Why Linus is right (as usual)
http://ift.tt/2AW81wX
Submitted November 27, 2017 at 02:55AM by speckz
via reddit http://ift.tt/2zrrWn0
http://ift.tt/2AW81wX
Submitted November 27, 2017 at 02:55AM by speckz
via reddit http://ift.tt/2zrrWn0
Erratasec
Why Linus is right (as usual)
People are debating this email from Linus Torvalds (maintainer of the Linux kernel). It has strong language, like: Some security people ...
FBI failed to warn officials about Russian email hackers
http://ift.tt/2zG8SFK
Submitted November 27, 2017 at 06:33AM by imr2017
via reddit http://ift.tt/2naVaFd
http://ift.tt/2zG8SFK
Submitted November 27, 2017 at 06:33AM by imr2017
via reddit http://ift.tt/2naVaFd
Engadget
FBI failed to warn officials about Russian email hackers
The FBI didn't warn officials that Russia was trying to infiltrate their email accounts, even though it knew for at least a year.
Phone number changing on its own?
Hi r/security,So my phone number changed on its own recently. I got in touch with my service provider, and they said I was the one who changed it (it's an fully online service provider so most of the stuff is done on their website). They "looked into it" with their backend people and still concluded that I was the one who changed it, which doesn't make sense because it had the wrong area code. Should I be worried?
Submitted November 27, 2017 at 10:52AM by SourPomegranate
via reddit http://ift.tt/2nb0AQy
Hi r/security,So my phone number changed on its own recently. I got in touch with my service provider, and they said I was the one who changed it (it's an fully online service provider so most of the stuff is done on their website). They "looked into it" with their backend people and still concluded that I was the one who changed it, which doesn't make sense because it had the wrong area code. Should I be worried?
Submitted November 27, 2017 at 10:52AM by SourPomegranate
via reddit http://ift.tt/2nb0AQy
reddit
Phone number changing on its own? • r/security
Hi r/security, So my phone number changed on its own recently. I got in touch with my service provider, and they said I was the one who changed...
First Aid Training - Jovin Security Training
http://ift.tt/2nb0Cb8
Submitted November 27, 2017 at 10:38AM by JovinSecurity
via reddit http://ift.tt/2zHi7FS
http://ift.tt/2nb0Cb8
Submitted November 27, 2017 at 10:38AM by JovinSecurity
via reddit http://ift.tt/2zHi7FS
Jovin S T Ltd
First Aid Training | FAW Courses - First Aid At Work Course
Jovin Security provides HSE first aid training courses which cover safe best practice, awareness, vital signs, incident management, Minor Injuries, etc...
Image removal vulnerability in Facebook polling feature
http://ift.tt/2joM1Ul
Submitted November 27, 2017 at 03:14PM by imr2017
via reddit http://ift.tt/2AAtpvo
http://ift.tt/2joM1Ul
Submitted November 27, 2017 at 03:14PM by imr2017
via reddit http://ift.tt/2AAtpvo
Dynamic World
Image removal vulnerability in Facebook polling feature
Latest Cyber Security News Articles - Cyware
http://ift.tt/2ABR3rF
Submitted November 27, 2017 at 03:22PM by cywarelabs
via reddit http://ift.tt/2Aade7v
http://ift.tt/2ABR3rF
Submitted November 27, 2017 at 03:22PM by cywarelabs
via reddit http://ift.tt/2Aade7v
Cyware
Cyber Security News Today | Articles on Cyber Security, Malware Attack updates | Cyware
Check out top news and articles about cyber security, malware attack updates and more on Cyware.com. We provide machine learning based curation engine brings you the top and relevant cyber security content. Read More!
J.A.W.S. - Windows Host Enumeration Script
http://ift.tt/2Bg2NMv
Submitted November 27, 2017 at 07:43PM by 411Hall
via reddit http://ift.tt/2iVDsR8
http://ift.tt/2Bg2NMv
Submitted November 27, 2017 at 07:43PM by 411Hall
via reddit http://ift.tt/2iVDsR8
Ellingson Mineral
J.A.W.S. Windows Enumeration Script
While doing my OSCP a few months ago I found I was having to perform the same post enumeration actions on every single Windows host I compromised. I had tried a few of the existing enumeration noscripts available for Windows during my lab time and found them…
Linux Expl0rer: open source easy-to-use live forensics toolbox for Linux endpoints
http://ift.tt/2AfXaOY
Submitted November 27, 2017 at 08:08PM by omri9741
via reddit http://ift.tt/2zH4OVz
http://ift.tt/2AfXaOY
Submitted November 27, 2017 at 08:08PM by omri9741
via reddit http://ift.tt/2zH4OVz
GitHub
intezer/linux-explorer
linux-explorer - Easy-to-use live forensics toolbox for Linux endpoints
Exim Zero Day Exploit DoS
http://ift.tt/2hQ7MM7
Submitted November 27, 2017 at 08:04PM by RuckelBob
via reddit http://ift.tt/2n51mhC
http://ift.tt/2hQ7MM7
Submitted November 27, 2017 at 08:04PM by RuckelBob
via reddit http://ift.tt/2n51mhC
Security In 5: Episode 119 - Uber Was Hacked And Covered It Up For A Year, Scary
http://ift.tt/2BrGPqC
Submitted November 27, 2017 at 07:33PM by BinaryBlog
via reddit http://ift.tt/2zvIcU5
http://ift.tt/2BrGPqC
Submitted November 27, 2017 at 07:33PM by BinaryBlog
via reddit http://ift.tt/2zvIcU5
Libsyn
Security In Five Podcast: Episode 119 - Uber Was Hacked And Covered It Up For A Year, Scary
Uber was the recent hack that was made public. 57 million records of riders and drivers. The data stolen for the riders was name and email, no passwords, payment info or locations. The drivers had more sensitive data stolen that included their driver's license…
How to Build a Secure Enclave on AWS
http://ift.tt/2n9C3ev
Submitted November 27, 2017 at 09:17PM by SecurityTrust
via reddit http://ift.tt/2zK4PIk
http://ift.tt/2n9C3ev
Submitted November 27, 2017 at 09:17PM by SecurityTrust
via reddit http://ift.tt/2zK4PIk
Vidder
How to Build a Secure Enclave on AWS
Vidder’s PrecisionAccess solution can unlock the agility and cost benefits of public clouds for organizations that must operate in secure facilities.
