WannaCry: End of Year Retrospective
http://ift.tt/2kmU9pC
Submitted December 20, 2017 at 06:53AM by not_2sec4u
via reddit http://ift.tt/2BzPesz
http://ift.tt/2kmU9pC
Submitted December 20, 2017 at 06:53AM by not_2sec4u
via reddit http://ift.tt/2BzPesz
Kryptoslogic
WannaCry: End of Year Retrospective
Last November marked the six-month anniversary of WannaCry, arguably the most impactful global cyberattack in history. The persisting WannaCry attack is a re...
Every Single American Household Exposed in Massive Leak - Infosecurity Magazine
http://ift.tt/2BzF4bz
Submitted December 20, 2017 at 06:53AM by artTho
via reddit http://ift.tt/2kmWqRv
http://ift.tt/2BzF4bz
Submitted December 20, 2017 at 06:53AM by artTho
via reddit http://ift.tt/2kmWqRv
Infosecurity Magazine
Every Single American Household Exposed in Massive Leak
Yet another Amazon S3 cloud storage misconfiguration has affected 123 million Americans, across billions of data points.
Mastercard Internet Gateway Service: Hashing Design Flaw
http://ift.tt/2eGK9YH
Submitted December 20, 2017 at 03:34PM by nishaanthguna
via reddit http://ift.tt/2z3hDo3
http://ift.tt/2eGK9YH
Submitted December 20, 2017 at 03:34PM by nishaanthguna
via reddit http://ift.tt/2z3hDo3
reddit
Mastercard Internet Gateway Service: Hashing Design Flaw • r/security
2 points and 1 comments so far on reddit
How to Get Notified When Your Ubuntu Box Needs Security Updates
http://ift.tt/2jafRfC
Submitted December 20, 2017 at 03:41PM by danielrm26
via reddit http://ift.tt/2oVd53t
http://ift.tt/2jafRfC
Submitted December 20, 2017 at 03:41PM by danielrm26
via reddit http://ift.tt/2oVd53t
Daniel Miessler
How to Get Notified When Your Ubuntu Box Needs Security Updates
If you've been messing with Linux for a while you've no doubt seen screens like the above a million times. But for me it's never been enough. If you have l
Does the cloud secure to put my company private data there?
Sorry if this is the wrong subreddit to ask this. my question is it secure to move my private an critical data of my company to a cloud with a big company?if no what U advice and suggest...Any help would be appreciated thanks!
Submitted December 20, 2017 at 04:35PM by besmile4ever
via reddit http://ift.tt/2kNDVVZ
Sorry if this is the wrong subreddit to ask this. my question is it secure to move my private an critical data of my company to a cloud with a big company?if no what U advice and suggest...Any help would be appreciated thanks!
Submitted December 20, 2017 at 04:35PM by besmile4ever
via reddit http://ift.tt/2kNDVVZ
reddit
Does the cloud secure to put my company private data... • r/security
Sorry if this is the wrong subreddit to ask this. my question is it secure to move my private an critical data of my company to a cloud with a big...
Collecting Secure Data?
HiProbably soon the Dutch Intel Agencies are able to collect internet data on a massive scale. NSA is already doing this if i'm correct.But what is the point of collecting this data? because it's usually encrypted. Assuming the Intel Agencies don't have the decryption keys.
Submitted December 20, 2017 at 04:01PM by b00h
via reddit http://ift.tt/2B4T1gH
HiProbably soon the Dutch Intel Agencies are able to collect internet data on a massive scale. NSA is already doing this if i'm correct.But what is the point of collecting this data? because it's usually encrypted. Assuming the Intel Agencies don't have the decryption keys.
Submitted December 20, 2017 at 04:01PM by b00h
via reddit http://ift.tt/2B4T1gH
reddit
Collecting Secure Data? • r/security
Hi Probably soon the Dutch Intel Agencies are able to collect internet data on a massive scale. NSA is already doing this if i'm correct. But...
A couple questions about internet security/privacy
Hey guys.I was wondering if you guys could help me out with a couple questions regarding internet security and privacy:Can someone tap the traffic when using your mobile phone network, like you can tap the traffic on a normal network? Can the traffic be connected to a specific person/device? If so, then how?If I'm on a tapped network, like a school network, will the person tapping the network be able to connect the traffic to a specific person/device? If so, then how?If I'm on my home network, will my ISP be able to connect the traffic to a specific person/device? If so, then how?Would really appreciate if you guys could help me! Thanks in advance!
