This Is Why Secret Questions For Authentication Are A Bad Idea
http://ift.tt/2zZvvRI
Submitted December 08, 2017 at 06:54AM by InternetBowzer
via reddit http://ift.tt/2A1WBYb
http://ift.tt/2zZvvRI
Submitted December 08, 2017 at 06:54AM by InternetBowzer
via reddit http://ift.tt/2A1WBYb
MlakarTechTalk
Knowledge Based Authentication and Data Breaches - Your Security Questions Are Belong to Us – MlakarTechTalk
@TroyHunt #DataSecurity #authentication #databreaches
Security Now 640 More News & Feedback | TWiT.TV
http://ift.tt/2zRnH4a
Submitted December 08, 2017 at 06:39AM by dmp1ce
via reddit http://ift.tt/2nBVRas
http://ift.tt/2zRnH4a
Submitted December 08, 2017 at 06:39AM by dmp1ce
via reddit http://ift.tt/2nBVRas
TWiT.tv
Security Now 640 More News & Feedback | TWiT.TV
This week we discuss the long-awaited end of StartCom & StartSSL, inside last week's macOS passwordless root account access and problems with Apple's patches, the question of A…
Elevation of Privilege vulnerability (CVE-2017-3891) in QNX Qnet
http://ift.tt/2Bg9cey
Submitted December 08, 2017 at 11:08AM by 2ROT13
via reddit http://ift.tt/2j6pOOK
http://ift.tt/2Bg9cey
Submitted December 08, 2017 at 11:08AM by 2ROT13
via reddit http://ift.tt/2j6pOOK
Midnight Blue
Elevation of Privilege vulnerability in QNX Qnet
In this blog post i will cover QNX's Qnet native networking protocol and an Elevation of Privilege vulnerability (CVE-2017-3891) i discovered in it.
Disco, or what happens when you attempt to merge the Noise and Strobe protocol frameworks
http://ift.tt/2j99s7V
Submitted December 08, 2017 at 03:31PM by davidw_-
via reddit http://ift.tt/2AmZOpM
http://ift.tt/2j99s7V
Submitted December 08, 2017 at 03:31PM by davidw_-
via reddit http://ift.tt/2AmZOpM
www.cryptologie.net
Disco
Yesterday I gave a talk at Black Hat about my recent research with Disco.
I've introduced both the Strobe protocol framework and the Noise protocol framework in the past. So I won't go over them again, but I advise you to read these two blog posts before…
I've introduced both the Strobe protocol framework and the Noise protocol framework in the past. So I won't go over them again, but I advise you to read these two blog posts before…
Disco: a plug-and-play protocol to encrypt communications and a cryptographic library in Golang
http://ift.tt/2kCYVCd
Submitted December 08, 2017 at 03:30PM by davidw_-
via reddit http://ift.tt/2nHaae6
http://ift.tt/2kCYVCd
Submitted December 08, 2017 at 03:30PM by davidw_-
via reddit http://ift.tt/2nHaae6
macOS High Sierra 10.13.1 insecure cron system
http://ift.tt/2BThGFI
Submitted December 08, 2017 at 03:29PM by lyinch
via reddit http://ift.tt/2AovEm0
http://ift.tt/2BThGFI
Submitted December 08, 2017 at 03:29PM by lyinch
via reddit http://ift.tt/2AovEm0
Equifax to Uber, executives could soon serve jail time over hacks
http://ift.tt/2njNMXQ
Submitted December 08, 2017 at 03:13PM by GemmaJ123
via reddit http://ift.tt/2jvbWdL
http://ift.tt/2njNMXQ
Submitted December 08, 2017 at 03:13PM by GemmaJ123
via reddit http://ift.tt/2jvbWdL
Fox Business
Equifax to Uber, executives could soon serve jail time over hacks
A new bill could send company executives to jail if they fail to disclose a cybersecurity event to the public within a reasonable amount of time, or intentionally attempt to conceal it.
