iOS iBoot source code leaked on GitHub
http://ift.tt/2E7bRZY
Submitted February 08, 2018 at 02:43PM by Nicocha
via reddit http://ift.tt/2EPnvpE
http://ift.tt/2E7bRZY
Submitted February 08, 2018 at 02:43PM by Nicocha
via reddit http://ift.tt/2EPnvpE
GitHub
h1x0rz3r0/iBoot
Contribute to iBoot development by creating an account on GitHub.
Servers were compromised by an attacker using mobile data.
Long story short, an attacker compromised some systems and the logs show their IP is coming from a pay&go mobile data connection, given that you can buy a pay&go SIM with cash in any convenience store here (UK), would there be any way of tracking down an attacker like this?
Submitted February 08, 2018 at 05:18PM by t-sploit
via reddit http://ift.tt/2C44HzT
Long story short, an attacker compromised some systems and the logs show their IP is coming from a pay&go mobile data connection, given that you can buy a pay&go SIM with cash in any convenience store here (UK), would there be any way of tracking down an attacker like this?
Submitted February 08, 2018 at 05:18PM by t-sploit
via reddit http://ift.tt/2C44HzT
reddit
Servers were compromised by an attacker using mobile... • r/security
Long story short, an attacker compromised some systems and the logs show their IP is coming from a pay&go mobile data connection, given that you...
Samsung and Roku Smart TVs Vulnerable to Hacking, Consumer Reports Finds
http://ift.tt/2GXS2lF
Submitted February 08, 2018 at 05:58PM by DreadBert_IAm
via reddit http://ift.tt/2BO56e7
http://ift.tt/2GXS2lF
Submitted February 08, 2018 at 05:58PM by DreadBert_IAm
via reddit http://ift.tt/2BO56e7
Consumer Reports
Samsung and Roku Smart TVs Vulnerable to Hacking, Consumer Reports Finds
Smart TV security and privacy testing of these brands, along with LG, Sony, and Vizio, also reveals broad-based data collection by smart TVs. But consumers can limit their exposure.
Call for Participants - Doctoral Study Pt.3
http://ift.tt/2EacrGu
Submitted February 08, 2018 at 05:38PM by socscisur
via reddit http://ift.tt/2EP0jYF
http://ift.tt/2EacrGu
Submitted February 08, 2018 at 05:38PM by socscisur
via reddit http://ift.tt/2EP0jYF
reddit
Call for Participants - Doctoral Study Pt.3 • r/Defcon
Hi all - about a year ago I asked if people would help me in my PhD research by answering a short survey on hacking. I'm nearing the end of my...
42% of the Web's Top Sites Are Compromised
http://ift.tt/2EryMyI
Submitted February 08, 2018 at 05:45PM by CasperVPN
via reddit http://ift.tt/2sdoRrG
http://ift.tt/2EryMyI
Submitted February 08, 2018 at 05:45PM by CasperVPN
via reddit http://ift.tt/2sdoRrG
Infosecurity Magazine
42% of the Web's Top Sites Are Compromised
Sites are running vulnerable software, have been breached or have been used to distribute malware.
What's the limit of "ethical" in "ethical hacking"
http://ift.tt/2BfvhcC
Submitted February 08, 2018 at 06:11PM by Nhoya
via reddit http://ift.tt/2nLFE01
http://ift.tt/2BfvhcC
Submitted February 08, 2018 at 06:11PM by Nhoya
via reddit http://ift.tt/2nLFE01
reddit
What's the limit of "ethical" in "ethical hacking" • r/hacking
In the past few days a random guy found a vulnerability on the website of one of the largest political parties in Italy and reported the...
Security In 5: Episode 170 - Microsoft Going After Scareware By Forcibly Uninstalling It From Your PC
http://ift.tt/2nNZLe4
Submitted February 08, 2018 at 07:32PM by BinaryBlog
via reddit http://ift.tt/2nUr9Xc
http://ift.tt/2nNZLe4
Submitted February 08, 2018 at 07:32PM by BinaryBlog
via reddit http://ift.tt/2nUr9Xc
Libsyn
Security In Five Podcast: Episode 170 - Microsoft Going After Scareware By Forcibly Uninstalling It From Your PC
Scareware is software that is installed on your PC that will alert you to some dire event. Usually it deals with viruses detected and the end game is you have to pay to upgrade the software to clean it. Scareware is junk and Microsoft is taking an offensive…
Stealing data even from Faraday cage, Tempest and emanations!
http://ift.tt/2nUnAQO
Submitted February 08, 2018 at 07:30PM by akapranos
via reddit http://ift.tt/2nLQFyC
http://ift.tt/2nUnAQO
Submitted February 08, 2018 at 07:30PM by akapranos
via reddit http://ift.tt/2nLQFyC
The Hacker News
Hackers Can Now Steal Data Even From Faraday Cage Air-Gapped Computers
Hackers can use electromagnetic emission from faraday caged and air gapped computers to steal data.