Submitted December 20, 2017 at 05:40PM by PinkySmartass
via reddit http://ift.tt/2oYBJQA
Hey guys.I was wondering if you guys could help me out with a couple questions regarding internet security and privacy:Can someone tap the traffic when using your mobile phone network, like you can tap the traffic on a normal network? Can the traffic be connected to a specific person/device? If so, then how?If I'm on a tapped network, like a school network, will the person tapping the network be able to connect the traffic to a specific person/device? If so, then how?If I'm on my home network, will my ISP be able to connect the traffic to a specific person/device? If so, then how?Would really appreciate if you guys could help me! Thanks in advance!
Submitted December 20, 2017 at 05:40PM by PinkySmartass
via reddit http://ift.tt/2oYBJQA
reddit
A couple questions about internet security/privacy • r/security
Hey guys. I was wondering if you guys could help me out with a couple questions regarding internet security and privacy: Can someone tap the...
The Cyber Version of A Visit from St Nicholas
https://www.youtube.com/watch?v=jsPE8vhXW-c
Submitted December 20, 2017 at 05:51PM by umineko938
via reddit http://ift.tt/2oWfzyC
https://www.youtube.com/watch?v=jsPE8vhXW-c
Submitted December 20, 2017 at 05:51PM by umineko938
via reddit http://ift.tt/2oWfzyC
YouTube
Merry Christmas from Nehemiah Security!
To hear the rest of the holiday story, visit https://nehemiahsecurity.com/
Arrests in attacks of CTB Locker, top malware of 2016
http://ift.tt/2BlONVV
Submitted December 20, 2017 at 06:40PM by jeffthechimp
via reddit http://ift.tt/2BGQiLp
http://ift.tt/2BlONVV
Submitted December 20, 2017 at 06:40PM by jeffthechimp
via reddit http://ift.tt/2BGQiLp
McAfee Blogs
McAfee Labs Advanced Threat Research Aids Arrest of Suspected Cybercrime Gang Linked to Top Malware CTB Locker | McAfee Blogs
In our recent research, we interviewed the actors behind ransomware campaigns. One of the interesting findings was cybercriminals seemed to have a sense of
The 2018 Guide to Building Secure PHP Software
http://ift.tt/2AecvyO
Submitted December 20, 2017 at 08:00PM by speckz
via reddit http://ift.tt/2kscYaR
http://ift.tt/2AecvyO
Submitted December 20, 2017 at 08:00PM by speckz
via reddit http://ift.tt/2kscYaR
Paragonie
The 2018 Guide to Building Secure PHP Software - Paragon Initiative Enterprises Blog
Everything a developer needs to know to build secure software in the PHP programming language in the year 2018
Security In 5: Episode 136 - Top Online Scams To Avoid
http://ift.tt/2oSf5t8
Submitted December 20, 2017 at 07:40PM by BinaryBlog
via reddit http://ift.tt/2BES1Rr
http://ift.tt/2oSf5t8
Submitted December 20, 2017 at 07:40PM by BinaryBlog
via reddit http://ift.tt/2BES1Rr
Libsyn
Security In Five Podcast: Episode 136 - Top Online Scams To Avoid
As we increase our online shopping, email and social network use the scams increase as well. Only by knowing the scams that are out there and how they work can you know how to avoid them. This episode goes into the top online scams, how they work and give…
XBL IP Blacklist Grows 50% Because of Andromeda and Satori Botnets
http://ift.tt/2kJTv4Z
Submitted December 20, 2017 at 07:28PM by DJRWolf
via reddit http://ift.tt/2CLLKmi
http://ift.tt/2kJTv4Z
Submitted December 20, 2017 at 07:28PM by DJRWolf
via reddit http://ift.tt/2CLLKmi
BleepingComputer
XBL IP Blacklist Grows 50% Because of Andromeda and Satori Botnets
The rise of the Satori botnet and the fall of the Andromeda (Gamarue) botnet are the main two factors that have led to a 50% growth of the Spamhaus Exploits Block List (XBL) during the past month.
