A Mobile Malware can Root Mobile Device - WebSecurity
http://ift.tt/2iZ4wOM
Submitted November 16, 2017 at 07:26PM by katebrownwell
via reddit http://ift.tt/2zNdHtA
http://ift.tt/2iZ4wOM
Submitted November 16, 2017 at 07:26PM by katebrownwell
via reddit http://ift.tt/2zNdHtA
Gotowebsecurity
A Mobile Malware can Root Mobile Device - WebSecurity
A new mobile malware can root mobile device. Sounds dangerous but yet it's true. You know how rooting can cause to your device right? find out how.
METRUMCOIN security principles
METRUMCOIN aims at securing every piece of data and every network participant. It can be succeed only when every part of the system is totally safe from interference. When everything is transparent and clear, but at the same time protected. There are several layers of METRUMCOIN security system: • Transport layer is based on HTTPS. It ensures the encryption of the data flow between client and server. • Storage layer is based on secured microservices and blockchain. • Business Logic related security is based on a unique Business Process engine and Language security model. Only providing security we can build a successful business model, where every network participant is confident that nothing can disturb his/ her way of doing business and no one lay a hand on the income. https://metrumcoin.com/
Submitted November 16, 2017 at 09:17PM by Metrumcoin
via reddit http://ift.tt/2jz0tNj
METRUMCOIN aims at securing every piece of data and every network participant. It can be succeed only when every part of the system is totally safe from interference. When everything is transparent and clear, but at the same time protected. There are several layers of METRUMCOIN security system: • Transport layer is based on HTTPS. It ensures the encryption of the data flow between client and server. • Storage layer is based on secured microservices and blockchain. • Business Logic related security is based on a unique Business Process engine and Language security model. Only providing security we can build a successful business model, where every network participant is confident that nothing can disturb his/ her way of doing business and no one lay a hand on the income. https://metrumcoin.com/
Submitted November 16, 2017 at 09:17PM by Metrumcoin
via reddit http://ift.tt/2jz0tNj
SpookFlare: Stay In Shadows
http://ift.tt/2ASJQ3j?
Submitted November 16, 2017 at 09:33PM by hlldz
via reddit http://ift.tt/2hFkMYz
http://ift.tt/2ASJQ3j?
Submitted November 16, 2017 at 09:33PM by hlldz
via reddit http://ift.tt/2hFkMYz
with knowledge comes power
SpookFlare: Stay In Shadows
Windows is still the most popular end-user operating system and security products are mostly installed on Windows operating systems. Desktop operating system market share graph is given below from Net
CarolinaCon's CFP is now open!
http://ift.tt/2ATzpMz
Submitted November 16, 2017 at 09:12PM by Curbob
via reddit http://ift.tt/2zHnhk7
http://ift.tt/2ATzpMz
Submitted November 16, 2017 at 09:12PM by Curbob
via reddit http://ift.tt/2zHnhk7
reddit
CarolinaCon's CFP is now open! • r/netsec
1 points and 0 comments so far on reddit
Dangers of the Decompiler, A Sampling of Anti-Decompilation Techniques
http://ift.tt/2z88SOA
Submitted November 16, 2017 at 08:51PM by gaasedelen
via reddit http://ift.tt/2huWIE3
http://ift.tt/2z88SOA
Submitted November 16, 2017 at 08:51PM by gaasedelen
via reddit http://ift.tt/2huWIE3
Ret2 Systems Blog
Dangers of the Decompiler
Traditional (assembly level) reverse engineering of software is a tedious process that has been made far more accessible by modern day decompilers. Operating...
Canada's 'super secret spy agency' is releasing a malware-fighting tool to the public
http://ift.tt/2yzglnK
Submitted November 16, 2017 at 10:15PM by volci
via reddit http://ift.tt/2mC21qX
http://ift.tt/2yzglnK
Submitted November 16, 2017 at 10:15PM by volci
via reddit http://ift.tt/2mC21qX
CBC News
Canada's 'super secret spy agency' is releasing a malware-fighting tool to the public
The Communications Security Establishment acknowledges it needs to do a better job of explaining to Canadians what it does.
