The Trouble with Politicians Sharing Passwords
http://ift.tt/2jIA8Zu
Submitted December 04, 2017 at 10:43PM by redct
via reddit http://ift.tt/2Byp48m
http://ift.tt/2jIA8Zu
Submitted December 04, 2017 at 10:43PM by redct
via reddit http://ift.tt/2Byp48m
Troy Hunt
The Trouble with Politicians Sharing Passwords
Yesterday I had a bunch of people point me at a tweet from a politician in the UK named Nadine Dorries. As it turns out, some folks were rather alarmed about her position on sharing what we would normally consider to be a secret. In this case, that secret…
Lost my locked iPad and find my device was off. I know someone has it but it still shows up in my iCloud. What is the possible scenario?
I lost my iPad a month or so ago. When i go to my iCloud through my iPhone, it says that the Device can be trusted and it can receive Apple ID Confirmation codes. I didn’t have Find my Phone activated on the Ipad so I cannot see where it is. I just had a 6 Figures Code. It seems that the iPad is not being used by anyone right now, because to me it is unlikely that they cracked my Code, but I wanted to ask those people that maybe know more and can help me understand what’s going on. I have a phone number abroad where i can search for the ipad so i have a slight hope that i can get it back.Can someone help me understand what has possibly happened? Why am I able to still see my iPad on my iCloud and why is it still a trustworthy iPad with all my infos, since I am sure someone else has it now.
Submitted December 04, 2017 at 10:35PM by PavlovianBirthday
via reddit http://ift.tt/2jdHIfg
I lost my iPad a month or so ago. When i go to my iCloud through my iPhone, it says that the Device can be trusted and it can receive Apple ID Confirmation codes. I didn’t have Find my Phone activated on the Ipad so I cannot see where it is. I just had a 6 Figures Code. It seems that the iPad is not being used by anyone right now, because to me it is unlikely that they cracked my Code, but I wanted to ask those people that maybe know more and can help me understand what’s going on. I have a phone number abroad where i can search for the ipad so i have a slight hope that i can get it back.Can someone help me understand what has possibly happened? Why am I able to still see my iPad on my iCloud and why is it still a trustworthy iPad with all my infos, since I am sure someone else has it now.
Submitted December 04, 2017 at 10:35PM by PavlovianBirthday
via reddit http://ift.tt/2jdHIfg
reddit
Lost my locked iPad and find my device was off. I... • r/security
I lost my iPad a month or so ago. When i go to my iCloud through my iPhone, it says that the Device can be trusted and it can receive Apple ID...
scapy-ssl_tls - SSL/TLS layers for scapy the interactive packet manipulation tool
http://ift.tt/1pqnzmB
Submitted December 04, 2017 at 11:27PM by -tin-
via reddit http://ift.tt/2AtYhef
http://ift.tt/1pqnzmB
Submitted December 04, 2017 at 11:27PM by -tin-
via reddit http://ift.tt/2AtYhef
GitHub
tintinweb/scapy-ssl_tls
scapy-ssl_tls - SSL/TLS layers for scapy the interactive packet manipulation tool
Commonspeak: Content discovery wordlists built with BigQuery
http://ift.tt/2BHXLcI
Submitted December 04, 2017 at 10:54PM by Mempodipper
via reddit http://ift.tt/2zLV74q
http://ift.tt/2BHXLcI
Submitted December 04, 2017 at 10:54PM by Mempodipper
via reddit http://ift.tt/2zLV74q
pentester.io
Commonspeak: Content discovery wordlists built with BigQuery
Content discovery wordlists (subdomains, files and directories) built with BigQuery for use in penetration testing, offensive security and bug bounties
Malware Detection in Executables Using Neural Networks
http://ift.tt/2A0SFHX
Submitted December 04, 2017 at 10:46PM by Extremite
via reddit http://ift.tt/2iNY1SK
http://ift.tt/2A0SFHX
Submitted December 04, 2017 at 10:46PM by Extremite
via reddit http://ift.tt/2iNY1SK
Parallel Forall
Malware Detection in Executables Using Neural Networks | Parallel Forall
Malware detection using an artificial neural network trained to differentiate benign and malicious executable files using only the raw executable as input.
SeKey: An SSH Agent for OSX, Using Secure Enclave and TouchID
http://ift.tt/2ANmL4w
Submitted December 04, 2017 at 10:28PM by ntrippar
via reddit http://ift.tt/2AVHjbP
http://ift.tt/2ANmL4w
Submitted December 04, 2017 at 10:28PM by ntrippar
via reddit http://ift.tt/2AVHjbP
GitHub
ntrippar/sekey
sekey - Use Secure Enclave for SSH Authentication!
