An introduction book to ethical hacking for kids?
My newphew is 10, he was excitedly telling me the other day about how he hacked an android game. He didn't actually hack an Android game, I suspect it was a cheat of some kind that he found on Google.Anyway, I wanted to use that enthusiasm to spark an interest in computing, perhaps Cyber Security.I had an idea of getting him a "hacking" book, which would of course excite the devilish imagination of a 10 year old. But what I actually want is a book aimed at kids that takes them through the very basics of Ethical Hacking/Cyber security.Perhaps just a simplified denoscription of an IP address and then showing you how to ping/traceroute etc - with a denoscription of when you might need to do this kind of thing in an ethical hacking scenario - that kind of thing.Any ideas? I've searched around the usual places (Amazon etc) but can't find anything similar.
Submitted January 13, 2018 at 11:10AM by usernameisprobstoolo
via reddit http://ift.tt/2mqy2Pb
My newphew is 10, he was excitedly telling me the other day about how he hacked an android game. He didn't actually hack an Android game, I suspect it was a cheat of some kind that he found on Google.Anyway, I wanted to use that enthusiasm to spark an interest in computing, perhaps Cyber Security.I had an idea of getting him a "hacking" book, which would of course excite the devilish imagination of a 10 year old. But what I actually want is a book aimed at kids that takes them through the very basics of Ethical Hacking/Cyber security.Perhaps just a simplified denoscription of an IP address and then showing you how to ping/traceroute etc - with a denoscription of when you might need to do this kind of thing in an ethical hacking scenario - that kind of thing.Any ideas? I've searched around the usual places (Amazon etc) but can't find anything similar.
Submitted January 13, 2018 at 11:10AM by usernameisprobstoolo
via reddit http://ift.tt/2mqy2Pb
reddit
An introduction book to ethical hacking for kids? • r/security
My newphew is 10, he was excitedly telling me the other day about how he hacked an android game. He didn't *actually* hack an Android game, I...
DDoS Misusing DNS Resolvers - Some examples
http://ift.tt/2D6IE0T
Submitted January 13, 2018 at 12:40PM by nykzhang
via reddit http://ift.tt/2D9fEF4
http://ift.tt/2D6IE0T
Submitted January 13, 2018 at 12:40PM by nykzhang
via reddit http://ift.tt/2D9fEF4
Medium
DNS-based DDoS against Uber
For the last couple of weeks I have been testing DNS resolvers.
A club near my area somehow got hold of my private email?
Sorry if this is isn't the appropiate subreddit for this, but I'm still a bit concerned about what happened to me the other day.Yesterday at 1PM I received an invitation email from a women's fitness club (????), hosting an event about eating healthy and properly or something like that. It was in my junk folder, so I thought it was some sort of scammer at first (which semt super strange, because I never get any scammers or actual spam mails).However, I've also noticed how the email mentioned the small city I live in. Apparently It was where the club was located in, so I opened the email and it was just a short wall of text, saying everyone's invited but theres an entry fee etc.After looking up their name in Google, I instantly knew who they were. It's some tiny women's fitness club named "heroine" next to my local bank, a mile away from my home.But I'm just confused on how they managed to get my email..?I never ever write down my personal email in public places, or if a person asks for it. It's a rare occasion but when asked, I usually make a completely new one, sometimes even on a whole new provider. Within 3 years I've only been asked for an email once (by my gym), and I created a completely new one in gmail, a provider which I do not use on my personal account.Anyone know what's going on?
