: Episode 101 - Email Sucks, Stop Using It, Communicate More Effectively
http://ift.tt/2A2Xhx1
Submitted October 31, 2017 at 06:36PM by BinaryBlog
via reddit http://ift.tt/2xElhVB
http://ift.tt/2A2Xhx1
Submitted October 31, 2017 at 06:36PM by BinaryBlog
via reddit http://ift.tt/2xElhVB
Libsyn
Security In Five Podcast: Episode 101 - Email Sucks, Stop Using It, Communicate More Effectively
Email needs to go, it's a security nightmare, it's a pain to manage and it has become an inefficient method of communication. Look at your inbox, how much time do you spend 'cleaning it out', messages skipped over or skimmed, and time going back and forth…
Phish in a Barrel: Hunting and Analyzing Phishing Kits at Scale
http://ift.tt/2xFcPWa
Submitted October 31, 2017 at 07:12PM by jwcrux
via reddit http://ift.tt/2lyoQv1
http://ift.tt/2xFcPWa
Submitted October 31, 2017 at 07:12PM by jwcrux
via reddit http://ift.tt/2lyoQv1
Note to the CISO: Part 3 – The Future of Application Security
http://ift.tt/2zlBinU
Submitted October 31, 2017 at 07:12PM by Mi3Security
via reddit http://ift.tt/2iOvHPS
http://ift.tt/2zlBinU
Submitted October 31, 2017 at 07:12PM by Mi3Security
via reddit http://ift.tt/2iOvHPS
Mi3 Security
Note to the CISO: Part 3 – The Future of Application Security
In Part 3 of our series on how the application security landscape is evolving, we look further at Contextual Application Security Testing and the future of AppSec.
State-sponsored cyber attacks against Canada successful once a week
http://ift.tt/2hqqYQX
Submitted October 31, 2017 at 08:49PM by nzwasp
via reddit http://ift.tt/2zT9Ji8
http://ift.tt/2hqqYQX
Submitted October 31, 2017 at 08:49PM by nzwasp
via reddit http://ift.tt/2zT9Ji8
Security Breach Online
State-sponsored cyber attacks against Canada successful once a week - Security Breach Online
The Canadian government’s PC systems have been hit by state-supported cyber attacks around 50 times each week — and no less than one of them generally succeeded. That affirmation from the Communications Security Establishment (CSE), the secretive agency accused…
If all Bitcoin transactions are "open", why would ransomware actors want payment in Bitcoin?
Maybe I'm not grokking some part of how cryptocurrencies work, but since all transactions can be verified by anyone using the cryptocurrency in question (http://ift.tt/2gXwpK8), wouldn't that mean that the ransomware creators would be "known" - or, at least, any time those cryptocoins were used in the future, it would be known they came through a bad actor's wallet?
Submitted October 31, 2017 at 09:14PM by volci
via reddit http://ift.tt/2zlBYJM
Maybe I'm not grokking some part of how cryptocurrencies work, but since all transactions can be verified by anyone using the cryptocurrency in question (http://ift.tt/2gXwpK8), wouldn't that mean that the ransomware creators would be "known" - or, at least, any time those cryptocoins were used in the future, it would be known they came through a bad actor's wallet?
Submitted October 31, 2017 at 09:14PM by volci
via reddit http://ift.tt/2zlBYJM
Wikipedia
Bitcoin
Bitcoin is a worldwide cryptocurrency and digital payment system called the first decentralized digital currency, as the system works without a central repository or single administrator. It was invented by an unknown person or group of people under the name…
Data Security 101
I am putting together a Data Security 101 class for my company. Are there any obvious things that ya'll would suggest be discussed? If every member of my company could know 3 things what should they know about protecting our sensitive data?
Submitted October 31, 2017 at 09:00PM by Barnaby_Jonezzz
via reddit http://ift.tt/2z0X5Rq
I am putting together a Data Security 101 class for my company. Are there any obvious things that ya'll would suggest be discussed? If every member of my company could know 3 things what should they know about protecting our sensitive data?
Submitted October 31, 2017 at 09:00PM by Barnaby_Jonezzz
via reddit http://ift.tt/2z0X5Rq
reddit
Data Security 101 • r/security
I am putting together a Data Security 101 class for my company. Are there any obvious things that ya'll would suggest be discussed? If every...
Stop SSH Attacks By Eliminating SSH Keys
http://ift.tt/2A318u3
Submitted October 31, 2017 at 10:48PM by misterkwon
via reddit http://ift.tt/2gZZO6G
http://ift.tt/2A318u3
Submitted October 31, 2017 at 10:48PM by misterkwon
via reddit http://ift.tt/2gZZO6G
ScaleFT
ScaleFT - Stop SSH Attacks By Eliminating SSH Keys
Lost, stolen, or misused SSH keys have long been a known threat vector. We have a crazy thought here at ScaleFT – what if we got rid of them entirely? It's our belief that static credentials are a thing of the past, representing the failed perimeter model…
Open Source Cloud Storage Firm Finds Unsettling Number of Unpatched Instances Online
http://ift.tt/2zjFkgs
Submitted October 31, 2017 at 10:15PM by brideoflinux
via reddit http://ift.tt/2A1c3Ep
http://ift.tt/2zjFkgs
Submitted October 31, 2017 at 10:15PM by brideoflinux
via reddit http://ift.tt/2A1c3Ep
Data Center Knowledge
Open Source Cloud Storage Firm Finds Unsettling Number of Unpatched Instances Online
The open source file sharing project scanned the web to find numerous vulnerable and unpatched instances of its software on critical websites.
"Lessons in Building your own Awareness Community - At the EU #SecAwareSummit"
http://ift.tt/2gZENZM
Submitted October 31, 2017 at 11:13PM by volci
via reddit http://ift.tt/2z2ubQw
http://ift.tt/2gZENZM
Submitted October 31, 2017 at 11:13PM by volci
via reddit http://ift.tt/2z2ubQw
securingthehuman.sans.org
Security Awareness Blog | Lessons in Building your own Awareness Community - At the EU #SecAwareSummit
Security Awareness Blog blog pertaining to Lessons in Building your own Awareness Community - At the EU #SecAwareSummit
Putin has started aiming his cyberweapons against individuals
http://ift.tt/2z1iWr9
Submitted October 31, 2017 at 11:05PM by NISMO1968
via reddit http://ift.tt/2z2uieU
http://ift.tt/2z1iWr9
Submitted October 31, 2017 at 11:05PM by NISMO1968
via reddit http://ift.tt/2z2uieU
Newsweek
Putin has started aiming his cyberweapons against individuals
The Ukrainian government has been attacked by computer viruses that target particular individuals.