How to backup VeraCrypt drives?
Today I found out Symantec Recovery and Veeam can't recognize fully encrypted disks (VeraCrypt AES).The only way I can find as a temporary solution is to robocopy the drive to a backup external drive (also encrypted).Is anyone aware of a good backup solution that can handle fully encrypted disks? Any advice is appreciated, thanks!
Submitted November 28, 2017 at 11:17AM by mr_norr
via reddit http://ift.tt/2icaek2
Today I found out Symantec Recovery and Veeam can't recognize fully encrypted disks (VeraCrypt AES).The only way I can find as a temporary solution is to robocopy the drive to a backup external drive (also encrypted).Is anyone aware of a good backup solution that can handle fully encrypted disks? Any advice is appreciated, thanks!
Submitted November 28, 2017 at 11:17AM by mr_norr
via reddit http://ift.tt/2icaek2
reddit
How to backup VeraCrypt drives? • r/security
Today I found out Symantec Recovery and Veeam can't recognize fully encrypted disks (VeraCrypt AES). The only way I can find as a temporary...
Different Types of HIPAA Privacy and Security Policies
http://ift.tt/2Aarj4x
Submitted November 28, 2017 at 12:43PM by Jaccob2016
via reddit http://ift.tt/2hXf80o
http://ift.tt/2Aarj4x
Submitted November 28, 2017 at 12:43PM by Jaccob2016
via reddit http://ift.tt/2hXf80o
Boomeon
Boomeon | Different Types of HIPAA Privacy and Security Policies
Boomeon is the premier online community just for Baby Boomers. Read, see, do, share -- this is your generation. This is your place to be.
A Complete Penetration Testing Tool List for Security Professionals
http://ift.tt/2ADI2ht
Submitted November 28, 2017 at 12:47PM by tech-gig
via reddit http://ift.tt/2Ad5P7a
http://ift.tt/2ADI2ht
Submitted November 28, 2017 at 12:47PM by tech-gig
via reddit http://ift.tt/2Ad5P7a
Tech
Complete Penetration Testing Tool List for Security Professionals
Penetration testing is the practice of launching authorized, simulated attacks against computer systems and their physical infrastructure.
System Hardening Checklist
http://ift.tt/2Abbjzf
Submitted November 28, 2017 at 07:12PM by adrelanos
via reddit http://ift.tt/2iZDCXX
http://ift.tt/2Abbjzf
Submitted November 28, 2017 at 07:12PM by adrelanos
via reddit http://ift.tt/2iZDCXX
Whonix
System Hardening Checklist
Hardening instructions for Whonix and Qubes-Whonix. Improving Linux, Windows and macOS host security and networking configurations. Safe Tor, Tor Browser and other online activities.
Unofficial Guide to Mimikatz & Command Reference
http://ift.tt/1Qou989
Submitted November 28, 2017 at 07:36PM by FireFart
via reddit http://ift.tt/2BjRove
http://ift.tt/1Qou989
Submitted November 28, 2017 at 07:36PM by FireFart
via reddit http://ift.tt/2BjRove
System Hardening Checklist
http://ift.tt/2Abbjzf
Submitted November 28, 2017 at 07:45PM by adrelanos
via reddit http://ift.tt/2naCe9g
http://ift.tt/2Abbjzf
Submitted November 28, 2017 at 07:45PM by adrelanos
via reddit http://ift.tt/2naCe9g
Whonix
System Hardening Checklist
Hardening instructions for Whonix and Qubes-Whonix. Improving Linux, Windows and macOS host security and networking configurations. Safe Tor, Tor Browser and other online activities.
Security In 5: Episode 120 - OWASP Top 10 - A7 - Missing Function Level Access Control
http://ift.tt/2Bu4fM8
Submitted November 28, 2017 at 07:33PM by BinaryBlog
via reddit http://ift.tt/2k4DDNx
http://ift.tt/2Bu4fM8
Submitted November 28, 2017 at 07:33PM by BinaryBlog
via reddit http://ift.tt/2k4DDNx
Libsyn
Security In Five Podcast: Episode 120 - OWASP Top 10 - A7 - Missing Function Level Access Control
The OWASP Top 10 series continues and we're up to number 7. This one is called Missing Function Level Access Control and talk about protecting the inner functions of an application from being called by the approved users. Just because a user logged in doesn't…
Using MITMF and MQTT to break into victims mobile via web.xender.com
http://ift.tt/2BknCX7
Submitted November 28, 2017 at 09:05PM by sathish09
via reddit http://ift.tt/2zwTKqa
http://ift.tt/2BknCX7
Submitted November 28, 2017 at 09:05PM by sathish09
via reddit http://ift.tt/2zwTKqa
Medium
Xender to shell using python and mitmf
Here is a way to compromise a victim’s android phone using web.xender.com. I have chained multiple things to achieve this.