Submitted January 13, 2018 at 02:04PM by KICKTYAN
via reddit http://ift.tt/2mrOvCP
Sorry if this is isn't the appropiate subreddit for this, but I'm still a bit concerned about what happened to me the other day.Yesterday at 1PM I received an invitation email from a women's fitness club (????), hosting an event about eating healthy and properly or something like that. It was in my junk folder, so I thought it was some sort of scammer at first (which semt super strange, because I never get any scammers or actual spam mails).However, I've also noticed how the email mentioned the small city I live in. Apparently It was where the club was located in, so I opened the email and it was just a short wall of text, saying everyone's invited but theres an entry fee etc.After looking up their name in Google, I instantly knew who they were. It's some tiny women's fitness club named "heroine" next to my local bank, a mile away from my home.But I'm just confused on how they managed to get my email..?I never ever write down my personal email in public places, or if a person asks for it. It's a rare occasion but when asked, I usually make a completely new one, sometimes even on a whole new provider. Within 3 years I've only been asked for an email once (by my gym), and I created a completely new one in gmail, a provider which I do not use on my personal account.Anyone know what's going on?
Submitted January 13, 2018 at 02:04PM by KICKTYAN
via reddit http://ift.tt/2mrOvCP
reddit
A club near my area somehow got hold of my private email? • r/security
Sorry if this is isn't the appropiate subreddit for this, but I'm still a bit concerned about what happened to me the other day. Yesterday at 1PM...
Sending arbitrary Last-Event-ID header values across origins using the EventSource API.
http://ift.tt/2mtbqxD
Submitted January 13, 2018 at 05:05PM by bayotop
via reddit http://ift.tt/2AWfcEE
http://ift.tt/2mtbqxD
Submitted January 13, 2018 at 05:05PM by bayotop
via reddit http://ift.tt/2AWfcEE
Gist
Sending arbitrary Last-Event-ID header values across origins using the EventSource API.
Hospital hit by ransomware: Attackers demand Bitcoin to release control of system
http://ift.tt/2FxzUOL
Submitted January 13, 2018 at 08:21PM by aafrn
via reddit http://ift.tt/2DdSZre
http://ift.tt/2FxzUOL
Submitted January 13, 2018 at 08:21PM by aafrn
via reddit http://ift.tt/2DdSZre
Daily Reporter
Hospital hit by ransomware: Attackers demand Bitcoin to release control of system
GREENFIELD — Hancock Health fell victim to a cyber attack Thursday, with a hacker demanding Bitcoin to relinquish control of part of the hospital’s computer system. Employees knew something was wrong Thursday night, when the network began running more slowly…
DDoS Misusing DNS Resolvers - Example against Uber
http://ift.tt/2D6IE0T
Submitted January 13, 2018 at 11:50PM by nykzhang
via reddit http://ift.tt/2D7BSIh
http://ift.tt/2D6IE0T
Submitted January 13, 2018 at 11:50PM by nykzhang
via reddit http://ift.tt/2D7BSIh
Medium
DNS-based DDoS against Uber
For the last couple of weeks I have been testing DNS resolvers.
You want use Gigabyte online support? Ok! You need to create a account for that, BUT look first how *not* secure their servers are
http://ift.tt/2Fvjd6G
Submitted January 14, 2018 at 12:21AM by rediii123
via reddit http://ift.tt/2EE5xVB
http://ift.tt/2Fvjd6G
Submitted January 14, 2018 at 12:21AM by rediii123
via reddit http://ift.tt/2EE5xVB
Yet another gadget for java deserialization: Misusing Oracle JDBC for SSRF-attacks
http://ift.tt/2DddtjH
Submitted January 13, 2018 at 02:29AM by agrrrdog
via reddit http://ift.tt/2Fw08Bf
http://ift.tt/2DddtjH
Submitted January 13, 2018 at 02:29AM by agrrrdog
via reddit http://ift.tt/2Fw08Bf
agrrrdog.blogspot.co.uk
Java Deserialization: Misusing OJDBC for SSRF
This year ZeroNights has got a new zone - Web Village. It was a special "track" for people who were interested in web security. The basic...
Chasing malware and c&c servers in OSINT style!
http://ift.tt/2muX3c6
Submitted January 14, 2018 at 02:30AM by Mysterii8
via reddit http://ift.tt/2DaxS9b
http://ift.tt/2muX3c6
Submitted January 14, 2018 at 02:30AM by Mysterii8
via reddit http://ift.tt/2DaxS9b
Medium
Chasing malware and c&c servers in OSINT style!