"Signal Magazine" I just find out this nice website about cyber security and it's really helpful
Signal Magazine - http://ift.tt/2BHmyxz
Submitted December 04, 2017 at 11:16PM by myS_Cross
via reddit http://ift.tt/2klm7oC
Signal Magazine - http://ift.tt/2BHmyxz
Submitted December 04, 2017 at 11:16PM by myS_Cross
via reddit http://ift.tt/2klm7oC
SIGNAL Magazine
SIGNAL Magazine, covering cyber technologies, cloud computing, big data, homeland security, C4ISR and the programs that build on these disciplines.
New Security book bundle on Humble Bundle
http://ift.tt/2AOvi7k
Submitted December 05, 2017 at 12:55AM by wytchelle
via reddit http://ift.tt/2zLI7Me
http://ift.tt/2AOvi7k
Submitted December 05, 2017 at 12:55AM by wytchelle
via reddit http://ift.tt/2zLI7Me
Humble Bundle
Humble Book Bundle: Network & Security Certification by Wiley
Pay what you want for networking and security ebooks and support charity!
Decompile All the Things - Decompile multiple binaries and referenced imports with the IDAPro batch decompilation plugin
http://ift.tt/2dZ89Wv
Submitted December 05, 2017 at 12:50AM by -tin-
via reddit http://ift.tt/2nsgnug
http://ift.tt/2dZ89Wv
Submitted December 05, 2017 at 12:50AM by -tin-
via reddit http://ift.tt/2nsgnug
GitHub
tintinweb/ida-batch_decompile
ida-batch_decompile - *Decompile All the Things* - IDA Batch Decompile plugin and noscript for Hex-Ray's IDA Pro that adds the ability to batch decompile multiple files and their imports with add...
Humble Book Bundle: Network & Security Certification by Wiley
http://ift.tt/2A2Yecr
Submitted December 05, 2017 at 12:46AM by NGC4826
via reddit http://ift.tt/2iP2DrP
http://ift.tt/2A2Yecr
Submitted December 05, 2017 at 12:46AM by NGC4826
via reddit http://ift.tt/2iP2DrP
Humble Bundle
Humble Book Bundle: Network & Security Certification by Wiley
Pay what you want for networking and security ebooks and support charity!
Humble Bundle Network & Security Certification by Wiley
http://ift.tt/2AwtSw1
Submitted December 05, 2017 at 12:39AM by Cow-Tipping
via reddit http://ift.tt/2AOsCqi
http://ift.tt/2AwtSw1
Submitted December 05, 2017 at 12:39AM by Cow-Tipping
via reddit http://ift.tt/2AOsCqi
Humble Bundle
Humble Book Bundle: Network & Security Certification by Wiley
Pay what you want for networking and security ebooks and support charity!
striptls: A generic tcp proxy implementation and audit tool to perform protocol independent ssl/tls interception and STARTTLS stripping attacks
http://ift.tt/1nFr7jS
Submitted December 05, 2017 at 01:31AM by -tin-
via reddit http://ift.tt/2iPa95Z
http://ift.tt/1nFr7jS
Submitted December 05, 2017 at 01:31AM by -tin-
via reddit http://ift.tt/2iPa95Z
GitHub
tintinweb/striptls
striptls - proxy poc implementation of STARTTLS stripping attacks
Installing 1080 IP camera instead of Ring or Sky bell
I have an indoors 1080 Armcrest camera that I was using as baby monitor but now I want to use that camera as a front door surveillance camera.The area that it would be installed on is covered so water damage isn't really a concern.My only real concern is if a masked hooded thief tries to steals it. But I'm guessing that could be a concern with door bell cameras as well.Is it worth the risk to do this using a regular IP camera?The camera would be installed on siding and a cable would run above the door frame to a power outlet near by.Any thoughts on this type of set up?
Submitted December 05, 2017 at 01:31AM by Throwaway-ex-stoner
via reddit http://ift.tt/2iP2vsz
I have an indoors 1080 Armcrest camera that I was using as baby monitor but now I want to use that camera as a front door surveillance camera.The area that it would be installed on is covered so water damage isn't really a concern.My only real concern is if a masked hooded thief tries to steals it. But I'm guessing that could be a concern with door bell cameras as well.Is it worth the risk to do this using a regular IP camera?The camera would be installed on siding and a cable would run above the door frame to a power outlet near by.Any thoughts on this type of set up?
