Weird and wacky security stories from 2017 – each in a single tweet!
http://ift.tt/2l25qMe
Submitted December 28, 2017 at 09:31AM by doors_1
via reddit http://ift.tt/2DpzSa1
http://ift.tt/2l25qMe
Submitted December 28, 2017 at 09:31AM by doors_1
via reddit http://ift.tt/2DpzSa1
Naked Security
Weird and wacky security stories from 2017 – each in a single tweet!
We had fun squashing our favourite 2017 stories into tweet-sized versions. We’d love you to join in – try your hand at lossy compression!
Business Security Systems at Tate Security Technology Ltd
http://ift.tt/2BJCSgV
Submitted December 28, 2017 at 10:01AM by TateSecurity
via reddit http://ift.tt/2E37GKZ
http://ift.tt/2BJCSgV
Submitted December 28, 2017 at 10:01AM by TateSecurity
via reddit http://ift.tt/2E37GKZ
Tate Security Solutions
About Us - Tate Security Solutions
Best Practice in Using NTFS Permissions and Share Permissions
http://ift.tt/2E5kpwU
Submitted December 28, 2017 at 01:12PM by foldersecurity
via reddit http://ift.tt/2ChNfK1
http://ift.tt/2E5kpwU
Submitted December 28, 2017 at 01:12PM by foldersecurity
via reddit http://ift.tt/2ChNfK1
FolderSecurityViewer Blog
Best Practice in Using NTFS Permissions and Share Permissions - FolderSecurityViewer Blog
How to combine NTFS Permissions and Share Permissions. What is the best practice in assigning these permissions?
Certain Sonos and Bose models can be accessed by hackers to play sound remotely
http://ift.tt/2pFQgks
Submitted December 28, 2017 at 02:50PM by bionicnomad
via reddit http://ift.tt/2E4iU1U
http://ift.tt/2pFQgks
Submitted December 28, 2017 at 02:50PM by bionicnomad
via reddit http://ift.tt/2E4iU1U
TechCrunch
Certain Sonos and Bose models can be accessed by hackers to play sound remotely
Researchers at Trend Micro have discovered a potential hack opening key speakers from Sonos and Bose to remote access. As first reported by Wired, the Sonos Play:1, Sonos One, and Bose SoundTouch…
The bigger picture of Crypto-Mining Malware which targets WordPress sites.
http://ift.tt/2E4xOp3
Submitted December 28, 2017 at 06:39PM by ded1cated
via reddit http://ift.tt/2ChFGoS
http://ift.tt/2E4xOp3
Submitted December 28, 2017 at 06:39PM by ded1cated
via reddit http://ift.tt/2ChFGoS
reddit
Bigger picture behind the Crypto-Mining Malware that... • r/Wordpress
0 points and 0 comments so far on reddit
Week 51 in Information Security, 2017
http://ift.tt/2zHdczN
Submitted December 28, 2017 at 07:41PM by undercomm
via reddit http://ift.tt/2lnqVXk
http://ift.tt/2zHdczN
Submitted December 28, 2017 at 07:41PM by undercomm
via reddit http://ift.tt/2lnqVXk
Malgregator
InfoSec Week 51, 2017
There is a remotely exploitable vulnerability in the Vitek CCTV firmware. Reverse netcat shell included....
