Adobe Security Advisory : A critical vulnerability in the Adobe flash player
http://ift.tt/2GEV0vi
Submitted February 02, 2018 at 03:53AM by haris3301
via reddit http://ift.tt/2BOx6K4
http://ift.tt/2GEV0vi
Submitted February 02, 2018 at 03:53AM by haris3301
via reddit http://ift.tt/2BOx6K4
Adobe
Adobe Security Advisory
Security Advisory for Flash Player APSA18-01
Any recommendations for outdoor security camera systems that don't rely on power supply?
No text found
Submitted February 02, 2018 at 04:56AM by jesuismich
via reddit http://ift.tt/2DUTvve
No text found
Submitted February 02, 2018 at 04:56AM by jesuismich
via reddit http://ift.tt/2DUTvve
reddit
Any recommendations for outdoor security camera... • r/security
2 points and 2 comments so far on reddit
Attacking the Nintendo 3DS Boot ROMs
http://ift.tt/2DWsBz5
Submitted February 02, 2018 at 07:33AM by Plailect
via reddit http://ift.tt/2BMxA3D
http://ift.tt/2DWsBz5
Submitted February 02, 2018 at 07:33AM by Plailect
via reddit http://ift.tt/2BMxA3D
What's the motivation for google to find zero days in windows and intel products?
Google zero day project is awesome place where people (presumably) find zero days and vulnerabilities in products that are far more secured than Android. Why don't they make their OS at least as secured as Windows before hacking into other companies products?
Submitted February 02, 2018 at 08:00AM by kokobannana
via reddit http://ift.tt/2BOJdqq
Google zero day project is awesome place where people (presumably) find zero days and vulnerabilities in products that are far more secured than Android. Why don't they make their OS at least as secured as Windows before hacking into other companies products?
Submitted February 02, 2018 at 08:00AM by kokobannana
via reddit http://ift.tt/2BOJdqq
reddit
What's the motivation for google to find zero days in... • r/security
Google zero day project is awesome place where people (presumably) find zero days and vulnerabilities in products that are far more secured than...
Any research on this topic done since 2015?
Google Security published some research back in 23 July 2015 comparing the opinions of experts vs non-experts on the topic of "top online safety practices" for individuals. Has anybody, Google or otherwise, published any more research since then on the differences between expert/non-expert security practice opinions?original link: https://security.googleblog.com/2015/07/new-research-comparing-how-security.html
Submitted February 02, 2018 at 07:55AM by lurk6524
via reddit http://ift.tt/2nv8rWR
Google Security published some research back in 23 July 2015 comparing the opinions of experts vs non-experts on the topic of "top online safety practices" for individuals. Has anybody, Google or otherwise, published any more research since then on the differences between expert/non-expert security practice opinions?original link: https://security.googleblog.com/2015/07/new-research-comparing-how-security.html
Submitted February 02, 2018 at 07:55AM by lurk6524
via reddit http://ift.tt/2nv8rWR
Google Online Security Blog
New research: Comparing how security experts and non-experts stay safe online
Posted by Iulia Ion, Software Engineer - Rob Reeder, Research Scientist - Sunny Consolvo, User Experience Researcher Today, you can find...
Twofish Crypter with DNS (CName) password retrieval, x64 shellcode decryption, and execution
http://ift.tt/2FFi0sT
Submitted February 02, 2018 at 01:48PM by 0x4ndr3
via reddit http://ift.tt/2EzcGIe
http://ift.tt/2FFi0sT
Submitted February 02, 2018 at 01:48PM by 0x4ndr3
via reddit http://ift.tt/2EzcGIe
Pentester's life
Twofish Crypter with DNS (CName) password retrieval, x64 shellcode decryption, and execution
A crypter is code that decrypts a previously encrypted payload, in this case a shellcode, and will then execute it. To encrypt it, and not do it as most others have, I chose one of the algorithms t…
Sickle - A python based shellcode development tool
http://ift.tt/2Eb9Taj
Submitted February 02, 2018 at 01:17PM by wetw0rk_
via reddit http://ift.tt/2FFoTKB
http://ift.tt/2Eb9Taj
Submitted February 02, 2018 at 01:17PM by wetw0rk_
via reddit http://ift.tt/2FFoTKB
GitHub
wetw0rk/Sickle
Sickle - A tool I have found incredibly useful whenever creating custom shellcode.