Litecoin Emerges as the Next Dominant Dark Web Currency
http://ift.tt/2FVZ6Ol
Submitted February 08, 2018 at 08:02PM by volci
via reddit http://ift.tt/2BjakO3
http://ift.tt/2FVZ6Ol
Submitted February 08, 2018 at 08:02PM by volci
via reddit http://ift.tt/2BjakO3
Recorded Future
Litecoin Emerges as the Next Dominant Dark Web Currency
Members of the cybercriminal underground are growing dissatisfied with Bitcoin as a payment vehicle. Recorded Future research revealed that Litecoin is surpassing other cryptocurrencies in preference.
Is Linux more secure than Windows and if so why?
I’ve generally gone by the understanding that Linux has always been miles ahead of Windows in terms of security, and one of the general arguments towards is that given Linux is primarily open source, the code comes under much closer scrutiny and interrogation, not to mention any flaws, bugs and exploits can be ironed out by the general public.What’s are your top 3 arguments for and against each OS in regards to Security, vulnerability, and difficulty to compromise?
Submitted February 08, 2018 at 08:42PM by mscaff
via reddit http://ift.tt/2FTPeET
I’ve generally gone by the understanding that Linux has always been miles ahead of Windows in terms of security, and one of the general arguments towards is that given Linux is primarily open source, the code comes under much closer scrutiny and interrogation, not to mention any flaws, bugs and exploits can be ironed out by the general public.What’s are your top 3 arguments for and against each OS in regards to Security, vulnerability, and difficulty to compromise?
Submitted February 08, 2018 at 08:42PM by mscaff
via reddit http://ift.tt/2FTPeET
reddit
Is Linux more secure than Windows and if so why? • r/security
I’ve generally gone by the understanding that Linux has always been miles ahead of Windows in terms of security, and one of the general arguments...
Inside North Korea’s Hacker Army
http://ift.tt/2gcVjo2
Submitted February 08, 2018 at 08:58PM by agesdear
via reddit http://ift.tt/2C4LBcP
http://ift.tt/2gcVjo2
Submitted February 08, 2018 at 08:58PM by agesdear
via reddit http://ift.tt/2C4LBcP
Bloomberg.com
Businessweek - Bloomberg
Bloomberg Businessweek helps global leaders stay ahead with insights and in-depth analysis on the people, companies, events, and trends shaping today's complex, global economy
Cabinet of Secret Documents from Australia
http://ift.tt/2seb3gr
Submitted February 08, 2018 at 08:58PM by volci
via reddit http://ift.tt/2C5qd7x
http://ift.tt/2seb3gr
Submitted February 08, 2018 at 08:58PM by volci
via reddit http://ift.tt/2C5qd7x
reddit
Cabinet of Secret Documents from Australia • r/security
1 points and 0 comments so far on reddit
Old Joomla! com_weblinks vulnerability being again massively exploited [infograph]
http://ift.tt/2C253Hr
Submitted February 08, 2018 at 08:46PM by ded1cated
via reddit http://ift.tt/2Eea45p
http://ift.tt/2C253Hr
Submitted February 08, 2018 at 08:46PM by ded1cated
via reddit http://ift.tt/2Eea45p
WebARX
Joomla Shell Upload Vulnerability on the rise again
Due to its decaying nature, Joomla vulnerabilities have become well known for its faults. As modular software where anyone can add in modules, the attack surface is wide and deep.
