Fire Safety - Prevention, Protection & Extinction
http://ift.tt/2Aios6h
Submitted November 07, 2017 at 12:29PM by sdbworld
via reddit http://ift.tt/2hNHDhm
http://ift.tt/2Aios6h
Submitted November 07, 2017 at 12:29PM by sdbworld
via reddit http://ift.tt/2hNHDhm
SDB World
SDB World - Fire Safety - Prevention, Protection & Extinction
Fire Safety service intended to prevent the destruction caused by fire. It help to protect the people from the distractions.
Burp plugin to automatically fingerprint/evade web application firewalls using ML
http://ift.tt/2hKrWYA
Submitted November 07, 2017 at 01:38PM by pwnwaffe
via reddit http://ift.tt/2Af55Lk
http://ift.tt/2hKrWYA
Submitted November 07, 2017 at 01:38PM by pwnwaffe
via reddit http://ift.tt/2Af55Lk
Census-Labs
CENSUS | IT Security Works
This blog post serves as a followup to my summer B-Sides Athens 2017 talk ennoscriptd “Lightbulb framework – shedding light on the dark side of WAFs and Filters”.
Strange Attractors and TCP/IP Sequence Number Analysis - One Year Later (2001)
http://ift.tt/1vcKY7T
Submitted November 07, 2017 at 03:58PM by loselasso
via reddit http://ift.tt/2lZIDnd
http://ift.tt/1vcKY7T
Submitted November 07, 2017 at 03:58PM by loselasso
via reddit http://ift.tt/2lZIDnd
reddit
Strange Attractors and TCP/IP Sequence Number Analysis... • r/netsec
1 points and 0 comments so far on reddit
Phishing catcher: catch phishing domains in real time with certstream
http://ift.tt/2Aq7MdW
Submitted November 07, 2017 at 05:01PM by actually_NOLAN
via reddit http://ift.tt/2ArvMh1
http://ift.tt/2Aq7MdW
Submitted November 07, 2017 at 05:01PM by actually_NOLAN
via reddit http://ift.tt/2ArvMh1
GitHub
x0rz/phishing_catcher
phishing_catcher - Phishing catcher using Certstream
Cybercriminals Infiltrating E-Mail Networks to Divert Large Customer Payments
http://ift.tt/2iBluT8
Submitted November 07, 2017 at 06:19PM by volci
via reddit http://ift.tt/2ApTn1w
http://ift.tt/2iBluT8
Submitted November 07, 2017 at 06:19PM by volci
via reddit http://ift.tt/2ApTn1w
reddit
Cybercriminals Infiltrating E-Mail Networks to Divert... • r/security
2 points and 0 comments so far on reddit
CyberConnect 2017 - YouTube
https://www.youtube.com/playlist?list=PLenh213llmcZYmMZYE_x5W-j2WWfo6N44
Submitted November 07, 2017 at 07:16PM by WinglessIndependence
via reddit http://ift.tt/2zpM63t
https://www.youtube.com/playlist?list=PLenh213llmcZYmMZYE_x5W-j2WWfo6N44
Submitted November 07, 2017 at 07:16PM by WinglessIndependence
via reddit http://ift.tt/2zpM63t
YouTube
CyberConnect 2017 - YouTube
Security In 5: Episode 106 - OWASP Top 10 - A4 - Insecure Direct Object References
http://ift.tt/2hiD9Th
Submitted November 07, 2017 at 07:41PM by BinaryBlog
via reddit http://ift.tt/2zjAijM
http://ift.tt/2hiD9Th
Submitted November 07, 2017 at 07:41PM by BinaryBlog
via reddit http://ift.tt/2zjAijM
Libsyn
Security In Five Podcast: Episode 106 - OWASP Top 10 - A4 - Insecure Direct Object References
We continue with the OWASP Top 10 series and next up is number 4, Insecure Direct Object References. This episode gives a high overview of this control, how attackers exploit it and how you can work to prevent this from happening in your applications. OWASP…
A Mature Security Program at Any Size
http://ift.tt/2hbPDIu
Submitted November 07, 2017 at 08:14PM by HockeyInJune
via reddit http://ift.tt/2hQc2fb
http://ift.tt/2hbPDIu
Submitted November 07, 2017 at 08:14PM by HockeyInJune
via reddit http://ift.tt/2hQc2fb
Medium
A Mature Security Program at Any Size
Security processes your program must absolutely have. How to implement them correctly and how to scale them as your team grows.