TL;DR Looking for malware or command and control servers?
Proof of Concept: Website analytics/tracking only using CSS and no JS
http://ift.tt/2Dco3aB
Submitted January 14, 2018 at 03:34AM by jbtronics
via reddit http://ift.tt/2D9F5qJ
http://ift.tt/2Dco3aB
Submitted January 14, 2018 at 03:34AM by jbtronics
via reddit http://ift.tt/2D9F5qJ
GitHub
jbtronics/CrookedStyleSheets
CrookedStyleSheets - Webpage tracking only using CSS (and no JS)
Russia behind NotPetya cyberattack in Ukraine, CIA concludes
http://ift.tt/2mzPgKN
Submitted January 14, 2018 at 12:17PM by cmstrump
via reddit http://ift.tt/2EHcgy9
http://ift.tt/2mzPgKN
Submitted January 14, 2018 at 12:17PM by cmstrump
via reddit http://ift.tt/2EHcgy9
Axios
Russia behind NotPetya cyberattack in Ukraine, CIA concludes
Russia has long viewed Ukraine as a part of Russia.
Russian military was behind ‘NotPetya’ cyberattack in Ukraine, CIA concludes
http://ift.tt/2CYsh27
Submitted January 14, 2018 at 02:20PM by DerBootsMann
via reddit http://ift.tt/2mBSqO3
http://ift.tt/2CYsh27
Submitted January 14, 2018 at 02:20PM by DerBootsMann
via reddit http://ift.tt/2mBSqO3
Washington Post
Russian military was behind ‘NotPetya’ cyberattack in Ukraine, CIA concludes
The hack targeted banks, energy firms, senior government officials and an airport as Ukraine wages war against separatists aligned with the Kremlin.
Looking for half-decent MSSP Service Catalog and documentation templates - Whatcha got?
http://ift.tt/2D2uxFB
Submitted January 14, 2018 at 03:25AM by sh8k3nb8by
via reddit http://ift.tt/2mBvmzf
http://ift.tt/2D2uxFB
Submitted January 14, 2018 at 03:25AM by sh8k3nb8by
via reddit http://ift.tt/2mBvmzf
Infotech
Build a Security Governance and Management Plan – Executive Brief
Understand why security governance and management is essential for an organization that wants to keep up with today's evolving threat landscape.
You want use Gigabyte online support? Ok! You need to create a account for that, BUT look first how *not* secure their servers are
http://ift.tt/2Fvjd6G
Submitted January 14, 2018 at 04:10PM by rediii123
via reddit http://ift.tt/2EFJqyl
http://ift.tt/2Fvjd6G
Submitted January 14, 2018 at 04:10PM by rediii123
via reddit http://ift.tt/2EFJqyl
reddit
You want use Gigabyte online support? Ok! You need to... • r/security
1 points and 0 comments so far on reddit
CTF Challenge n3ph4ck Writeup
http://ift.tt/2D8WKyD
Submitted January 14, 2018 at 03:17PM by administrator007
via reddit http://ift.tt/2EHX8AJ
http://ift.tt/2D8WKyD
Submitted January 14, 2018 at 03:17PM by administrator007
via reddit http://ift.tt/2EHX8AJ
Medium
CTF Challenge n3ph4ck Writeup
-___#ctfnepal #n3ph4ck Writeups, Solutions ___-
Lenovo network-switches with backdoor
http://ift.tt/2CYtSoX
Submitted January 14, 2018 at 04:19PM by rediii123
via reddit http://ift.tt/2D8KfTQ
http://ift.tt/2CYtSoX
Submitted January 14, 2018 at 04:19PM by rediii123
via reddit http://ift.tt/2D8KfTQ
reddit
Lenovo network-switches with backdoor • r/security
1 points and 0 comments so far on reddit
Fuzzing D code with LDC
http://ift.tt/2CZw6UN
Submitted January 14, 2018 at 06:22PM by cym13
via reddit http://ift.tt/2mx19Ai
http://ift.tt/2CZw6UN
Submitted January 14, 2018 at 06:22PM by cym13
via reddit http://ift.tt/2mx19Ai
johanengelen.github.io
Fuzzing D code with LDC
A not-so-well-written article about the fuzzing capability recently added to LDC, using LLVM’s libFuzzer. Compiling code with -fsanitize=fuzzer adds control-...
