Why you can break encryption on a CD but not a VPN connection?
No text found
Submitted December 13, 2017 at 12:44AM by G0rd0nGekk0
via reddit http://ift.tt/2z47XNC
No text found
Submitted December 13, 2017 at 12:44AM by G0rd0nGekk0
via reddit http://ift.tt/2z47XNC
reddit
Why you can break encryption on a CD but not a VPN... • r/security
1 points and 1 comments so far on reddit
Looking to get into cybersecurity; Would love some advice.
Hello r/security. My name is Joel and I am fourteen years old. I would love to get into the cybersecurity field, although I don't know where to start.Here's a bit of information about my history within IT and security.I know consumer grade hardware inside-out; Enterprise grade not so much. I have studied to become a sysadmin, although I have been informed that the majority of sysadmins get treated like shit. This means that I have some experience within windows server, and networking. I know most things within windows, although I don't think that'll matter as I believe a lot of cybersecurity stuff is done on Kali, or another Linux distribution.The programming languages I know are: Python, C# and Powershell I know C# to the extent of someone in between 'beginner' and 'intermediate' As far as python goes, I don't really like the language too much; But I do know a bit of normal python e.g. No libraries, just basic stuff. I believe powershell is a noscripting language, but I do know a tiny bit of it.I don't explicitly know where I would like to go in the cybersecurity field, although I know that I want to work in it. To be fair, I don't even know what kind of jobs there are in the cybersecurity field.Essentially, I'm looking for a person to guide me within my cybersecurity career.Any advice on where I should start?I apologize if any of this appeared rude, as I'm not the greatest with phrasing things and grammar.
Submitted December 13, 2017 at 01:16AM by joelazot
via reddit http://ift.tt/2jTrbxd
Hello r/security. My name is Joel and I am fourteen years old. I would love to get into the cybersecurity field, although I don't know where to start.Here's a bit of information about my history within IT and security.I know consumer grade hardware inside-out; Enterprise grade not so much. I have studied to become a sysadmin, although I have been informed that the majority of sysadmins get treated like shit. This means that I have some experience within windows server, and networking. I know most things within windows, although I don't think that'll matter as I believe a lot of cybersecurity stuff is done on Kali, or another Linux distribution.The programming languages I know are: Python, C# and Powershell I know C# to the extent of someone in between 'beginner' and 'intermediate' As far as python goes, I don't really like the language too much; But I do know a bit of normal python e.g. No libraries, just basic stuff. I believe powershell is a noscripting language, but I do know a tiny bit of it.I don't explicitly know where I would like to go in the cybersecurity field, although I know that I want to work in it. To be fair, I don't even know what kind of jobs there are in the cybersecurity field.Essentially, I'm looking for a person to guide me within my cybersecurity career.Any advice on where I should start?I apologize if any of this appeared rude, as I'm not the greatest with phrasing things and grammar.
Submitted December 13, 2017 at 01:16AM by joelazot
via reddit http://ift.tt/2jTrbxd
reddit
Looking to get into cybersecurity; Would love some... • r/security
Hello r/security. My name is Joel and I am fourteen years old. I would love to get into the cybersecurity field, although I don't know where to...
Authoritative DNS Performance Analytics and Comparison
http://ift.tt/2pLNjgM
Submitted December 13, 2017 at 01:45AM by rmddos
via reddit http://ift.tt/2BEvBm3
http://ift.tt/2pLNjgM
Submitted December 13, 2017 at 01:45AM by rmddos
via reddit http://ift.tt/2BEvBm3
Dnsperf
DNS Performance
Compare the speed and uptime of enterprise and commercial DNS services
Detection and recovery of NSA’s covered up tracks
http://ift.tt/2kDyEUr
Submitted December 12, 2017 at 07:53PM by digicat
via reddit http://ift.tt/2jDHfX0
http://ift.tt/2kDyEUr
Submitted December 12, 2017 at 07:53PM by digicat
via reddit http://ift.tt/2jDHfX0
Fox-IT International blog
Detection and recovery of NSA’s covered up tracks
Part of the NSA cyber weapon framework DanderSpritz is eventlogedit, a piece of software capable of removing individual lines from Windows Event Log files. Now that this tool is leaked and public, …
Got a verification email from "Huobi", which is something I have never used. What do I do?
I just received this email:Hello, Welcome to Huobi! You have recently received instructions to enter a one-time authentication code to create your Huobi account. Your code is: XXXXXX For security reasons, this code will expire in 30 minutes. Sincerely, The Huobi Team https://www.huobi.proI have no idea what Huobi is and I have never used it before. I immediately changed my email password. Is there anything else I should do?
Submitted December 13, 2017 at 02:29AM by noxumida
via reddit http://ift.tt/2BGHSGI
I just received this email:Hello, Welcome to Huobi! You have recently received instructions to enter a one-time authentication code to create your Huobi account. Your code is: XXXXXX For security reasons, this code will expire in 30 minutes. Sincerely, The Huobi Team https://www.huobi.proI have no idea what Huobi is and I have never used it before. I immediately changed my email password. Is there anything else I should do?