Mobile Devices and Bootkits
http://ift.tt/2zpqN05
Submitted November 07, 2017 at 08:26PM by Mi3Security
via reddit http://ift.tt/2ye6JfP
http://ift.tt/2zpqN05
Submitted November 07, 2017 at 08:26PM by Mi3Security
via reddit http://ift.tt/2ye6JfP
Mi3 Security
Mobile Devices and Bootkits
Boot-kits are extremely difficult to remove because reinstalling the OS on your device will not remove the infection. Similarly, boot-kits are extremely difficult to detect because they reside outside the normal filesystem and can often hide from detection.
Built-in Keylogger Found in MantisTek GK2 Keyboards—Sends Data to China
http://ift.tt/2yesgoH
Submitted November 07, 2017 at 08:38PM by blackout-314
via reddit http://ift.tt/2hPkmvB
http://ift.tt/2yesgoH
Submitted November 07, 2017 at 08:38PM by blackout-314
via reddit http://ift.tt/2hPkmvB
The Hacker News
Built-in Keylogger Found in MantisTek GK2 Keyboards—Sends Data to China
Mantistek GK2 mechanical gaming keyboard have a built-in keylogger that silently records everything you type and sends data to a Chinese server.
AD Honey Accounts
http://ift.tt/2hhgzdu
Submitted November 07, 2017 at 09:12PM by ok_bye_now_
via reddit http://ift.tt/2hR13Cl
http://ift.tt/2hhgzdu
Submitted November 07, 2017 at 09:12PM by ok_bye_now_
via reddit http://ift.tt/2hR13Cl
JP
Honey Accounts
I recently saw a tweet mentioning the use of an AD account with the password in the denoscription attribute and logon hours set to none. I can’t find that tweet anymore so I apologize for the lack of…
Introducing Mentalist, a new way to graphically create custom wordlists and cracker rules.
http://ift.tt/2hPVrYR
Submitted November 07, 2017 at 09:02PM by sc0tfree
via reddit http://ift.tt/2Ahqjbt
http://ift.tt/2hPVrYR
Submitted November 07, 2017 at 09:02PM by sc0tfree
via reddit http://ift.tt/2Ahqjbt
GitHub
sc0tfree/mentalist
mentalist - Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can output the full wordlist as well as rules compatible ...
25% of employees intentionally leak confidential company data
http://ift.tt/2j7QYUI
Submitted November 07, 2017 at 08:56PM by nzwasp
via reddit http://ift.tt/2iBKpWJ
http://ift.tt/2j7QYUI
Submitted November 07, 2017 at 08:56PM by nzwasp
via reddit http://ift.tt/2iBKpWJ
Security Breach Online
25% of employees intentionally leak confidential company data - Security Breach Online
One in four UK employees have intentionally leaked confidential business information to individuals outside their organisations, surprising new research has revealed. In a survey of 2,000 UK workers, data privacy and risk management company Egress Software…
Buried deep inside your computer's Intel chip is the MINIX operating system. It also has a software stack that includes networking and a web server. It's slow, hard to get at, and insecure as insecure can be.
http://ift.tt/2zjWMB2
Submitted November 07, 2017 at 09:37PM by yourbasicgeek
via reddit http://ift.tt/2zqRIbN
http://ift.tt/2zjWMB2
Submitted November 07, 2017 at 09:37PM by yourbasicgeek
via reddit http://ift.tt/2zqRIbN
ZDNet
MINIX: Intel's hidden in-chip operating system | ZDNet
Buried deep inside your computer's Intel chip is the MINIX operating system and a software stack, which includes networking and a web server. It's slow, hard to get at, and insecure as insecure can be.