Submitted December 05, 2017 at 01:31AM by Throwaway-ex-stoner
via reddit http://ift.tt/2iP2vsz
reddit
Installing 1080 IP camera instead of Ring or Sky bell • r/security
I have an indoors 1080 Armcrest camera that I was using as baby monitor but now I want to use that camera as a front door surveillance camera....
The Truth About Machine Learning In Cybersecurity
http://ift.tt/2AhIJMw
Submitted December 05, 2017 at 01:25AM by alexander_polyakov
via reddit http://ift.tt/2AKCj9x
http://ift.tt/2AhIJMw
Submitted December 05, 2017 at 01:25AM by alexander_polyakov
via reddit http://ift.tt/2AKCj9x
Forbes
The Truth About Machine Learning In Cybersecurity: Defense
Machine learning will never be a silver bullet for cybersecurity, but it can help with basic cybersecurity tasks.
Bad Rabbit ransomware: why we should be worried about this new threat
http://ift.tt/2zNhtm8
Submitted December 05, 2017 at 12:54AM by volci
via reddit http://ift.tt/2BHsjLE
http://ift.tt/2zNhtm8
Submitted December 05, 2017 at 12:54AM by volci
via reddit http://ift.tt/2BHsjLE
Verdict
Bad Rabbit ransomware: why we should be worried about this new threat
Bad Rabbit ransomware: A new phase where malicious data encryption can be used to potentially cripple markets, governments, or even whole economies.
Proposed law would jail execs who fail to report data breaches
http://ift.tt/2ihSqAA
Submitted December 05, 2017 at 12:49AM by volci
via reddit http://ift.tt/2kkTXdm
http://ift.tt/2ihSqAA
Submitted December 05, 2017 at 12:49AM by volci
via reddit http://ift.tt/2kkTXdm
Naked Security
Proposed law would jail execs who fail to report data breaches
The Senate’s looking at YOU, Uber!
Ursnif Trojan Adopts New Code Injection Technique
http://ift.tt/2AnpO33
Submitted December 05, 2017 at 12:47AM by volci
via reddit http://ift.tt/2BKdp7C
http://ift.tt/2AnpO33
Submitted December 05, 2017 at 12:47AM by volci
via reddit http://ift.tt/2BKdp7C
Threat Post
Ursnif Trojan Adopts New Code Injection Technique
Researchers have found a variant of Ursnif Trojan they said is a “v3 build” that targets Australian bank customers with new redirection attack techniques.
ARM Mode and the Thumb Mode classification – Android
http://ift.tt/2jLMU9s
Submitted December 04, 2017 at 08:27PM by userpcblog
via reddit http://ift.tt/2ATJpsN
http://ift.tt/2jLMU9s
Submitted December 04, 2017 at 08:27PM by userpcblog
via reddit http://ift.tt/2ATJpsN
Introduction to Plaso Heimdall (also covers 20171118)
https://www.youtube.com/watch?v=JZGfhd1PNhU
Submitted December 04, 2017 at 05:54PM by 13Cubed
via reddit http://ift.tt/2A33v3M
https://www.youtube.com/watch?v=JZGfhd1PNhU
Submitted December 04, 2017 at 05:54PM by 13Cubed
via reddit http://ift.tt/2A33v3M
YouTube
Introduction to Plaso Heimdall
As a continuation of the "Introduction to Windows Forensics" series, this video introduces Plaso and Log2Timeline. Log2Timeline is designed to extract forensic data from a computer system and aggregate it for analysis, and Plaso is the Python-based backend…
Humble Book Bundle Network & Security Certification by Wiley
http://ift.tt/2AvlOeA
Submitted December 05, 2017 at 02:49AM by 13378
via reddit http://ift.tt/2AplEaK
http://ift.tt/2AvlOeA
Submitted December 05, 2017 at 02:49AM by 13378
via reddit http://ift.tt/2AplEaK
Humble Bundle
Humble Book Bundle: Network & Security Certification by Wiley
Pay what you want for networking and security ebooks and support charity!
2018 Goal: Re-position Cybersecurity As An Enabler - CTOvision.com
http://ift.tt/2iMteWq
Submitted December 05, 2017 at 02:11AM by SecurityTrust
via reddit http://ift.tt/2At0BSP
http://ift.tt/2iMteWq
Submitted December 05, 2017 at 02:11AM by SecurityTrust
via reddit http://ift.tt/2At0BSP
CTOvision.com
2018 Goal: Re-position Cybersecurity As An Enabler - CTOvision.com
As long as cybersecurity is viewed as a pain, it’ll never be integrated into the fabric of an organization. Fortunately there have been significant advances in cloud-based security services that enable new ways to embed cybersecurity into enterprise services…