How To Tell If Your Linux Server Has Been Compromised
http://ift.tt/2An1mi7
Submitted December 05, 2017 at 09:32PM by speckz
via reddit http://ift.tt/2iThm5o
http://ift.tt/2An1mi7
Submitted December 05, 2017 at 09:32PM by speckz
via reddit http://ift.tt/2iThm5o
bash-prompt.net
Linux Guides For Linux Users
Bash-Prompt.net is a site dedicated to providing high quality linux guides
Cryptocurrency Hype is Creating Mobile Application Security Risk
http://ift.tt/2ASO8ua
Submitted December 05, 2017 at 09:18PM by Mi3Security
via reddit http://ift.tt/2iVV17e
http://ift.tt/2ASO8ua
Submitted December 05, 2017 at 09:18PM by Mi3Security
via reddit http://ift.tt/2iVV17e
Mi3 Security
Cryptocurrency Hype is Creating Mobile Application Security Risk
The cryptocurrency market is rapidly emerging, changing and growing exponentially. All this excitement, growth and money being invested in the cryptocurrency market has brought with it many mobile applications, many of which contain security risks.
How CISOs Can Successfully Talk Security to CEOs
http://ift.tt/2nsdLfT
Submitted December 05, 2017 at 09:59PM by CrankyBear
via reddit http://ift.tt/2Ayp09C
http://ift.tt/2nsdLfT
Submitted December 05, 2017 at 09:59PM by CrankyBear
via reddit http://ift.tt/2Ayp09C
Security Boulevard
How CISOs Can Successfully Talk Security to CEOs
One of the toughest jobs in security is communicating risk to business leadership. Here are tips to help connect with the CEO and Board.
Critical RCE in Android media framework, among other issues
http://ift.tt/2BxmH5O
Submitted December 05, 2017 at 10:37PM by bro_can_u_even_carve
via reddit http://ift.tt/2kq9t7P
http://ift.tt/2BxmH5O
Submitted December 05, 2017 at 10:37PM by bro_can_u_even_carve
via reddit http://ift.tt/2kq9t7P
reddit
Critical RCE in Android media framework, among other issues • r/netsec
6 points and 10 comments so far on reddit
How RSA Works: TLS Foundations
http://ift.tt/2iX924j
Submitted December 05, 2017 at 11:34PM by kavb
via reddit http://ift.tt/2zOrGOZ
http://ift.tt/2iX924j
Submitted December 05, 2017 at 11:34PM by kavb
via reddit http://ift.tt/2zOrGOZ
Fly Articles
How RSA Works: TLS Foundations
RSA is a foundational algorithm within modern Cryptography. If we understand how RSA is working behind the curtains then we'll have an excellent framework to better understand TLS. When we contrast RSA to the more modern ECDSA, we'll see just how sophisticated…
Need help determining if a computers have been compromised.
I have to keep this slightly vague due to confidentiality. But I am currently working as an intern for a very small company. I am currently a Security Risk Analysis major and my internship has definitely over ranked my skills. There are no mentors in terms of security and they have given me an assignment to go to one of the businesses we work with and search there computers for malware. The denoscription of the situation is that the company is separating from there partner and the owner is convinced the partner has infected there computers with viruses/malware/spyware that he has no actual proof of. I went there once and did the basics ran some virus scans and other simple checks. They came back with only one malicious file which i looked further into and it was very common thing (most likely something from the partner). I have to go back tomorrow now because the virus scan wasn't good enough for them. I have no idea how to find this or what I should do. Can anyone give me some advice on how I can find or prove that there is nothing wrong with their computers.
Submitted December 06, 2017 at 12:24AM by dk_beats
via reddit http://ift.tt/2jhLMep
I have to keep this slightly vague due to confidentiality. But I am currently working as an intern for a very small company. I am currently a Security Risk Analysis major and my internship has definitely over ranked my skills. There are no mentors in terms of security and they have given me an assignment to go to one of the businesses we work with and search there computers for malware. The denoscription of the situation is that the company is separating from there partner and the owner is convinced the partner has infected there computers with viruses/malware/spyware that he has no actual proof of. I went there once and did the basics ran some virus scans and other simple checks. They came back with only one malicious file which i looked further into and it was very common thing (most likely something from the partner). I have to go back tomorrow now because the virus scan wasn't good enough for them. I have no idea how to find this or what I should do. Can anyone give me some advice on how I can find or prove that there is nothing wrong with their computers.
Submitted December 06, 2017 at 12:24AM by dk_beats
via reddit http://ift.tt/2jhLMep
reddit
Need help determining if a computers have been... • r/security
I have to keep this slightly vague due to confidentiality. But I am currently working as an intern for a very small company. I am currently a...
Humble Book Bundle: Network & Security Certification is now live
http://ift.tt/2AxNHCY
Submitted December 06, 2017 at 01:22AM by ungarsd
via reddit http://ift.tt/2AukjQ3
http://ift.tt/2AxNHCY
Submitted December 06, 2017 at 01:22AM by ungarsd
via reddit http://ift.tt/2AukjQ3
Humble Bundle
Humble Book Bundle: Network & Security Certification by Wiley
Pay what you want for networking and security ebooks and support charity!