Ai.Type data leak: 31 million users' personal data exposed due to MongoDB cloud configuration error
http://ift.tt/2iYf2dm
Submitted December 08, 2017 at 03:13PM by GemmaJ123
via reddit http://ift.tt/2kzp4BR
http://ift.tt/2iYf2dm
Submitted December 08, 2017 at 03:13PM by GemmaJ123
via reddit http://ift.tt/2kzp4BR
International Business Times UK
Ai.Type data leak: 31 million users' personal data exposed due to MongoDB cloud configuration error
"Based on the leaked database they appear to collect everything from contacts to keystrokes," researchers said.
Dark Army has 600k+ implants (Mr Robot ep3.8 writeup)
http://ift.tt/2AEWy85
Submitted December 08, 2017 at 03:48PM by fr3dsmith
via reddit http://ift.tt/2BhwDUZ
http://ift.tt/2AEWy85
Submitted December 08, 2017 at 03:48PM by fr3dsmith
via reddit http://ift.tt/2BhwDUZ
Medium
Mr. Robot Disassembled: eps3.8_stage3.torrent
A behind-the-scenes look at the hacks in “eps3.8_stage3.torrent”, featuring memory forensics, rootkits, fuzzing, covert C2, and more!
Microsoft Issues Emergency Windows Security Update For A Critical Vulnerability
http://ift.tt/2A2rU5e
Submitted December 08, 2017 at 06:16PM by Got_Intel
via reddit http://ift.tt/2yOKgZk
http://ift.tt/2A2rU5e
Submitted December 08, 2017 at 06:16PM by Got_Intel
via reddit http://ift.tt/2yOKgZk
The Hacker News
Microsoft Issues Emergency Windows Security Update For A Critical Vulnerability
Microsoft Issues Emergency Patch For 'Critical' RCE Bug (CVE-2017-11937) in Windows Malware Protection Engine
How I Hacked WhatsApp, and Added Contacts to Groups When Being Blocked
http://ift.tt/2A3gQF6
Submitted December 08, 2017 at 06:33PM by HUCK45
via reddit http://ift.tt/2B2nBuA
http://ift.tt/2A3gQF6
Submitted December 08, 2017 at 06:33PM by HUCK45
via reddit http://ift.tt/2B2nBuA
reddit
How I Hacked WhatsApp, and Added Contacts to Groups... • r/netsec
6 points and 4 comments so far on reddit
Microsoft leaks TLS private key for cloud ERP product (and it was still in use for more than 100 days after the initial report)
http://ift.tt/2AG2Bcy
Submitted December 08, 2017 at 06:29PM by grepnork
via reddit http://ift.tt/2AFnDG6
http://ift.tt/2AG2Bcy
Submitted December 08, 2017 at 06:29PM by grepnork
via reddit http://ift.tt/2AFnDG6
Medium
Microsoft leaks TLS private key for cloud ERP product
… and it was still in use for more than 100 days after the initial report
Another Flip in the Wall of Rowhammer Defenses
http://ift.tt/2hJFdDA
Submitted December 08, 2017 at 06:29PM by NagateTanikaze
via reddit http://ift.tt/2B3Pkv3
http://ift.tt/2hJFdDA
Submitted December 08, 2017 at 06:29PM by NagateTanikaze
via reddit http://ift.tt/2B3Pkv3
reddit
Another Flip in the Wall of Rowhammer Defenses • r/netsec
3 points and 0 comments so far on reddit
Detecting Lateral Movement through Tracking Event Logs (Version 2). By JPCERT
http://ift.tt/2imU0Ba
Submitted December 08, 2017 at 06:14PM by 2xyo
via reddit http://ift.tt/2nJOHRw
http://ift.tt/2imU0Ba
Submitted December 08, 2017 at 06:14PM by 2xyo
via reddit http://ift.tt/2nJOHRw
JPCERT/CC Blog
Research Report Released: Detecting Lateral Movement through Tracking Event Logs (Version 2)
In June 2017, JPCERT/CC released a report “Detecting Lateral Movement through Tracking Event Logs” on tools and commands that are likely used by attackers in lateral movement, and traces that are left on Windows OS as a result of such...