Security In 5: Episode 142 - BinaryBlogger.com 2017 Predictions Reviewed
http://ift.tt/2llBKsR
Submitted December 28, 2017 at 07:40PM by BinaryBlog
via reddit http://ift.tt/2ldccPj
http://ift.tt/2llBKsR
Submitted December 28, 2017 at 07:40PM by BinaryBlog
via reddit http://ift.tt/2ldccPj
Libsyn
Security In Five Podcast: Episode 142 - BinaryBlogger.com 2017 Predictions Reviewed
Each year on my blog, binaryblogger.com, I do security & IT predictions for the next year. As part of that, before I release my predictions I go back and look at the ones I made before and rate them. This episode goes over my predictions I made for 2017 back…
LastPass’ Authenticator app is not secure
http://ift.tt/2li0MJg
Submitted December 28, 2017 at 08:25PM by speckz
via reddit http://ift.tt/2BOTbJo
http://ift.tt/2li0MJg
Submitted December 28, 2017 at 08:25PM by speckz
via reddit http://ift.tt/2BOTbJo
Hacker Noon
LastPass’ Authenticator app is not secure
An easy, root-free way to bypass fingerprint protection on LastPass’ authenticator app
Cost Metrics to Explore When Evaluating a Pen Testing Service
http://ift.tt/2Ch56R5
Submitted December 28, 2017 at 09:31PM by ju1i3k
via reddit http://ift.tt/2DrBekC
http://ift.tt/2Ch56R5
Submitted December 28, 2017 at 09:31PM by ju1i3k
via reddit http://ift.tt/2DrBekC
Cobalt.io
Cost Metrics: Exploring Pen Testing as a Service
Why do security metrics matter?
Mobile Security Year in Review
http://ift.tt/2CeVrwR
Submitted December 28, 2017 at 09:56PM by Mi3Security
via reddit http://ift.tt/2BQRL1a
http://ift.tt/2CeVrwR
Submitted December 28, 2017 at 09:56PM by Mi3Security
via reddit http://ift.tt/2BQRL1a
Mi3 Security
Mobile Security Year in Review
As 2017 comes to a close, let’s take a look back at some of the notable moments in mobile security.
Protect Controlled Unclassified Information (CUI) From Cyberattacks
http://ift.tt/2C4zBNs
Submitted December 28, 2017 at 09:47PM by SecurityTrust
via reddit http://ift.tt/2CjqAPK
http://ift.tt/2C4zBNs
Submitted December 28, 2017 at 09:47PM by SecurityTrust
via reddit http://ift.tt/2CjqAPK
Why TLS 1.3 isn't in browsers yet
http://ift.tt/2BUGrVF
Submitted December 28, 2017 at 10:08PM by SNOWDEN6jrtilL24a
via reddit http://ift.tt/2EaCt92
http://ift.tt/2BUGrVF
Submitted December 28, 2017 at 10:08PM by SNOWDEN6jrtilL24a
via reddit http://ift.tt/2EaCt92
reddit
Why TLS 1.3 isn't in browsers yet • r/netsec
9 points and 0 comments so far on reddit
No boundaries for user identities: Web trackers exploit browser login managers
http://ift.tt/2lgYsSV
Submitted December 29, 2017 at 02:58AM by ilmbt
via reddit http://ift.tt/2lemCyl
http://ift.tt/2lgYsSV
Submitted December 29, 2017 at 02:58AM by ilmbt
via reddit http://ift.tt/2lemCyl
reddit
No boundaries for user identities: Web trackers... • r/security
1 points and 0 comments so far on reddit
Nessus Penetration Testing Chapter One
http://ift.tt/2lcSC5Q
Submitted December 29, 2017 at 05:11AM by berkdusunurx
via reddit http://ift.tt/2pT3ril
http://ift.tt/2lcSC5Q
Submitted December 29, 2017 at 05:11AM by berkdusunurx
via reddit http://ift.tt/2pT3ril
www.berkdusunur.net
Penetration Tests With Nessus (Chapter 1)
Hello everyone. Today I will write to you about " Nessus Vulnerability Scanner " This is the first part of my wiriting about nessu...
Keeping a Pen Test Methodology Successful
http://ift.tt/2ldKLVO
Submitted December 29, 2017 at 09:53AM by ju1i3k
via reddit http://ift.tt/2CkoDAc
http://ift.tt/2ldKLVO
Submitted December 29, 2017 at 09:53AM by ju1i3k
via reddit http://ift.tt/2CkoDAc
Cobalt.io
4 Tips for Keeping a Pen Test Methodology Successful
The previous posts about the pen test lifecycle set the stage for conducting a security assessment. Now it’s time to perform the work.