Russia: Skilled Political Warfare Adversary - Security Boulevard
http://ift.tt/2lZU8LB
Submitted November 07, 2017 at 09:30PM by SecurityTrust
via reddit http://ift.tt/2yf9jlq
http://ift.tt/2lZU8LB
Submitted November 07, 2017 at 09:30PM by SecurityTrust
via reddit http://ift.tt/2yf9jlq
Security Boulevard
Russia: Skilled Political Warfare Adversary - Security Boulevard
Russian active measures are desigend to adjust perception, foment discord and inflame animus among targeted groups
Cisco Launches $10 Million Global Cybersecurity Scholarship to Increase Talent Pool; Introduces New and Updated Certifications
http://ift.tt/2cq4MDE
Submitted November 07, 2017 at 10:46PM by debaakram2000
via reddit http://ift.tt/2zoCqUU
http://ift.tt/2cq4MDE
Submitted November 07, 2017 at 10:46PM by debaakram2000
via reddit http://ift.tt/2zoCqUU
Exploiting CVE-2017-5123
http://ift.tt/2hjHohh
Submitted November 07, 2017 at 10:12PM by memorycorrupt
via reddit http://ift.tt/2ye2Bw8
http://ift.tt/2hjHohh
Submitted November 07, 2017 at 10:12PM by memorycorrupt
via reddit http://ift.tt/2ye2Bw8
Reverse Engineering Mac OS X
Exploiting CVE-2017-5123
This is a guest post by a young and talented Portuguese exploiter, Federico Bento. He won this year’s Pwnie for Epic Achievement exploiting TIOCSTI ioctl.
Days ago he posted a video …
Days ago he posted a video …
Architecture Agnostic Function Detection in Binaries with Binary Ninja
http://ift.tt/2h7Dmou
Submitted November 07, 2017 at 11:39PM by plaforce
via reddit http://ift.tt/2zoPfkg
http://ift.tt/2h7Dmou
Submitted November 07, 2017 at 11:39PM by plaforce
via reddit http://ift.tt/2zoPfkg
binary.ninja
Binary Ninja > Architecture Agnostic Function Detection in Binaries
Binary Ninja : A Reverse Engineering Platform
Accidental $150 Million Hack on Ethereum Network
http://ift.tt/2ArIoES
Submitted November 08, 2017 at 01:22AM by masonicRed
via reddit http://ift.tt/2zlROEc
http://ift.tt/2ArIoES
Submitted November 08, 2017 at 01:22AM by masonicRed
via reddit http://ift.tt/2zlROEc
Medium
$150 Million Locked On the Ethereum Network — How to Protect Yourself
Complexity Is the Enemy of Security
Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack
http://ift.tt/2hky78v
Submitted November 08, 2017 at 01:43AM by comradecookie22
via reddit http://ift.tt/2zEXCJx
http://ift.tt/2hky78v
Submitted November 08, 2017 at 01:43AM by comradecookie22
via reddit http://ift.tt/2zEXCJx
McAfee Blogs
Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack
While monitoring activities around APT28, we identified a malicious Word document that leverages the Microsoft Office DDE technique.
Looking for security camera recommendations?
I don't know if this is the right sub, but I'm looking into getting security cameras for outside the house. I encountered a "concerned citizen" who knocked and asked about my home security. Essentially, they were casing my house. I don't live in the greatest neighborhood?I've looked into Amazon but get confused with what I might want. There's the option for wireless… but that's dependent on internet (how reliable is it?) There's one attached to hard drive, but that means running long wires… isn't it? I also saw someone able to "check in" and view their security cameras on their phone, which is a nice feature? but can the feed be hacked (im a tinfoil sombrero Internet of things kinda person)Anyone have a recommendation? My budget is for $150, and from Amazon would be great.
Submitted November 08, 2017 at 06:36AM by Hickorywhat
via reddit http://ift.tt/2hSx5hk
I don't know if this is the right sub, but I'm looking into getting security cameras for outside the house. I encountered a "concerned citizen" who knocked and asked about my home security. Essentially, they were casing my house. I don't live in the greatest neighborhood?I've looked into Amazon but get confused with what I might want. There's the option for wireless… but that's dependent on internet (how reliable is it?) There's one attached to hard drive, but that means running long wires… isn't it? I also saw someone able to "check in" and view their security cameras on their phone, which is a nice feature? but can the feed be hacked (im a tinfoil sombrero Internet of things kinda person)Anyone have a recommendation? My budget is for $150, and from Amazon would be great.
Submitted November 08, 2017 at 06:36AM by Hickorywhat
via reddit http://ift.tt/2hSx5hk
reddit
Looking for security camera recommendations? • r/security
I don't know if this is the right sub, but I'm looking into getting security cameras for outside the house. I encountered a "concerned citizen"...