What's the limit of "ethical" in "ethical hacking"
http://ift.tt/2BfvhcC
Submitted February 08, 2018 at 06:11PM by Nhoya
via reddit http://ift.tt/2nLFE01
http://ift.tt/2BfvhcC
Submitted February 08, 2018 at 06:11PM by Nhoya
via reddit http://ift.tt/2nLFE01
reddit
What's the limit of "ethical" in "ethical hacking" • r/hacking
In the past few days a random guy found a vulnerability on the website of one of the largest political parties in Italy and reported the...
Security In 5: Episode 170 - Microsoft Going After Scareware By Forcibly Uninstalling It From Your PC
http://ift.tt/2nNZLe4
Submitted February 08, 2018 at 07:32PM by BinaryBlog
via reddit http://ift.tt/2nUr9Xc
http://ift.tt/2nNZLe4
Submitted February 08, 2018 at 07:32PM by BinaryBlog
via reddit http://ift.tt/2nUr9Xc
Libsyn
Security In Five Podcast: Episode 170 - Microsoft Going After Scareware By Forcibly Uninstalling It From Your PC
Scareware is software that is installed on your PC that will alert you to some dire event. Usually it deals with viruses detected and the end game is you have to pay to upgrade the software to clean it. Scareware is junk and Microsoft is taking an offensive…
Stealing data even from Faraday cage, Tempest and emanations!
http://ift.tt/2nUnAQO
Submitted February 08, 2018 at 07:30PM by akapranos
via reddit http://ift.tt/2nLQFyC
http://ift.tt/2nUnAQO
Submitted February 08, 2018 at 07:30PM by akapranos
via reddit http://ift.tt/2nLQFyC
The Hacker News
Hackers Can Now Steal Data Even From Faraday Cage Air-Gapped Computers
Hackers can use electromagnetic emission from faraday caged and air gapped computers to steal data.
Litecoin Emerges as the Next Dominant Dark Web Currency
http://ift.tt/2FVZ6Ol
Submitted February 08, 2018 at 08:02PM by volci
via reddit http://ift.tt/2BjakO3
http://ift.tt/2FVZ6Ol
Submitted February 08, 2018 at 08:02PM by volci
via reddit http://ift.tt/2BjakO3
Recorded Future
Litecoin Emerges as the Next Dominant Dark Web Currency
Members of the cybercriminal underground are growing dissatisfied with Bitcoin as a payment vehicle. Recorded Future research revealed that Litecoin is surpassing other cryptocurrencies in preference.
Is Linux more secure than Windows and if so why?
I’ve generally gone by the understanding that Linux has always been miles ahead of Windows in terms of security, and one of the general arguments towards is that given Linux is primarily open source, the code comes under much closer scrutiny and interrogation, not to mention any flaws, bugs and exploits can be ironed out by the general public.What’s are your top 3 arguments for and against each OS in regards to Security, vulnerability, and difficulty to compromise?
Submitted February 08, 2018 at 08:42PM by mscaff
via reddit http://ift.tt/2FTPeET
I’ve generally gone by the understanding that Linux has always been miles ahead of Windows in terms of security, and one of the general arguments towards is that given Linux is primarily open source, the code comes under much closer scrutiny and interrogation, not to mention any flaws, bugs and exploits can be ironed out by the general public.What’s are your top 3 arguments for and against each OS in regards to Security, vulnerability, and difficulty to compromise?
Submitted February 08, 2018 at 08:42PM by mscaff
via reddit http://ift.tt/2FTPeET
reddit
Is Linux more secure than Windows and if so why? • r/security
I’ve generally gone by the understanding that Linux has always been miles ahead of Windows in terms of security, and one of the general arguments...
Inside North Korea’s Hacker Army
http://ift.tt/2gcVjo2
Submitted February 08, 2018 at 08:58PM by agesdear
via reddit http://ift.tt/2C4LBcP
http://ift.tt/2gcVjo2
Submitted February 08, 2018 at 08:58PM by agesdear
via reddit http://ift.tt/2C4LBcP
Bloomberg.com
Businessweek - Bloomberg
Bloomberg Businessweek helps global leaders stay ahead with insights and in-depth analysis on the people, companies, events, and trends shaping today's complex, global economy
Cabinet of Secret Documents from Australia
http://ift.tt/2seb3gr
Submitted February 08, 2018 at 08:58PM by volci
via reddit http://ift.tt/2C5qd7x
http://ift.tt/2seb3gr
Submitted February 08, 2018 at 08:58PM by volci
via reddit http://ift.tt/2C5qd7x
reddit
Cabinet of Secret Documents from Australia • r/security
1 points and 0 comments so far on reddit
Old Joomla! com_weblinks vulnerability being again massively exploited [infograph]
http://ift.tt/2C253Hr
Submitted February 08, 2018 at 08:46PM by ded1cated
via reddit http://ift.tt/2Eea45p
http://ift.tt/2C253Hr
Submitted February 08, 2018 at 08:46PM by ded1cated
via reddit http://ift.tt/2Eea45p
WebARX
Joomla Shell Upload Vulnerability on the rise again
Due to its decaying nature, Joomla vulnerabilities have become well known for its faults. As modular software where anyone can add in modules, the attack surface is wide and deep.