A detailed review of hundreds of the most popular US federal websites shows that, year over year, most continue to fall short of security and technical requirements set by the federal government, as well as industry standards for web design and development.
http://ift.tt/2AaYHIP
Submitted November 28, 2017 at 09:58PM by EvanConover
via reddit http://ift.tt/2AfKx94
http://ift.tt/2AaYHIP
Submitted November 28, 2017 at 09:58PM by EvanConover
via reddit http://ift.tt/2AfKx94
Infosecurity Magazine
Federal Websites Still Lack Basic Security
Only 71% of all the reviewed websites passed the SSL test.
New NSA leak exposes Red Disk, the Army's failed intelligence system
http://ift.tt/2AEhTPE
Submitted November 28, 2017 at 09:47PM by Shin_Ichi
via reddit http://ift.tt/2ic45Em
http://ift.tt/2AEhTPE
Submitted November 28, 2017 at 09:47PM by Shin_Ichi
via reddit http://ift.tt/2ic45Em
ZDNet
Exclusive: NSA hit by yet another leak
The leak marks at least the fifth exposure of NSA-related data in as many years.
Kernel Exploit Demo - Windows 10 privesc via WARBIRD
http://ift.tt/2ABfzZI
Submitted November 28, 2017 at 10:13PM by HenrySeldon
via reddit http://ift.tt/2AcJrKW
http://ift.tt/2ABfzZI
Submitted November 28, 2017 at 10:13PM by HenrySeldon
via reddit http://ift.tt/2AcJrKW
XPN InfoSec Blog
Kernel Exploit Demo - Windows 10 privesc via WARBIRD
In this post I wanted to take a look at something which I touched on previously, and that is just how a Windows kernel based exploit achieves privilege escalation. Rather than take something like HackSys Extreme Vulnerable Windows Driver, I wanted to work…
Phishing using C# and InfoPath - The Phishing Path to Info We Missed.
http://ift.tt/2ndKBRu
Submitted November 28, 2017 at 09:54PM by checky
via reddit http://ift.tt/2iay6EJ
http://ift.tt/2ndKBRu
Submitted November 28, 2017 at 09:54PM by checky
via reddit http://ift.tt/2iay6EJ
Obscurity Labs
THE {PHISHING} {PATH} TO {INFO} WE MISSED
TL;DR: InfoPath is a fantastic way to run custom C# code, and we missed it as an attack vector sadly. At the moment it has been deprecated, but don't fret it's still everywhere! So what is InfoPath; merely put InfoPath is a forms-creation and data-gathering…
Terror exploit kit goes HTTPS all the way
http://ift.tt/2zxQ872
Submitted November 28, 2017 at 09:49PM by EvanConover
via reddit http://ift.tt/2zzrGCF
http://ift.tt/2zxQ872
Submitted November 28, 2017 at 09:49PM by EvanConover
via reddit http://ift.tt/2zzrGCF
Malwarebytes Labs
Terror exploit kit goes HTTPS all the way - Malwarebytes Labs
A look at some techniques used by the Terror exploit kit to evade traffic-based detection.
Help build an open-source, minimalistic, logless, anonymous room-based chat application in Node.JS - INDSTIL
http://ift.tt/2ncPpH0
Submitted November 28, 2017 at 11:03PM by Dellitsni
via reddit http://ift.tt/2zMB9KT
http://ift.tt/2ncPpH0
Submitted November 28, 2017 at 11:03PM by Dellitsni
via reddit http://ift.tt/2zMB9KT
GitHub
dellitsni/indstil
indstil - A stripped-down, simple and easy-to-use open source chat application, based on rooms and without registration.