Submitted December 13, 2017 at 02:29AM by noxumida
via reddit http://ift.tt/2BGHSGI
Security ChatOps Checklist: How to Evaluate Your SOC’s Readiness For ChatOps
http://ift.tt/2l3S6dg
Submitted December 13, 2017 at 02:25AM by abhishekiyer
via reddit http://ift.tt/2AfU6BL
http://ift.tt/2l3S6dg
Submitted December 13, 2017 at 02:25AM by abhishekiyer
via reddit http://ift.tt/2AfU6BL
Demisto
Security ChatOps Checklist: How to Evaluate Your SOC’s Readiness For ChatOps
Security ChatOps is setting analysts abuzz. Learn how to evaluate your SOC's readiness to implement Security ChatOps with a comprehensive checklist.
Introducing Anubis, a new subdomain enumeration and information gathering tool
http://ift.tt/2BGWLcg
Submitted December 13, 2017 at 03:50AM by JonLuca
via reddit http://ift.tt/2z3QaWL
http://ift.tt/2BGWLcg
Submitted December 13, 2017 at 03:50AM by JonLuca
via reddit http://ift.tt/2z3QaWL
GitHub
jonluca/Anubis
🔓Subdomain enumeration and information gathering tool - jonluca/Anubis
What We Can Learn From The Uber Hack And Response
http://ift.tt/2AOAS7C
Submitted December 13, 2017 at 04:10AM by abhishekiyer
via reddit http://ift.tt/2BZmLLT
http://ift.tt/2AOAS7C
Submitted December 13, 2017 at 04:10AM by abhishekiyer
via reddit http://ift.tt/2BZmLLT
reddit
What We Can Learn From The Uber Hack And Response • r/security
1 points and 0 comments so far on reddit
Popular Destinations rerouted to Russia - 80 prefixes normally announced by organizations such Google, Apple, Facebook, Microsoft, Twitch, NTT Communications and Riot Games were redirected during two event windows of about three minutes each
http://ift.tt/2C6Ahyf
Submitted December 13, 2017 at 03:55AM by speckz
via reddit http://ift.tt/2BcV05Z
http://ift.tt/2C6Ahyf
Submitted December 13, 2017 at 03:55AM by speckz
via reddit http://ift.tt/2BcV05Z
reddit
Popular Destinations rerouted to Russia - 80 prefixes... • r/security
1 points and 0 comments so far on reddit
Anyone know when Duo Security will support Pulse Connect Secure 8.3Rx?
EDIT: I'm an idiot. I didn't have DNS configured properly on my new 8.3 Pulse VM, so it couldn't reach any URLs. Fixed DNS and Duo works...Original post below: At the moment, Duo only supports Pulse Connect Secure 8.2Rx. Anyone in the loop on when they may update their integration? I have the free Duo account, so I can't ask Duo directly.Source: http://ift.tt/2C7hYJn
Submitted December 13, 2017 at 05:04AM by iPhoid
via reddit http://ift.tt/2nUvU67
EDIT: I'm an idiot. I didn't have DNS configured properly on my new 8.3 Pulse VM, so it couldn't reach any URLs. Fixed DNS and Duo works...Original post below: At the moment, Duo only supports Pulse Connect Secure 8.2Rx. Anyone in the loop on when they may update their integration? I have the free Duo account, so I can't ask Duo directly.Source: http://ift.tt/2C7hYJn
Submitted December 13, 2017 at 05:04AM by iPhoid
via reddit http://ift.tt/2nUvU67
Duo Security
Two-Factor Authentication for Pulse Secure SSL VPN
Duo integrates with your Pulse Connect Secure SSL VPN to add tokenless two-factor authentication to any VPN login.
XXE - Things Are Getting Out of Band
http://ift.tt/2Axe6Ea
Submitted December 13, 2017 at 05:03AM by ZephrX112
via reddit http://ift.tt/2AOZmNU
http://ift.tt/2Axe6Ea
Submitted December 13, 2017 at 05:03AM by ZephrX112
via reddit http://ift.tt/2AOZmNU
ZeroSec - Adventures In Information Security
XXE - Things Are Getting Out of Band
XXE Out of Band testing, explaining how to execute XXE OOB attacks over HTTP & FTP. Additional explanation on XXE RCE.
Searchable database of 1.4 billion stolen credentials found on dark web
http://ift.tt/2nUAsJN
Submitted December 13, 2017 at 07:35AM by grepnork
via reddit http://ift.tt/2AyAHjT
http://ift.tt/2nUAsJN
Submitted December 13, 2017 at 07:35AM by grepnork
via reddit http://ift.tt/2AyAHjT
IT World Canada
Searchable database of 1.4 billion stolen credentials found on dark web
A security vendor has discovered a huge list of easily searchable stolen credentials in cleartext on the dark web which it fears
Cryptsky - an open source ransomware
http://ift.tt/2nVdv9j
Submitted December 13, 2017 at 03:05PM by sirKareon
via reddit http://ift.tt/2ASyJrw
http://ift.tt/2nVdv9j
Submitted December 13, 2017 at 03:05PM by sirKareon
via reddit http://ift.tt/2ASyJrw
GitHub
deadPix3l/CryptSky
CryptSky - A simple, fully python ransomware PoC
Nessus Professional v7 announced
http://ift.tt/2AxifYK
Submitted December 13, 2017 at 02:23PM by brainscrewer
via reddit http://ift.tt/2BZNkjY
http://ift.tt/2AxifYK
Submitted December 13, 2017 at 02:23PM by brainscrewer
via reddit http://ift.tt/2BZNkjY
Tenable™
Announcing Nessus Professional v7
We’re pleased to announce Nessus Professional v7. More than 20,000 organizations today use Nessus Professional and there are more than a million and a half Nessus users worldwide.