Thinking in Graphs: Exploring with Timesketch
http://ift.tt/2BML0Oi
Submitted December 06, 2017 at 02:02AM by j4711
via reddit http://ift.tt/2iXwA9x
http://ift.tt/2BML0Oi
Submitted December 06, 2017 at 02:02AM by j4711
via reddit http://ift.tt/2iXwA9x
Medium
Thinking in Graphs: Exploring with Timesketch
As an incident response engineer at Google, nearly every incident I’ve investigated leads to one common truth: relationships between events…
Securing Home Network
Hello, I have a quick question. I am a Security Administrator at a local IT company, and I also attend high school (I am a senior) and a local career center for Cybersecurity...I have had NAT issues in the past (on Xbox) with my ISP, and so I requested that I would be given a Public IP address, as at the time, I figured that was the best option, after attempting to configure port forwarding, DMZ, etc. with no success.Now that I am a Security Administrator, and have more knowledge in this field, what would the best course of action be?Should I ask to be given a private IP again, and try and take my hand at port forwarding again? Or is there a way I can secure my own network internally without relying on the ISP? It would be nice to be able to manage my own network's security, but I'm not sure if it is the best idea, let alone the best way to achieve that. Thank you in advance!
Submitted December 06, 2017 at 02:29AM by ksyolsen
via reddit http://ift.tt/2AZSQa2
Hello, I have a quick question. I am a Security Administrator at a local IT company, and I also attend high school (I am a senior) and a local career center for Cybersecurity...I have had NAT issues in the past (on Xbox) with my ISP, and so I requested that I would be given a Public IP address, as at the time, I figured that was the best option, after attempting to configure port forwarding, DMZ, etc. with no success.Now that I am a Security Administrator, and have more knowledge in this field, what would the best course of action be?Should I ask to be given a private IP again, and try and take my hand at port forwarding again? Or is there a way I can secure my own network internally without relying on the ISP? It would be nice to be able to manage my own network's security, but I'm not sure if it is the best idea, let alone the best way to achieve that. Thank you in advance!
Submitted December 06, 2017 at 02:29AM by ksyolsen
via reddit http://ift.tt/2AZSQa2
reddit
Securing Home Network • r/security
Hello, I have a quick question. I am a Security Administrator at a local IT company, and I also attend high school (I am a senior) and a local...
Complete Guide to Security Awareness Program Plan Strategy
http://ift.tt/2jVAr3c
Submitted December 06, 2017 at 05:36AM by Inkyandthebrain
via reddit http://ift.tt/2imvZKu
http://ift.tt/2jVAr3c
Submitted December 06, 2017 at 05:36AM by Inkyandthebrain
via reddit http://ift.tt/2imvZKu
Habitu8
Security Awareness Program Plan & Strategy Guide - Habitu8
Are you starting a security awareness training program from the ground up? Save time by using Habitu8's time-tested strategy guide as your framework!
Network Forensic Puzzles
Hello, I am hoping some of you are familiar with the content over at http://ift.tt/193Dhw0. If you are not, they are network forensic puzzles where they supply the pcap file and ask questions about the content/data that can be found in the pcap files. I am curious as to what level experience these puzzles are designed for. Are these something a novice should know how to do or are these expert level puzzles? Any input is much appreciated.
Submitted December 06, 2017 at 06:04AM by PacketCruiser
via reddit http://ift.tt/2BLWAZY
Hello, I am hoping some of you are familiar with the content over at http://ift.tt/193Dhw0. If you are not, they are network forensic puzzles where they supply the pcap file and ask questions about the content/data that can be found in the pcap files. I am curious as to what level experience these puzzles are designed for. Are these something a novice should know how to do or are these expert level puzzles? Any input is much appreciated.
Submitted December 06, 2017 at 06:04AM by PacketCruiser
via reddit http://ift.tt/2BLWAZY
reddit
Network Forensic Puzzles • r/security
Hello, I am hoping some of you are familiar with the content over at http://forensicscontest.com/puzzles. If you are not, they are network...
Incoming Mailsploit is here.
http://ift.tt/2AQQ2vx
Submitted December 06, 2017 at 07:38AM by vadermuscle
via reddit http://ift.tt/2AyFnD1
http://ift.tt/2AQQ2vx
Submitted December 06, 2017 at 07:38AM by vadermuscle
via reddit http://ift.tt/2AyFnD1
BleepingComputer
Mailsploit Lets Attackers Send Spoofed Emails on Over 33 Email Clients
German security researcher Sabri Haddouche has discovered a set of vulnerabilities that he collectively refers to as Mailsploit, and which allow an attacker to spoof email identities, and in some cases, run malicious code on the user's computer.