I know this is just a Showerthought and joking (hopefully) going on, but still some eyebrow raising practices going on...
http://ift.tt/2huO3Sb
Submitted November 16, 2017 at 10:12PM by icemanJL
via reddit http://ift.tt/2yOIDIU
http://ift.tt/2huO3Sb
Submitted November 16, 2017 at 10:12PM by icemanJL
via reddit http://ift.tt/2yOIDIU
reddit
In the old days taping your password to your... • r/Showerthoughts
38523 points and 1752 comments so far on reddit
What do Cybersecurity and Fashion have in common? Put on your slippers!
http://ift.tt/2jwVoFc
Submitted November 16, 2017 at 09:28PM by Uminekoshi
via reddit http://ift.tt/2AL8jqk
http://ift.tt/2jwVoFc
Submitted November 16, 2017 at 09:28PM by Uminekoshi
via reddit http://ift.tt/2AL8jqk
Nehemiah Security
The Cyber World Is Big—Put Your Slippers On, Folks! - Nehemiah Security
I fancy myself the Elle Woods of cyber. Before cyber, I worked in the fashion industry as a personal stylist. My job was to guide clients through the daunting and foreign world of clothing, often building out their wardrobes from the ground up. First two…
Remote Code Execution in Chrome OS ($100k Bounty) - Writeup
http://ift.tt/2zGhR9j
Submitted November 16, 2017 at 10:46PM by jwcrux
via reddit http://ift.tt/2zGOrro
http://ift.tt/2zGhR9j
Submitted November 16, 2017 at 10:46PM by jwcrux
via reddit http://ift.tt/2zGOrro
reddit
Remote Code Execution in Chrome OS ($100k Bounty) - Writeup • r/netsec
2 points and 2 comments so far on reddit
Pentagon's hacker disclosure program defangs 2,800 security flaws
http://ift.tt/2zUDtit
Submitted November 16, 2017 at 10:53PM by GemmaJ123
via reddit http://ift.tt/2A4Meqj
http://ift.tt/2zUDtit
Submitted November 16, 2017 at 10:53PM by GemmaJ123
via reddit http://ift.tt/2A4Meqj
TheHill
Pentagon's hacker disclosure program defangs 2,800 security flaws
Nearly a year after a rule change allowed good Samaritan hackers to notify the Department of Defense (DOD) about cybersecurity glitches that needed fixing, the Pentagon has mitigated more than 2,800 security problems.
Probable passwords and/or password components, as scoured from dumped data breaches
http://ift.tt/2pwBjjY
Submitted November 16, 2017 at 11:15PM by volci
via reddit http://ift.tt/2yQDqQv
http://ift.tt/2pwBjjY
Submitted November 16, 2017 at 11:15PM by volci
via reddit http://ift.tt/2yQDqQv
GitHub
berzerk0/Probable-Wordlists
Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren't popular! - berzerk0/Probable-Wordlists
17-Year-Old MS Office Flaw Lets Hackers Install Malware Without User Interaction
http://ift.tt/2z8RrgU
Submitted November 17, 2017 at 12:39AM by somemuslim
via reddit http://ift.tt/2mBoBQu
http://ift.tt/2z8RrgU
Submitted November 17, 2017 at 12:39AM by somemuslim
via reddit http://ift.tt/2mBoBQu
The Hacker News
17-Year-Old MS Office Flaw Lets Hackers Install Malware Without User Interaction
Microsoft Office Remote Code Execution Vulnerability (CVE-2017-11882) Allows Hackers to Install Malware On Windows Computers Without User Interaction
Github introduces automatic dependency security alerting
http://ift.tt/2yMIDZJ
Submitted November 17, 2017 at 12:47AM by csanders_
via reddit http://ift.tt/2mymfld
http://ift.tt/2yMIDZJ
Submitted November 17, 2017 at 12:47AM by csanders_
via reddit http://ift.tt/2mymfld
GitHub
Introducing security alerts on GitHub
Last month, we made it easier for you to keep track of the projects your code depends on with the dependency graph, currently supported in Javanoscript and Ruby. Today, for the over 75 percent of Git...