Protect your company !
http://ift.tt/2pUHuzk
Submitted December 29, 2017 at 02:31PM by irealitiestechnology
via reddit http://ift.tt/2Edj4nV
http://ift.tt/2pUHuzk
Submitted December 29, 2017 at 02:31PM by irealitiestechnology
via reddit http://ift.tt/2Edj4nV
informationsecurityawareness.in
Training Your Employees on Information Security Awareness- Information Security Awareness
Protect your company by training your employees on Security. Expert Tips on Information Security Awareness Training For Employees. Security Awareness Training course is designed to educate employees to reduce risk and protect company resources.
DHS: 18 of 33 First Responder Apps Affected by Security Flaws
http://ift.tt/2pN4dNH
Submitted December 29, 2017 at 07:22PM by DJRWolf
via reddit http://ift.tt/2BTkyly
http://ift.tt/2pN4dNH
Submitted December 29, 2017 at 07:22PM by DJRWolf
via reddit http://ift.tt/2BTkyly
BleepingComputer
DHS: 18 of 33 First Responder Apps Affected by Security Flaws
A Department of Homeland Security (DHS) pilot program uncovered several privacy and security-related issues in Android and iOS applications used by first responders on the scene of natural disasters and other emergency situations.
Security In 5: Episode 142 - BinaryBlogger.com Security & IT Predictions For 2018
http://ift.tt/2DtqyBZ
Submitted December 29, 2017 at 07:34PM by BinaryBlog
via reddit http://ift.tt/2BRd3vj
http://ift.tt/2DtqyBZ
Submitted December 29, 2017 at 07:34PM by BinaryBlog
via reddit http://ift.tt/2BRd3vj
Libsyn
Security In Five Podcast: Episode 142 - BinaryBlogger.com Security & IT Predictions For 2018
The last episode of the year! This episode goes over my security and IT predictions for 2018. The full blog post on the predictions can be found on Binaryblogger.com Be aware, be safe. ------------------------------------ Website - https://www.binaryblogger.com…
List of alternative DNS providers with built-in anti-phishing features
http://ift.tt/2CZ7fRs
Submitted December 29, 2017 at 09:18PM by cryptoaustralia
via reddit http://ift.tt/2BVwbIV
http://ift.tt/2CZ7fRs
Submitted December 29, 2017 at 09:18PM by cryptoaustralia
via reddit http://ift.tt/2BVwbIV
CryptoAUSTRALIA Blog
Malware-blocking DNS Services
Protect your home network from ransomware and phishing with these alternative DNS providers
LatticeHacks 34C3 talk
http://ift.tt/2C5d82B
Submitted December 29, 2017 at 10:17PM by whoisburbansky
via reddit http://ift.tt/2Dwr0zv
http://ift.tt/2C5d82B
Submitted December 29, 2017 at 10:17PM by whoisburbansky
via reddit http://ift.tt/2Dwr0zv
media.ccc.de
LatticeHacks
Lattices are an extremely useful mathematical tool for cryptography.
This talk will explain the basics of lattices in cryptography and cr...
This talk will explain the basics of lattices in cryptography and cr...
Zero Days, Thousands of Nights: The Life & Times of Zero-Day Vulns and Their Exploits by Lillian Ablon of RAND
https://youtu.be/8BMULyCiSK4
Submitted December 30, 2017 at 12:58AM by PseudoSecuritay
via reddit http://ift.tt/2C99fd2
https://youtu.be/8BMULyCiSK4
Submitted December 30, 2017 at 12:58AM by PseudoSecuritay
via reddit http://ift.tt/2C99fd2
YouTube
Zero Days, Thousands of Nights: The Life & Times of Zero-Day Vulns and Their Exploits
Zero-day vulnerabilities and their exploits are useful in offensive operations as well as in defensive and academic settings.
RAND obtained rare access to a dataset of information about more than 200 zero-day software vulnerabilities and their exploits …
RAND obtained rare access to a dataset of information about more than 200 zero-day software vulnerabilities and their exploits …