Search engine for content shared publicly via cloud storage services
http://ift.tt/2nvQSrT
Submitted December 06, 2017 at 08:48AM by nightwatchcyber
via reddit http://ift.tt/2B1MlDI
http://ift.tt/2nvQSrT
Submitted December 06, 2017 at 08:48AM by nightwatchcyber
via reddit http://ift.tt/2B1MlDI
GitHub
nightwatchcybersecurity/public-cloud-storage-search
public-cloud-storage-search - A search engine for content shared publicly via cloud storage services
All the Speaker Videos from Security@ 2017 Conference
http://ift.tt/2AxPF8C
Submitted December 06, 2017 at 03:58PM by campuscodi
via reddit http://ift.tt/2BNsMvS
http://ift.tt/2AxPF8C
Submitted December 06, 2017 at 03:58PM by campuscodi
via reddit http://ift.tt/2BNsMvS
info.hacker.one
Speaker Videos - Security@ 2017
Watch recorded talks from top hackers and security leaders at the Security@ 2017 Conference
Mood Lighting Systems Mumbai Pune Bangalore Goa Vashi Thane Nasik
http://ift.tt/2kKI2li
Submitted December 06, 2017 at 03:33PM by aayati123
via reddit http://ift.tt/2kqM3iD
http://ift.tt/2kKI2li
Submitted December 06, 2017 at 03:33PM by aayati123
via reddit http://ift.tt/2kqM3iD
Aayatiautomation
Mood Lighting Systems Mumbai Pune Bangalore Goa Vashi Thane Nasik
LED Mood Lighting Systems in Mumbai Pune Bangalore Vashi Thane Nasik Goa Mangalore Kolhapur Baroda Surat Vapi Lonavala Khandala Lavasa Hyderabad Ratnagiri Alibaug
Champing at the Cyberbit: Ethiopian Dissidents Targeted with New Commercial Spyware
http://ift.tt/2nytSZm
Submitted December 06, 2017 at 05:48PM by Setaya69
via reddit http://ift.tt/2zUaXKo
http://ift.tt/2nytSZm
Submitted December 06, 2017 at 05:48PM by Setaya69
via reddit http://ift.tt/2zUaXKo
The Citizen Lab
Champing at the Cyberbit: Ethiopian Dissidents Targeted with New Commercial Spyware
This report outlines how Ethiopian dissidents were targeted with emails containing commercial spyware posing as Adobe Flash updates and PDF plugins.
5 Free VPN Apps for Android that aren't completely terrible
https://www.youtube.com/watch?v=VEr1zR76Zuo
Submitted December 06, 2017 at 07:41PM by TheFearsomeBlob
via reddit http://ift.tt/2knxGLM
https://www.youtube.com/watch?v=VEr1zR76Zuo
Submitted December 06, 2017 at 07:41PM by TheFearsomeBlob
via reddit http://ift.tt/2knxGLM
YouTube
Top 5 Best FREE VPN for Android (2018-2019)
The absolute best free VPN apps for Android devices. Links & downloads in denoscription 🔻🔻🔻 LIKE ✔️ COMMENT ✔️ SUB ✔️ Get a VPN & Support The Channel: http://m...
Security In 5: Episode 126 - Why Are Data Breaches So Expensive For Businesses?
http://ift.tt/2BOFsT6
Submitted December 06, 2017 at 07:37PM by BinaryBlog
via reddit http://ift.tt/2ks3Gyr
http://ift.tt/2BOFsT6
Submitted December 06, 2017 at 07:37PM by BinaryBlog
via reddit http://ift.tt/2ks3Gyr
Libsyn
Security In Five Podcast: Episode 126 - Why Are Data Breaches So Expensive For Businesses?
We all hear about data breaches but do you know exactly all the costs that go into the recovery of them? It's far more complicated than you realized and for some businesses might be a bankruptcy level event. This episode goes into the details of the various…
Recovering Huffman tables in Intel ME 11.x
http://ift.tt/2nvKPDP
Submitted December 06, 2017 at 07:46PM by campuscodi
via reddit http://ift.tt/2BE6EDk
http://ift.tt/2nvKPDP
Submitted December 06, 2017 at 07:46PM by campuscodi
via reddit http://ift.tt/2BE6EDk
Ptsecurity
Recovering Huffman tables in Intel ME 11.x
Today Positive Technologies' expert Dmitry Sklyarov will explain how Intel ME 11.x stores its state on the flash and the other types of fi...
Anti-Skimmer Detector for Skimmer Scammers
http://ift.tt/2jjnAsc
Submitted December 06, 2017 at 08:54PM by volci
via reddit http://ift.tt/2nvPFkm
http://ift.tt/2jjnAsc
Submitted December 06, 2017 at 08:54PM by volci
via reddit http://ift.tt/2nvPFkm
reddit
Anti-Skimmer Detector for Skimmer Scammers • r/security
2 points and 0 comments so far on reddit
First part of phishing with EV
http://ift.tt/2h2wpbr
Submitted December 06, 2017 at 09:28PM by Sjoerder
via reddit http://ift.tt/2zURAAG
http://ift.tt/2h2wpbr
Submitted December 06, 2017 at 09:28PM by Sjoerder
via reddit http://ift.tt/2zURAAG
James Burton
First part of phishing with EV
This post is intended for a technical audience interested in how an EV SSL certificate can be used as an effective phishing device. I won't be held liable if someone uses this post for unlawful intentions. No one was harmed in this demonstration. Let's get…