Bounty Monitor: Leverage certificate transparency logs to monitor for newly issued subdomains, participating in bug bounty programs
http://ift.tt/2nSJvHT
Submitted February 08, 2018 at 09:53PM by AlternativeWalrus
via reddit http://ift.tt/2nMcSww
http://ift.tt/2nSJvHT
Submitted February 08, 2018 at 09:53PM by AlternativeWalrus
via reddit http://ift.tt/2nMcSww
GitHub
nashcontrol/bounty-monitor
bounty-monitor - Leverage certificate transparency live feed to monitor for newly issued subdomain cerficates, for domains participating in bug bounty programs
3snake - Dumping plaintext credentials from sshd and sudo processes from memory on Linux servers
http://ift.tt/2nMkD5E
Submitted February 08, 2018 at 08:45PM by l0tan
via reddit http://ift.tt/2nLRgA6
http://ift.tt/2nMkD5E
Submitted February 08, 2018 at 08:45PM by l0tan
via reddit http://ift.tt/2nLRgA6
GitHub
blendin/3snake
3snake - Tool for extracting information from newly spawned processes
Inside North Korea’s Hacker Army
http://ift.tt/2BJppt2
Submitted February 08, 2018 at 10:08PM by agesdear
via reddit http://ift.tt/2FVHQJi
http://ift.tt/2BJppt2
Submitted February 08, 2018 at 10:08PM by agesdear
via reddit http://ift.tt/2FVHQJi
Bloomberg.com
Inside North Korea’s Hacker Army
The regime in Pyongyang has sent hundreds of programmers to other countries. Their mission: Make money by any means necessary.
Security or Development?
I am at a crossroads. I have been working in Development for a while, about half of that time on security sensitive components. I have a fascination with security so I've done PoCs and other security related research on my own, as well as contributing android device kernel cve fixes.Now I find myself forced to choose between continuing in Development on a more general level (I'm currently full stack, this will also let me play with app development); Or join a Security department that is blanket over the entire organization, and as such be part of policy crafting, enforcement, automated scanning tools, but in general not much Dev at all.Please advise.
Submitted February 08, 2018 at 10:52PM by kn1ght
via reddit http://ift.tt/2BNZpgr
I am at a crossroads. I have been working in Development for a while, about half of that time on security sensitive components. I have a fascination with security so I've done PoCs and other security related research on my own, as well as contributing android device kernel cve fixes.Now I find myself forced to choose between continuing in Development on a more general level (I'm currently full stack, this will also let me play with app development); Or join a Security department that is blanket over the entire organization, and as such be part of policy crafting, enforcement, automated scanning tools, but in general not much Dev at all.Please advise.
Submitted February 08, 2018 at 10:52PM by kn1ght
via reddit http://ift.tt/2BNZpgr
reddit
Security or Development? • r/security
I am at a crossroads. I have been working in Development for a while, about half of that time on security sensitive components. I have a...
Security Orchestration for Phishing Intelligence
http://ift.tt/2sfIDmn
Submitted February 08, 2018 at 10:37PM by abhishekiyer
via reddit http://ift.tt/2BKqkcZ
http://ift.tt/2sfIDmn
Submitted February 08, 2018 at 10:37PM by abhishekiyer
via reddit http://ift.tt/2BKqkcZ
Demisto
Security Orchestration for Phishing Intelligence: PhishMe and Demisto
Learn how users can combine phishing trends and context from PhishMe with security orchestration and case management from Demisto to improve response posture.
Weaponization of Nessus Plugins
http://ift.tt/2nMUTpL
Submitted February 08, 2018 at 11:16PM by fang0654
via reddit http://ift.tt/2nSbk3e
http://ift.tt/2nMUTpL
Submitted February 08, 2018 at 11:16PM by fang0654
via reddit http://ift.tt/2nSbk3e
Depth Security
Weaponization of Nessus Plugins
Walking through how to twist a Nessus plugin, meant to test only for the existence of an RCE vulnerability, into a weaponized exploit.
“Joom” safe to use?
My mother finded out about shoping app called Joom. She checked it out and find few nice things for REALY cheap price and is now concerned about it beeing some type of scam. Does anyone know if it is safe?
Submitted February 09, 2018 at 12:00AM by Mr3ap3r
via reddit http://ift.tt/2EvOZme
My mother finded out about shoping app called Joom. She checked it out and find few nice things for REALY cheap price and is now concerned about it beeing some type of scam. Does anyone know if it is safe?
Submitted February 09, 2018 at 12:00AM by Mr3ap3r
via reddit http://ift.tt/2EvOZme
reddit
“Joom” safe to use? • r/security
My mother finded out about shoping app called Joom. She checked it out and find few nice things for REALY cheap price and is now concerned about...
Intel Releases New Spectre Patch For Skylake-Based Processors Sans Nasty Reboot Bug
http://ift.tt/2FWTvax
Submitted February 09, 2018 at 12:12AM by DJRWolf
via reddit http://ift.tt/2GWn5OJ
http://ift.tt/2FWTvax
Submitted February 09, 2018 at 12:12AM by DJRWolf
via reddit http://ift.tt/2GWn5OJ
HotHardware
Intel Releases New Spectre Patch For Skylake-Based Processors Sans Nasty Reboot Bug | HotHardware
Intel is now an issuing a second "production" microcode update for "several" Skylake-platforms.