systemd Vulnerability Leads to Denial of Service on Linux (CVE-2017-15908)
http://ift.tt/2BhxWQK
Submitted November 27, 2017 at 09:14PM by EvanConover
via reddit http://ift.tt/2hVu674
http://ift.tt/2BhxWQK
Submitted November 27, 2017 at 09:14PM by EvanConover
via reddit http://ift.tt/2hVu674
Trendmicro
systemd Vulnerability Leads to Denial of Service on Linux - TrendLabs Security Intelligence Blog
Many Linux distributions are at risk due to a recently disclosed flaw in systemd: a flaw in its DNS resolver could cause a denial-of-service attack on vulnerable systems. The vulnerability is exploited by having the vulnerable system send a DNS query to a…
Two-factor authentication flowsheets
I'm looking for flowsheets for implementing two-factor authentication in a web application, including registration, login, forgotten password, and lost authentication device.I can probably work these out for myself, but with all things crypto, I'm hesitant to develop my own algorithms because I risk missing something vital and leaving a security hole that an attacker can exploit.Any recommendations of blogs or books that cover this?
Submitted November 27, 2017 at 09:29PM by grkuntzmd
via reddit http://ift.tt/2iVVkLZ
I'm looking for flowsheets for implementing two-factor authentication in a web application, including registration, login, forgotten password, and lost authentication device.I can probably work these out for myself, but with all things crypto, I'm hesitant to develop my own algorithms because I risk missing something vital and leaving a security hole that an attacker can exploit.Any recommendations of blogs or books that cover this?
Submitted November 27, 2017 at 09:29PM by grkuntzmd
via reddit http://ift.tt/2iVVkLZ
reddit
Two-factor authentication flowsheets • r/security
I'm looking for flowsheets for implementing two-factor authentication in a web application, including registration, login, forgotten password, and...
Imgur confirms email addresses, passwords stolen in 2014 hack
http://ift.tt/2A6P1z0
Submitted November 27, 2017 at 11:51PM by volci
via reddit http://ift.tt/2zsBcqX
http://ift.tt/2A6P1z0
Submitted November 27, 2017 at 11:51PM by volci
via reddit http://ift.tt/2zsBcqX
ZDNet
Imgur confirms email addresses, passwords stolen in 2014 hack
The hackers stole email addresses and passwords.
The future of cyberwar: Weaponised ransomware, IoT attacks and a new arms race
http://ift.tt/2z4GI76
Submitted November 27, 2017 at 11:43PM by SecurityTrust
via reddit http://ift.tt/2zsnEvv
http://ift.tt/2z4GI76
Submitted November 27, 2017 at 11:43PM by SecurityTrust
via reddit http://ift.tt/2zsnEvv
TechRepublic
The future of cyberwar: Weaponised ransomware, IoT attacks and a new arms race
Now that cyberwarfare is out of the shadows, here's a taste of what is coming next.