Information Security Project
Could you be me some ideas on what topic my project on Information Security course will be? It's just a course project and not a final year project. So it should not be very easy nor very hard. Thank you.
Submitted December 13, 2017 at 04:20PM by DsTyM
via reddit http://ift.tt/2j08hUE
Could you be me some ideas on what topic my project on Information Security course will be? It's just a course project and not a final year project. So it should not be very easy nor very hard. Thank you.
Submitted December 13, 2017 at 04:20PM by DsTyM
via reddit http://ift.tt/2j08hUE
reddit
Information Security Project • r/security
Could you be me some ideas on what topic my project on Information Security course will be? It's just a course project and not a final year...
Mozilla's AMO Extensions store has a spam infestation problem
http://ift.tt/2yjRYav
Submitted December 13, 2017 at 06:35PM by imr2017
via reddit http://ift.tt/2ymsJEs
http://ift.tt/2yjRYav
Submitted December 13, 2017 at 06:35PM by imr2017
via reddit http://ift.tt/2ymsJEs
gHacks Technology News
Mozilla’s AMO Extensions store has a spam infestation problem
If you visit the official Mozilla AMO -- Addons Mozilla Org -- site right now you may notice an increase in extensions that are pure spam.
Security In 5: Episode 131 - A Major Breach Exposed A Company Was Stealing Your Data
http://ift.tt/2AiuxjH
Submitted December 13, 2017 at 07:31PM by BinaryBlog
via reddit http://ift.tt/2z8Agua
http://ift.tt/2AiuxjH
Submitted December 13, 2017 at 07:31PM by BinaryBlog
via reddit http://ift.tt/2z8Agua
Libsyn
Security In Five Podcast: Episode 131 - A Major Breach Exposed A Company Was Stealing Your Data
A major breach with a popular keyboard app showed that they were collecting far more data on their users than they should. This makes all of us think twice whenever an app asks for Full Access to your devices. In this case, they were taking every piece of…
Analysing pastebin data using PasteHunter and ELK
http://ift.tt/2AACG7c
Submitted December 13, 2017 at 07:57PM by kev-thehermit
via reddit http://ift.tt/2iXwefb
http://ift.tt/2AACG7c
Submitted December 13, 2017 at 07:57PM by kev-thehermit
via reddit http://ift.tt/2iXwefb
reddit
Analysing pastebin data using PasteHunter and ELK • r/netsec
2 points and 0 comments so far on reddit
Adware company threatens to sue malware researcher for finding similarities to malware
http://ift.tt/2C6LX3U
Submitted December 13, 2017 at 07:48PM by Eliad-Cybereason
via reddit http://ift.tt/2ASjHC5
http://ift.tt/2C6LX3U
Submitted December 13, 2017 at 07:48PM by Eliad-Cybereason
via reddit http://ift.tt/2ASjHC5
Cybereason
OSX.Pirrit Mac Adware Part III: The DaVinci Code
Cybereason researcher Amit Serper discovers a new variant of TargetingEdge's Mac OSX Pirrit malware, now this adware includes remote access tool RAT capabilities.
The Curious Case of Caching CSRF Tokens
http://ift.tt/2ymFWwQ
Submitted December 13, 2017 at 07:47PM by civicode
via reddit http://ift.tt/2BYd7Jx
http://ift.tt/2ymFWwQ
Submitted December 13, 2017 at 07:47PM by civicode
via reddit http://ift.tt/2BYd7Jx
reddit
The Curious Case of Caching CSRF Tokens • r/netsec
0 points and 0 comments so far on reddit
TLS 'ROBOT' Vulnerability Allows Attackers to Obtain RSA Key Through Discrepancies in PKCS Padding
http://ift.tt/2BEEV9M
Submitted December 13, 2017 at 09:55PM by Derbel__McDillet
via reddit http://ift.tt/2j08Ygs
http://ift.tt/2BEEV9M
Submitted December 13, 2017 at 09:55PM by Derbel__McDillet
via reddit http://ift.tt/2j08Ygs
www.kb.cert.org
Vulnerability Note VU#144389 - TLS implementations may disclose side channel information via discrepencies between valid and invalid…
TLS implementations may disclose side channel information via discrepancies between valid and invalid PKCS#1 padding, and may therefore be vulnerable to Bleichenbacher-style attacks.. This attack is known as a