Web Application Firewall (WAF) Evasion Techniques by @theMiddle
http://ift.tt/2CTgfYZ
Submitted February 02, 2018 at 01:01PM by 0x4a616e
via reddit http://ift.tt/2DXfeyM
http://ift.tt/2CTgfYZ
Submitted February 02, 2018 at 01:01PM by 0x4a616e
via reddit http://ift.tt/2DXfeyM
Medium
Web Application Firewall (WAF) Evasion Techniques
I can read your passwd file with: “/???/??t /???/??ss??”. Having fun with Sucuri WAF, ModSecurity, Paranoia Level and more…
Snow cannon vs. unique snowflakes — testing registration forms
http://ift.tt/2s14pKr
Submitted February 02, 2018 at 02:55PM by dn3t
via reddit http://ift.tt/2DVzMaF
http://ift.tt/2s14pKr
Submitted February 02, 2018 at 02:55PM by dn3t
via reddit http://ift.tt/2DVzMaF
California Predicted to lose $329-million to Cybercrime in 2018
http://ift.tt/2nueLOi
Submitted February 02, 2018 at 04:20PM by imr2017
via reddit http://ift.tt/2Eb7VGT
http://ift.tt/2nueLOi
Submitted February 02, 2018 at 04:20PM by imr2017
via reddit http://ift.tt/2Eb7VGT
Hashed Out by The SSL Store™
California Predicted to lose $329-million to Cybercrime in 2018
Do you live in a state that is likely to be victimized by cybercrime? We've got the top ten states most likely to be victimized. Does your state have anything to worry about?
Locksmith Derby Road Nottingham
http://ift.tt/2FBswRW
Submitted February 02, 2018 at 06:02PM by mara55676999143
via reddit http://ift.tt/2E6f1wt
http://ift.tt/2FBswRW
Submitted February 02, 2018 at 06:02PM by mara55676999143
via reddit http://ift.tt/2E6f1wt
Unnoscriptd
Locksmith Derby Road Nottingham
Detective Agency in Chandigarh an ultimatum to thrive the fact
http://ift.tt/2DW9kh7
Submitted February 02, 2018 at 06:22PM by venusdetectiveagency
via reddit http://ift.tt/2Ezp9vy
http://ift.tt/2DW9kh7
Submitted February 02, 2018 at 06:22PM by venusdetectiveagency
via reddit http://ift.tt/2Ezp9vy
Venusdetective
Divorce Provoke in Chandigarh: An ultimatum to thrive the factVenus Detective
A failure relationship on the verge of separation undergoes complicated, sensitive, and at times malignant depending on the nature of divorce investigation.
Preventing data leaks by stripping path information in HTTP Referrers
http://ift.tt/2Gxugg6
Submitted February 02, 2018 at 07:33PM by craigtaub
via reddit http://ift.tt/2GGy6nt
http://ift.tt/2Gxugg6
Submitted February 02, 2018 at 07:33PM by craigtaub
via reddit http://ift.tt/2GGy6nt
Mozilla Security Blog
Preventing data leaks by stripping path information in HTTP Referrers
Starting in version 59, Firefox Private Browsing will remove path data from Referrers sent to third parties. This will help prevent accidentally leaking data to third parties.
Security In 5: Episode 166 - Tools, Tips and Tricks - ProtonMail
http://ift.tt/2s25K3E
Submitted February 02, 2018 at 07:33PM by BinaryBlog
via reddit http://ift.tt/2GFc30p
http://ift.tt/2s25K3E
Submitted February 02, 2018 at 07:33PM by BinaryBlog
via reddit http://ift.tt/2GFc30p
Libsyn
Security In Five Podcast: Episode 166 - Tools, Tips and Tricks - ProtonMail
This week's tools, tips and tricks is about secure communication. Privacy is becoming a huge issue and people are starting to come around to the need for it. That's where ProtonMail comes into play. This episode goes into the details of what ProtonMail is…
Slides and full exploit for execve() vulnerability in WSL (CVE-2018-0743)
http://ift.tt/2ECET0R
Submitted February 02, 2018 at 08:47PM by 0xdea
via reddit http://ift.tt/2DWBDvM
http://ift.tt/2ECET0R
Submitted February 02, 2018 at 08:47PM by 0xdea
via reddit http://ift.tt/2DWBDvM
GitHub
saaramar/execve_exploit
Hardcore corruption of my execve() vulnerability in WSL - saaramar/execve_exploit
Adobe Flash 0-Day Vulnerability APSA18-01
http://ift.tt/2BQ59l0
Submitted February 02, 2018 at 08:36PM by Topcity36
via reddit http://ift.tt/2s0AK3Q
http://ift.tt/2BQ59l0
Submitted February 02, 2018 at 08:36PM by Topcity36
via reddit http://ift.tt/2s0AK3Q
Meltdown and Spectre Malware Samples Emerged
http://ift.tt/2DVxZGG
Submitted February 02, 2018 at 09:24PM by vaxfms
via reddit http://ift.tt/2nBLOza