Security In 5: Episode 128 - Tools, Tips and Tricks - Evernote
http://ift.tt/2jwfv3v
Submitted December 08, 2017 at 07:31PM by BinaryBlog
via reddit http://ift.tt/2BPloiD
http://ift.tt/2jwfv3v
Submitted December 08, 2017 at 07:31PM by BinaryBlog
via reddit http://ift.tt/2BPloiD
Libsyn
Security In Five Podcast: Episode 128 - Tools, Tips and Tricks - Evernote
This week's TTT episode talks about the cloud file, note and thought organizer Evernote. Over the years Evernote has solidified themselves as a robust, feature full online cloud and productivity tool. Use it to store receipts, manuals, web articles, thoughts…
New Android vulnerability allows attackers to modify apps without affecting their signatures
http://ift.tt/2A2ieHV
Submitted December 08, 2017 at 08:06PM by speckz
via reddit http://ift.tt/2kDcLVg
http://ift.tt/2A2ieHV
Submitted December 08, 2017 at 08:06PM by speckz
via reddit http://ift.tt/2kDcLVg
GuardSquare
New Android vulnerability allows attackers to modify apps without affecting their signatures
A serious vulnerability (CVE-2017-13156) in Android allows attackers to modify the code in applications without affecting their signatures. The root of the problem is that a file can be a valid APK file and a valid DEX file at the same time. We have named…
OSCP Course & Exam Preparation
http://ift.tt/2j6Wdo6
Submitted December 08, 2017 at 08:32PM by 411Hall
via reddit http://ift.tt/2jwfdcP
http://ift.tt/2j6Wdo6
Submitted December 08, 2017 at 08:32PM by 411Hall
via reddit http://ift.tt/2jwfdcP
Ellingson Mineral
OSCP Course & Exam Preparation
Full disclosure I am not a penetration tester and I failed my OSCP exam twice before eventually passing on the third attempt. I owned more than 90% of boxes in the labs (including the big three) but when it came to the exam I just kept bombing out. I am…
A Quarter of Phishing Attacks are Now Hosted on HTTPS Domains: Why?
http://ift.tt/2iqdHIn
Submitted December 08, 2017 at 10:45PM by EvanConover
via reddit http://ift.tt/2AFS66L
http://ift.tt/2iqdHIn
Submitted December 08, 2017 at 10:45PM by EvanConover
via reddit http://ift.tt/2AFS66L
Phishlabs
A Quarter of Phishing Attacks are Now Hosted on HTTPS Domains: Why?
As more websites obtain SSL certificates, the number of potential HTTPS websites available for compromise increases.
Is the password Aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa is as secure as HonestAbePassedOutFourScoreAndSevenBeersAgo? (same entropy)
x-post from my own comment on this threadAfter posting that I'm suddenly unsure of myself. I've always wondered if the number 1 was less secure than a 9, since the brute force guesses would presumably start at 1.
Submitted December 09, 2017 at 12:08AM by daweinah
via reddit http://ift.tt/2kcFH2y
x-post from my own comment on this threadAfter posting that I'm suddenly unsure of myself. I've always wondered if the number 1 was less secure than a 9, since the brute force guesses would presumably start at 1.
Submitted December 09, 2017 at 12:08AM by daweinah
via reddit http://ift.tt/2kcFH2y
reddit
Made a QR Code coaster for when I have guest and... • r/3Dprinting
reddit: the front page of the internet
Data exfiltration with Metasploit. Meterpreter DNS tunnel project pre-released
http://ift.tt/2BjMAdx
Submitted December 07, 2017 at 05:20AM by agrrrdog
via reddit http://ift.tt/2kC9iWZ
http://ift.tt/2BjMAdx
Submitted December 07, 2017 at 05:20AM by agrrrdog
via reddit http://ift.tt/2kC9iWZ
asintsov.blogspot.co.uk
Data exfiltration with Metasploit: meterpreter DNS tunnel
Meterpreter is a well-known Metasploit [1] remote agent for pentester's needs. This multi-staged payload is a good, flexible and easy-...
Exposing Hidden Exploitable Behaviors in Programming Languages Using Differential Fuzzing
http://ift.tt/2kHJLMh
Submitted December 08, 2017 at 11:48PM by cwardnet
via reddit http://ift.tt/2AFYj2z
http://ift.tt/2kHJLMh
Submitted December 08, 2017 at 11:48PM by cwardnet
via reddit http://ift.tt/2AFYj2z