The State of Open Source Security 2017
http://ift.tt/2z8cK25
Submitted November 17, 2017 at 01:06AM by tkadlec
via reddit http://ift.tt/2z9J6JD
http://ift.tt/2z8cK25
Submitted November 17, 2017 at 01:06AM by tkadlec
via reddit http://ift.tt/2z9J6JD
reddit
The State of Open Source Security 2017 • r/security
2 points and 0 comments so far on reddit
These maps show where popular websites have been banned around the world (x-post /r/programming)
http://ift.tt/2zlr9or
Submitted November 17, 2017 at 01:02AM by halfcentennial1964
via reddit http://ift.tt/2mCE4zN
http://ift.tt/2zlr9or
Submitted November 17, 2017 at 01:02AM by halfcentennial1964
via reddit http://ift.tt/2mCE4zN
visual.ly
Where Popular Websites are Banned Across the World
Which countries have blocked popular sites like Facebook, YouTube, Wikipedia, and Twitter? These websites are vital for our day-to-day communication a
Enterprise password management: A field guide
http://ift.tt/2iZGFP9
Submitted November 17, 2017 at 01:36AM by yourbasicgeek
via reddit http://ift.tt/2zN9V3q
http://ift.tt/2iZGFP9
Submitted November 17, 2017 at 01:36AM by yourbasicgeek
via reddit http://ift.tt/2zN9V3q
HPE
Enterprise password management: A field guide | HPE
Simplifying complex passwords for users encourages their use @Enterprisenxt
How to protect against this ?
http://ift.tt/2A49zZl
Submitted November 17, 2017 at 02:08AM by whatup10
via reddit http://ift.tt/2z9cDTK
http://ift.tt/2A49zZl
Submitted November 17, 2017 at 02:08AM by whatup10
via reddit http://ift.tt/2z9cDTK
WIRED
You're Browsing a Website. These Companies May Be Recording Your Every Move.
Behind many consumer websites, software companies track users' moves, potentially exposing personal information such as medical conditions or prenoscription-drug use.
Sandboxing question
Currently I have a Win7 machine that runs in virtualbox. When I want to analyze an email attachemnt, or other suspect items, I save them to my desktop (host OS), load the items as an ISO and mount the ISO to the VM, which has all it's network adapters disabled. My concern lies with how I handle the file on the host OS. Is there a safer way to do this? I would log into my email in the browser of the VM, but I don't want to touch any corporate info on that virtual machine, for obvious reasons.Am I doing this right?
Submitted November 17, 2017 at 03:41AM by hiskid
via reddit http://ift.tt/2zPs6Fy
Currently I have a Win7 machine that runs in virtualbox. When I want to analyze an email attachemnt, or other suspect items, I save them to my desktop (host OS), load the items as an ISO and mount the ISO to the VM, which has all it's network adapters disabled. My concern lies with how I handle the file on the host OS. Is there a safer way to do this? I would log into my email in the browser of the VM, but I don't want to touch any corporate info on that virtual machine, for obvious reasons.Am I doing this right?
Submitted November 17, 2017 at 03:41AM by hiskid
via reddit http://ift.tt/2zPs6Fy
reddit
Sandboxing question • r/security
Currently I have a Win7 machine that runs in virtualbox. When I want to analyze an email attachemnt, or other suspect items, I save them to my...
Kaspersky: Yes, we obtained NSA secrets. No, we didnât help steal them
http://ift.tt/2hwncoA
Submitted November 17, 2017 at 03:18AM by DerBootsMann
via reddit http://ift.tt/2j1TAzN
http://ift.tt/2hwncoA
Submitted November 17, 2017 at 03:18AM by DerBootsMann
via reddit http://ift.tt/2j1TAzN
Ars Technica UK
Kaspersky: Yes, we obtained NSA secrets. No, we didn’t help steal them
Moscow-based AV provider challenges claims it helped Russian spies.
Internal Kaspersky Investigation Says NSA Worker's Computer Was Infested with Malware
http://ift.tt/2zKIf12
Submitted November 17, 2017 at 03:57AM by SuccessfulOperation
via reddit http://ift.tt/2jwKSxE
http://ift.tt/2zKIf12
Submitted November 17, 2017 at 03:57AM by SuccessfulOperation
via reddit http://ift.tt/2jwKSxE
Motherboard
Internal Kaspersky Investigation Says NSA Worker’s Computer Was Infested with Malware
The Russian cybersecurity firm released a new report that pushes back against accusations that it helped leak sensitive NSA materials and suggests that a backdoor found on worker’s machine could have allowed others to take files from his machine.
Staring into the Spotlight - An offensive tour of the OSX userland search system
http://ift.tt/2jxHlio
Submitted November 17, 2017 at 04:19AM by nibblesec
via reddit http://ift.tt/2yQ9hB0
http://ift.tt/2jxHlio
Submitted November 17, 2017 at 04:19AM by nibblesec
via reddit http://ift.tt/2yQ9hB0
Doyensec
Staring into the Spotlight · Doyensec's Blog
Doyensec's Blog :: Doyensec is an independent security research and development company focused on vulnerability discovery and remediation.