CS graduate looking to work in InfoSec, any help?
Firstly I understand the premise of this thread is that it is for computer security professionals, please remove if I am posting in the wrong place... I'm looking to graduate this August with with a BSc in Computer Science and I want to ideally go into information security, whether it involves analysing code, reverse engineering, penetration testing etc. I don't really care, and I intend to do a masters specialising in Information Security (http://ift.tt/2FEFaQY) so I can learn as much as I can before entering a job. My issue is that I am looking for an internship over the summer to help me gain some experience before my studies continue but I don't even know what to look for. I have tried searching for "information security intern" on Indeed and Glassdoor to no avail. I already have a year's experience working as an IT Administrator at a finance firm, but I would ideally like to broaden my horizons. What kind of job/internship noscripts do any of you think I should be looking for?
Submitted January 14, 2018 at 09:31PM by t-sploit
via reddit http://ift.tt/2EIzjsx
Firstly I understand the premise of this thread is that it is for computer security professionals, please remove if I am posting in the wrong place... I'm looking to graduate this August with with a BSc in Computer Science and I want to ideally go into information security, whether it involves analysing code, reverse engineering, penetration testing etc. I don't really care, and I intend to do a masters specialising in Information Security (http://ift.tt/2FEFaQY) so I can learn as much as I can before entering a job. My issue is that I am looking for an internship over the summer to help me gain some experience before my studies continue but I don't even know what to look for. I have tried searching for "information security intern" on Indeed and Glassdoor to no avail. I already have a year's experience working as an IT Administrator at a finance firm, but I would ideally like to broaden my horizons. What kind of job/internship noscripts do any of you think I should be looking for?
Submitted January 14, 2018 at 09:31PM by t-sploit
via reddit http://ift.tt/2EIzjsx
reddit
CS graduate looking to work in InfoSec, any help? • r/security
Firstly I understand the premise of this thread is that it is for computer security professionals, please remove if I am posting in the wrong...
gOSINT 0.4 is out, now with a telegram groups scraper
http://ift.tt/2ikgu8N
Submitted January 14, 2018 at 10:06PM by Nhoya
via reddit http://ift.tt/2DcASTm
http://ift.tt/2ikgu8N
Submitted January 14, 2018 at 10:06PM by Nhoya
via reddit http://ift.tt/2DcASTm
GitHub
Nhoya/gOSINT
OSINT Swiss Army Knife. Contribute to Nhoya/gOSINT development by creating an account on GitHub.
A Critique of Logging Capabilities in PowerShell v6
http://ift.tt/2mDYTbD
Submitted January 14, 2018 at 11:04PM by SamratAsh0k
via reddit http://ift.tt/2r03pWi
http://ift.tt/2mDYTbD
Submitted January 14, 2018 at 11:04PM by SamratAsh0k
via reddit http://ift.tt/2r03pWi
Labofapenetrationtester
A Critique of Logging Capabilities in PowerShell v6
Home of Nikhil SamratAshok Mittal. Posts about Pen Testing.
Malicious Spear-Phishing Campaign Targets Upcoming Winter Olympics in South Korea
http://ift.tt/2DhITD6
Submitted January 14, 2018 at 11:30PM by imr2017
via reddit http://ift.tt/2mCYSEx
http://ift.tt/2DhITD6
Submitted January 14, 2018 at 11:30PM by imr2017
via reddit http://ift.tt/2mCYSEx
Crowdstrike
Malicious Spear-Phishing Campaign Targets Upcoming Winter Olympics in South Korea
Learn about the Malicious spear-phishing campaign that will target the upcoming Winter Olympics in South Korea.