Day 3 of ZDI's Top 5 bugs of 2017 details an Apple Safari type confusion vulnerability
http://ift.tt/2Bb0Ile
Submitted December 20, 2017 at 09:07PM by RedmondSecGnome
via reddit http://ift.tt/2oVN9EL
http://ift.tt/2Bb0Ile
Submitted December 20, 2017 at 09:07PM by RedmondSecGnome
via reddit http://ift.tt/2oVN9EL
Zero Day Initiative
Invariantly Exploitable Input: An Apple Safari Bug Worth Revisiting
This is the third in our series of Top 5 interesting cases from 2017. Each of these bugs has some element that sets them apart from the approximately 1,000 advisories released by the program this year. Today’s blog looks at a type confusion bug in Apple Safari…
Security Orchestration Meets Network Analytics
http://ift.tt/2oYr48J
Submitted December 20, 2017 at 09:33PM by abhishekiyer
via reddit http://ift.tt/2oYiZk7
http://ift.tt/2oYr48J
Submitted December 20, 2017 at 09:33PM by abhishekiyer
via reddit http://ift.tt/2oYiZk7
Demisto
Security Orchestration Meets Network Analytics: RSA NetWitness and Demisto
Learn how combining NetWitness’s network analytics with Demisto’s security orchestration can provide you with a deep investigative toolkit to resolve incidents.
./getawspublicips.sh: Know the Public AWS IPs You Have Facing the Internet
http://ift.tt/2kriwCi
Submitted December 20, 2017 at 10:45PM by danielrm26
via reddit http://ift.tt/2BmfolX
http://ift.tt/2kriwCi
Submitted December 20, 2017 at 10:45PM by danielrm26
via reddit http://ift.tt/2BmfolX
Daniel Miessler
./getawspublicips.sh: Know the Public AWS IPs You Have Facing the Internet
The most important challenge facing the companies I work with is knowing what they have facing the internet. There are lots of other ways to be insecure, o
North Korea to blame for ‘WannaCry’ cyber attacks which crippled banks, companies and hospitals worldwide: Microsoft and Facebook helped combat them, officials claim
http://ift.tt/2AZV0Ti
Submitted December 20, 2017 at 10:12PM by Amidza
via reddit http://ift.tt/2DfjZnh
http://ift.tt/2AZV0Ti
Submitted December 20, 2017 at 10:12PM by Amidza
via reddit http://ift.tt/2DfjZnh
The Inquisitr
North Korea to blame for 'WannaCry' cyber attacks: Microsoft and Facebook helped combat them
North Korea seems to be behind the cyber attack which crippled banks, companies and hospitals.
[PDF] North Korea Bitten by Bitcoin Bug: Financially motivated campaigns reveal new dimension of the Lazarus Group
http://ift.tt/2z59cbT
Submitted December 20, 2017 at 04:25PM by f00l
via reddit http://ift.tt/2oYP0bR
http://ift.tt/2z59cbT
Submitted December 20, 2017 at 04:25PM by f00l
via reddit http://ift.tt/2oYP0bR
Hackers take control of security firm’s domain, steal secret data
http://ift.tt/2BvBpM3
Submitted December 20, 2017 at 11:12PM by yourbasicgeek
via reddit http://ift.tt/2oYkOxJ
http://ift.tt/2BvBpM3
Submitted December 20, 2017 at 11:12PM by yourbasicgeek
via reddit http://ift.tt/2oYkOxJ
Ars Technica
Hackers take control of security firm’s domain, steal secret data
Attackers bypass HTTPS encryption protection by registering new TLS certificate.
Is your security perimeter really a castle wall?
http://ift.tt/2DfxLX7
Submitted December 20, 2017 at 11:40PM by ju1i3k
via reddit http://ift.tt/2krMne2
http://ift.tt/2DfxLX7
Submitted December 20, 2017 at 11:40PM by ju1i3k
via reddit http://ift.tt/2krMne2
Cobalt.io
Your Security Perimeter is a Living Cell, Not a Castle Wall
You’ve heard the analogy before. Your enterprise is a fortress. Protect it with towers. Build stone walls to protect your data. Build a…
Securing the Internet of Things
http://ift.tt/2zJ1BUY
Submitted December 21, 2017 at 12:11AM by volci
via reddit http://ift.tt/2kQ71nG
http://ift.tt/2zJ1BUY
Submitted December 21, 2017 at 12:11AM by volci
via reddit http://ift.tt/2kQ71nG
www.us-cert.gov
Securing the Internet of Things | US-CERT
The Internet of Things refers to any object or device that sends and receives data automatically through the Internet. This rapidly expanding set of “things” includes tags (also known as labels or chips that automatically track objects), sensors, and devices…
Vulnerability Scanning vs. Penetration Testing
http://ift.tt/2B8KxVE
Submitted December 20, 2017 at 11:57PM by volci
via reddit http://ift.tt/2BPXZBr
http://ift.tt/2B8KxVE
Submitted December 20, 2017 at 11:57PM by volci
via reddit http://ift.tt/2BPXZBr
Secureworks
Vulnerability Scanning vs. Penetration Testing
Organizations should implement both vulnerability scans and penetration tests to improve their network security.