Netsec – Telegram
Netsec
7.42K subscribers
22.4K links
This channel posts the feed from r/netsec.
For any suggestions dm @streaak
Donate to keep the bot running https://www.paypal.me/akhilgv
Download Telegram
Microchips question (Help please)
Hello there,Recently I was burgled and the Police have been terrible. Also, over the years my partner has had 5-10 phones stolen and it's so frustrating knowing the thieves are getting away with it.My question is, are there any microchips I can buy that can be securely and discreetly fastened to phones, sat navs etc that if stolen could be traced?Thank you

Submitted December 05, 2017 at 03:48PM by fallbob
via reddit http://ift.tt/2ijczWS
Collection of bugs in over 30 email clients to spoof sender and inject code
http://ift.tt/2zPCiND

Submitted December 05, 2017 at 03:23PM by tellersiim
via reddit http://ift.tt/2ntM5HA
Who should take over my infosec awareness program after I leave?
I have the following situation: we have a team of People Operations with experience on training people. Some of them are part of the information security team. Will it be good to let them do the awareness training, information security updates in general meetings etc or should the CISO do this?The reason the CISO could be a good option (regardless of presentation skills) is the fact this person is the one in charge of infosec and therefore has authority. The awareness program is also the #1 way to make yourself visible in relation to infosec.I am the one running the program atm and the most visible because of this, so I am sure of this point about visibility.In other words: Should we choose for authority or training skills?(Best option is to combine both but atm that is not an option. Later on, the CISO could be sent to presentation training courses)Our plan for now:I am the intern working on awareness, so I will continue my program until I leave. In the meantime, I will gradually hand over the program to my company counselor (who also is the project manager for the certification,management representative of infosec and director People Operations), with the CISO as number 2 for the program.The company counselor will do the offline courses and the general meeting parts (he already is the one leading the general meeting) and the CISO will be the person for E-learning and phishing as well as backup for the offline training.Please let me know what you think. I prefer to receive constructive feedback.

Submitted December 05, 2017 at 03:20PM by johanvdpluijm
via reddit http://ift.tt/2zO1R1G
According to Keeper survey, >80% of ppl reuse a password across multiple accounts, which increases the risk of getting hacked. According to Dashlane, 100 accounts are registered to a single e-mail, and people change their PWs 37 times per year. How to Survive the Overwhelming Explosion of Passwords?
http://ift.tt/2BJQJnS

Submitted December 05, 2017 at 04:39PM by jaanv
via reddit http://ift.tt/2kkxr47
Mailsploit: a collection of bugs in email clients that allow effective sender spoofing and code injection attacks
http://ift.tt/2AX8B1r

Submitted December 05, 2017 at 05:52PM by 0xdea
via reddit http://ift.tt/2AqHwT4
How To Tell If Your Linux Server Has Been Compromised
http://ift.tt/2An1mi7

Submitted December 05, 2017 at 09:32PM by speckz
via reddit http://ift.tt/2iThm5o
Critical RCE in Android media framework, among other issues
http://ift.tt/2BxmH5O

Submitted December 05, 2017 at 10:37PM by bro_can_u_even_carve
via reddit http://ift.tt/2kq9t7P
Need help determining if a computers have been compromised.
I have to keep this slightly vague due to confidentiality. But I am currently working as an intern for a very small company. I am currently a Security Risk Analysis major and my internship has definitely over ranked my skills. There are no mentors in terms of security and they have given me an assignment to go to one of the businesses we work with and search there computers for malware. The denoscription of the situation is that the company is separating from there partner and the owner is convinced the partner has infected there computers with viruses/malware/spyware that he has no actual proof of. I went there once and did the basics ran some virus scans and other simple checks. They came back with only one malicious file which i looked further into and it was very common thing (most likely something from the partner). I have to go back tomorrow now because the virus scan wasn't good enough for them. I have no idea how to find this or what I should do. Can anyone give me some advice on how I can find or prove that there is nothing wrong with their computers.

Submitted December 06, 2017 at 12:24AM by dk_beats
via reddit http://ift.tt/2jhLMep
Securing Home Network
Hello, I have a quick question. I am a Security Administrator at a local IT company, and I also attend high school (I am a senior) and a local career center for Cybersecurity...I have had NAT issues in the past (on Xbox) with my ISP, and so I requested that I would be given a Public IP address, as at the time, I figured that was the best option, after attempting to configure port forwarding, DMZ, etc. with no success.Now that I am a Security Administrator, and have more knowledge in this field, what would the best course of action be?Should I ask to be given a private IP again, and try and take my hand at port forwarding again? Or is there a way I can secure my own network internally without relying on the ISP? It would be nice to be able to manage my own network's security, but I'm not sure if it is the best idea, let alone the best way to achieve that. Thank you in advance!

Submitted December 06, 2017 at 02:29AM by ksyolsen
via reddit http://ift.tt/2AZSQa2