Requesting tips on getting Security+ certification
I am looking to get a Security+ certification.I'm not very familiar with who issues this certification.I found CompTIA which offers a bundle with some kind of course (that has bad reviews) and a test, and retest coupon for about $500 USD right now.Is this the best use of my money? Are there better companies to go with?Thank you for your time.
Submitted November 28, 2017 at 10:51PM by Aro2220
via reddit http://ift.tt/2nhyrr5
I am looking to get a Security+ certification.I'm not very familiar with who issues this certification.I found CompTIA which offers a bundle with some kind of course (that has bad reviews) and a test, and retest coupon for about $500 USD right now.Is this the best use of my money? Are there better companies to go with?Thank you for your time.
Submitted November 28, 2017 at 10:51PM by Aro2220
via reddit http://ift.tt/2nhyrr5
reddit
Requesting tips on getting Security+ certification • r/security
I am looking to get a Security+ certification. I'm not very familiar with who issues this certification. I found CompTIA which offers a bundle...
Frida Engage Part Two | Shellcoding an Arm64 In-Memory Reverse TCP Shell with Frida
http://ift.tt/2iZUu0N
Submitted November 28, 2017 at 11:21PM by rotlogix_
via reddit http://ift.tt/2k5HMAV
http://ift.tt/2iZUu0N
Submitted November 28, 2017 at 11:21PM by rotlogix_
via reddit http://ift.tt/2k5HMAV
Calculating financial loss from IT security risk
http://ift.tt/2k4jtDk
Submitted November 28, 2017 at 11:35PM by nzwasp
via reddit http://ift.tt/2na2L6A
http://ift.tt/2k4jtDk
Submitted November 28, 2017 at 11:35PM by nzwasp
via reddit http://ift.tt/2na2L6A
Security Breach Online
Calculating financial loss from IT security risk - Security Breach Online
A large part of IT Security is risk mitigation. Assessing the risks to your business and implementing controls to reduce the risk or accepting the risk.
If you are a united states resident please sign.
http://ift.tt/2zw2ctE
Submitted November 29, 2017 at 12:31AM by airconditioningboy
via reddit http://ift.tt/2Ah2QZ7
http://ift.tt/2zw2ctE
Submitted November 29, 2017 at 12:31AM by airconditioningboy
via reddit http://ift.tt/2Ah2QZ7
petitions.whitehouse.gov
We The People Call for The Resignation of FCC Chairman Ajit Varadaraj Pai | We the People: Your Voice in Our Government
Exploitabilities (SRM Video Series Part 2)
https://www.youtube.com/watch?v=TdvfU6Y_nGY
Submitted November 29, 2017 at 01:03AM by Uminekoshi
via reddit http://ift.tt/2j2FBef
https://www.youtube.com/watch?v=TdvfU6Y_nGY
Submitted November 29, 2017 at 01:03AM by Uminekoshi
via reddit http://ift.tt/2j2FBef
YouTube
Exploitabilities (SRM Series Part 2)
This is the second part of our video series on Security Risk Management (SRM) which explains the concept of Exploitabilities: the intersection between vulner...
Login as 'root' with empty password after a few tries on MacOS High Sierra
https://twitter.com/lemiorhan/status/935578694541770752
Submitted November 29, 2017 at 01:48AM by mentalow
via reddit http://ift.tt/2zwGj9v
https://twitter.com/lemiorhan/status/935578694541770752
Submitted November 29, 2017 at 01:48AM by mentalow
via reddit http://ift.tt/2zwGj9v
Twitter
Lemi Orhan Ergin
Dear @AppleSupport, we noticed a *HUGE* security issue at MacOS High Sierra. Anyone can login as "root" with empty password after clicking on login button several times. Are you aware of it @Apple?
Nightmares Of 2017 – List Of Worst Data Security Breaches
http://ift.tt/2k8e8Lz
Submitted November 29, 2017 at 01:43AM by TechBiteMe
via reddit http://ift.tt/2Ai3kya
http://ift.tt/2k8e8Lz
Submitted November 29, 2017 at 01:43AM by TechBiteMe
via reddit http://ift.tt/2Ai3kya
Tech Bite Me
Nightmares Of 2017 – List Of Worst Data Security Breaches | Tech Bite Me
Historical hacks come back to haunt, and recent breaches bite our behinds. The most threatening aspects of 2015 were the online privacy and security breach issues. If you think last year's 3 billion data-breaching records were terrible, this year has been…