Packet Total 2.0 was released this month
https://packettotal.com
Submitted November 27, 2017 at 11:33PM by WubbaLubbaDubDub123
via reddit http://ift.tt/2iWXGu1
https://packettotal.com
Submitted November 27, 2017 at 11:33PM by WubbaLubbaDubDub123
via reddit http://ift.tt/2iWXGu1
Dynamitelab
DynamiteLab – A Free Online PCAP File Viewer and Analyzer
DynamiteLab performs network traffic analysis and cyber threat detection from packet capture files, such as pcap and pcapng. DynamiteLab Community is a successor to PacketTotal, providing a free repository of over 100,000 pcap files. The platform is operated…
Early Warning: A New Mirai Variant is Spreading Quickly on Port 23 and 2323
http://ift.tt/2B6Nmq4
Submitted November 28, 2017 at 12:09AM by speckz
via reddit http://ift.tt/2Ae3Kpf
http://ift.tt/2B6Nmq4
Submitted November 28, 2017 at 12:09AM by speckz
via reddit http://ift.tt/2Ae3Kpf
reddit
Early Warning: A New Mirai Variant is Spreading... • r/security
1 points and 0 comments so far on reddit
An AI Safety Researcher's Take on Security Mindset vs Ordinary Paranoia
http://ift.tt/2A5BC9T
Submitted November 28, 2017 at 01:22AM by caverts
via reddit http://ift.tt/2n9GDcG
http://ift.tt/2A5BC9T
Submitted November 28, 2017 at 01:22AM by caverts
via reddit http://ift.tt/2n9GDcG
Machine Intelligence Research Institute
Security Mindset and Ordinary Paranoia
The following is a fictional dialogue building off of AI Alignment: Why It’s Hard, and Where to Start. (AMBER, a philanthropist interested in a more reliable Internet, and CORAL, a computer security professional, are at a conference hotel together discussing…
Why we can’t trust smartphones anymore
http://ift.tt/2n13jvP
Submitted November 28, 2017 at 04:24AM by antdude
via reddit http://ift.tt/2Ab9SAT
http://ift.tt/2n13jvP
Submitted November 28, 2017 at 04:24AM by antdude
via reddit http://ift.tt/2Ab9SAT
Computerworld
Why we can’t trust smartphones anymore
A new class of security problem is caused by smartphone makers that create vulnerabilities deliberately without telling customers.
So, there are essentially no security features on Google Home devices?
I just wanted to share how ridiculous the security is using Google Home mini, and this seemed like a place to voice that concern.I just purchased a Google Home Mini, and I am quite concerned with the essentially non-existant security with these devices. By simply being connected to the same wifi connection you can boot up the Google Home app and change pretty much any setting you want to either the Chromecast or the Home Mini. The aforementioned Chromecast was setup by my roommate using a different android phone and google account, and I was able to have full access and change all of the settings, or even reset the device wirelessly. I can play any content I want to either of these devices, change the settings, see what content is being played on the device ( or change the setting that "hides" the content that is casting ) or enable or disable the "Guest" mode.This seems like a blatant and horrible risk for security, as many users are likely sharing wifi networks in places like college dorms and apartment complexes, and may not know how easy it is to access settings and such from these devices.Google's official response to any concerns like this is to "make your Home Wi-Fi network password protected and only give out the password to people you trust.", which is ridiculous. This works under the assumption that families and those who share Wifi want each-other to have complete access to the casting devices or content being consumed on them. I am genuinely astonished that Google released the product only relying on a Wifi password to prevent changes.It doesn't seem like the Echo Dot has the same blatant security issues as installing the Alexa app prompted me to log into my Amazon account, and the only device visible was my own Amazon Firestick, and not the Echo Dot connected to my wifi network that I do not own.
Submitted November 28, 2017 at 04:10AM by dclems
via reddit http://ift.tt/2nanCqn
I just wanted to share how ridiculous the security is using Google Home mini, and this seemed like a place to voice that concern.I just purchased a Google Home Mini, and I am quite concerned with the essentially non-existant security with these devices. By simply being connected to the same wifi connection you can boot up the Google Home app and change pretty much any setting you want to either the Chromecast or the Home Mini. The aforementioned Chromecast was setup by my roommate using a different android phone and google account, and I was able to have full access and change all of the settings, or even reset the device wirelessly. I can play any content I want to either of these devices, change the settings, see what content is being played on the device ( or change the setting that "hides" the content that is casting ) or enable or disable the "Guest" mode.This seems like a blatant and horrible risk for security, as many users are likely sharing wifi networks in places like college dorms and apartment complexes, and may not know how easy it is to access settings and such from these devices.Google's official response to any concerns like this is to "make your Home Wi-Fi network password protected and only give out the password to people you trust.", which is ridiculous. This works under the assumption that families and those who share Wifi want each-other to have complete access to the casting devices or content being consumed on them. I am genuinely astonished that Google released the product only relying on a Wifi password to prevent changes.It doesn't seem like the Echo Dot has the same blatant security issues as installing the Alexa app prompted me to log into my Amazon account, and the only device visible was my own Amazon Firestick, and not the Echo Dot connected to my wifi network that I do not own.
Submitted November 28, 2017 at 04:10AM by dclems
via reddit http://ift.tt/2nanCqn
reddit
So, there are essentially no security features on... • r/security
I just wanted to share how ridiculous the security is using Google Home mini, and this seemed like a place to voice that concern. I just...
Hot Singles in Your Area Want to Putin 💋: Click here to like 👍 the new global cyber-war on social media
http://ift.tt/2AEypPP
Submitted November 28, 2017 at 08:08AM by Paul-B-Robinson1
via reddit http://ift.tt/2AdUELv
http://ift.tt/2AEypPP
Submitted November 28, 2017 at 08:08AM by Paul-B-Robinson1
via reddit http://ift.tt/2AdUELv
Medium
Hot Singles in Your Area Want to Putin 💋
Click here to like 👍 the all new global cyber-war on social media