http://ift.tt/2DVxZGG
Submitted February 02, 2018 at 09:24PM by vaxfms
via reddit http://ift.tt/2nBLOza
OSRadar
Meltdown and Spectre Malware Samples Emerged - OSRadar
Security has always been one of the major concerns of the cyber world. There are numerous greedy hackers trying to penetrate different systems to steal data and sensitive information like passwords, credit card pins etc. Malware that uses Meltdown and Spectre…
Norton LifeLock Review
http://ift.tt/2s5osYd
Submitted February 03, 2018 at 12:43AM by tomasstatkus
via reddit http://ift.tt/2GG5iv4
http://ift.tt/2s5osYd
Submitted February 03, 2018 at 12:43AM by tomasstatkus
via reddit http://ift.tt/2GG5iv4
How Security ChatOps Increases Team Transparency and Accountability
http://ift.tt/2DUEXb2
Submitted February 03, 2018 at 12:48AM by abhishekiyer
via reddit http://ift.tt/2nvQF5E
http://ift.tt/2DUEXb2
Submitted February 03, 2018 at 12:48AM by abhishekiyer
via reddit http://ift.tt/2nvQF5E
Demisto
How Security ChatOps Increases Team Transparency and Accountability
Learn how Security ChatOps - collaboration, investigation, and documentation in one window - can lead to sea changes in team transparency and accountability.
Alternatives to HackerOne for vulnerability disclosure policy hosting?
Hi,Over the past weeks I have been trying to set up a HackerOne vulnerability disclosure program for my personal website/blog, however I am having trouble passing their approval process. This seems to be because my site is mainly static content and doesn't have much/any user input/personal sensitive information at risk, as well as the fact that I am not a commercial organisation.I have no plans to issue monetary bounties since this is a small personal project, however having a public disclosure platform and place to thank researchers would be nice.I know that I could just host a page myself (I already do), however been on a proper platform helps with exposure and makes it feel much more official.Is anybody aware of any good alternatives to HackerOne that welcome non-profit/personal projects, or can anybody with experience with HackerOne offer some tips for passing the approval process?Thanks for your help, Jamie
Submitted February 03, 2018 at 05:21AM by JamieOnUbuntu
via reddit http://ift.tt/2nz6rwy
Hi,Over the past weeks I have been trying to set up a HackerOne vulnerability disclosure program for my personal website/blog, however I am having trouble passing their approval process. This seems to be because my site is mainly static content and doesn't have much/any user input/personal sensitive information at risk, as well as the fact that I am not a commercial organisation.I have no plans to issue monetary bounties since this is a small personal project, however having a public disclosure platform and place to thank researchers would be nice.I know that I could just host a page myself (I already do), however been on a proper platform helps with exposure and makes it feel much more official.Is anybody aware of any good alternatives to HackerOne that welcome non-profit/personal projects, or can anybody with experience with HackerOne offer some tips for passing the approval process?Thanks for your help, Jamie
Submitted February 03, 2018 at 05:21AM by JamieOnUbuntu
via reddit http://ift.tt/2nz6rwy
reddit
Alternatives to HackerOne for vulnerability... • r/security
Hi, Over the past weeks I have been trying to set up a HackerOne vulnerability disclosure program for my personal website/blog, however I am...
Criteria for evaluating a high quality Security products
http://ift.tt/2ECT8Cs
Submitted February 03, 2018 at 08:50AM by securitybox
via reddit http://ift.tt/2DWT1Ro
http://ift.tt/2ECT8Cs
Submitted February 03, 2018 at 08:50AM by securitybox
via reddit http://ift.tt/2DWT1Ro
SecurityBox
Tiêu chí đánh giá một Sản phẩm ATTT chất lượng cao
Cuộc thi đánh giá sản phẩm An toàn thông tin chất lượng cao đã được nhiều nước trên thế giới quan tâm từ rất sớm khi điện toán đám mây và Internet nở rộ. Vậy đâu là tiêu chí đánh giá một sản phẩm ATTT (sản phẩm bảo mật) chất lượng cao? Dưới đây là những tiêu…