Bounty Monitor: Leverage certificate transparency logs to monitor for newly issued subdomains, participating in bug bounty programs
http://ift.tt/2nSJvHT
Submitted February 08, 2018 at 09:53PM by AlternativeWalrus
via reddit http://ift.tt/2nMcSww
http://ift.tt/2nSJvHT
Submitted February 08, 2018 at 09:53PM by AlternativeWalrus
via reddit http://ift.tt/2nMcSww
GitHub
nashcontrol/bounty-monitor
bounty-monitor - Leverage certificate transparency live feed to monitor for newly issued subdomain cerficates, for domains participating in bug bounty programs
3snake - Dumping plaintext credentials from sshd and sudo processes from memory on Linux servers
http://ift.tt/2nMkD5E
Submitted February 08, 2018 at 08:45PM by l0tan
via reddit http://ift.tt/2nLRgA6
http://ift.tt/2nMkD5E
Submitted February 08, 2018 at 08:45PM by l0tan
via reddit http://ift.tt/2nLRgA6
GitHub
blendin/3snake
3snake - Tool for extracting information from newly spawned processes
Inside North Korea’s Hacker Army
http://ift.tt/2BJppt2
Submitted February 08, 2018 at 10:08PM by agesdear
via reddit http://ift.tt/2FVHQJi
http://ift.tt/2BJppt2
Submitted February 08, 2018 at 10:08PM by agesdear
via reddit http://ift.tt/2FVHQJi
Bloomberg.com
Inside North Korea’s Hacker Army
The regime in Pyongyang has sent hundreds of programmers to other countries. Their mission: Make money by any means necessary.
Security or Development?
I am at a crossroads. I have been working in Development for a while, about half of that time on security sensitive components. I have a fascination with security so I've done PoCs and other security related research on my own, as well as contributing android device kernel cve fixes.Now I find myself forced to choose between continuing in Development on a more general level (I'm currently full stack, this will also let me play with app development); Or join a Security department that is blanket over the entire organization, and as such be part of policy crafting, enforcement, automated scanning tools, but in general not much Dev at all.Please advise.
Submitted February 08, 2018 at 10:52PM by kn1ght
via reddit http://ift.tt/2BNZpgr
I am at a crossroads. I have been working in Development for a while, about half of that time on security sensitive components. I have a fascination with security so I've done PoCs and other security related research on my own, as well as contributing android device kernel cve fixes.Now I find myself forced to choose between continuing in Development on a more general level (I'm currently full stack, this will also let me play with app development); Or join a Security department that is blanket over the entire organization, and as such be part of policy crafting, enforcement, automated scanning tools, but in general not much Dev at all.Please advise.
Submitted February 08, 2018 at 10:52PM by kn1ght
via reddit http://ift.tt/2BNZpgr
reddit
Security or Development? • r/security
I am at a crossroads. I have been working in Development for a while, about half of that time on security sensitive components. I have a...
Security Orchestration for Phishing Intelligence
http://ift.tt/2sfIDmn
Submitted February 08, 2018 at 10:37PM by abhishekiyer
via reddit http://ift.tt/2BKqkcZ
http://ift.tt/2sfIDmn
Submitted February 08, 2018 at 10:37PM by abhishekiyer
via reddit http://ift.tt/2BKqkcZ
Demisto
Security Orchestration for Phishing Intelligence: PhishMe and Demisto
Learn how users can combine phishing trends and context from PhishMe with security orchestration and case management from Demisto to improve response posture.
Weaponization of Nessus Plugins
http://ift.tt/2nMUTpL
Submitted February 08, 2018 at 11:16PM by fang0654
via reddit http://ift.tt/2nSbk3e
http://ift.tt/2nMUTpL
Submitted February 08, 2018 at 11:16PM by fang0654
via reddit http://ift.tt/2nSbk3e
Depth Security
Weaponization of Nessus Plugins
Walking through how to twist a Nessus plugin, meant to test only for the existence of an RCE vulnerability, into a weaponized exploit.
“Joom” safe to use?
My mother finded out about shoping app called Joom. She checked it out and find few nice things for REALY cheap price and is now concerned about it beeing some type of scam. Does anyone know if it is safe?
Submitted February 09, 2018 at 12:00AM by Mr3ap3r
via reddit http://ift.tt/2EvOZme
My mother finded out about shoping app called Joom. She checked it out and find few nice things for REALY cheap price and is now concerned about it beeing some type of scam. Does anyone know if it is safe?
Submitted February 09, 2018 at 12:00AM by Mr3ap3r
via reddit http://ift.tt/2EvOZme
reddit
“Joom” safe to use? • r/security
My mother finded out about shoping app called Joom. She checked it out and find few nice things for REALY cheap price and is now concerned about...
Intel Releases New Spectre Patch For Skylake-Based Processors Sans Nasty Reboot Bug
http://ift.tt/2FWTvax
Submitted February 09, 2018 at 12:12AM by DJRWolf
via reddit http://ift.tt/2GWn5OJ
http://ift.tt/2FWTvax
Submitted February 09, 2018 at 12:12AM by DJRWolf
via reddit http://ift.tt/2GWn5OJ
HotHardware
Intel Releases New Spectre Patch For Skylake-Based Processors Sans Nasty Reboot Bug | HotHardware
Intel is now an issuing a second "production" microcode update for "several" Skylake-platforms.
Introducing Red Baron - Automate the Creation of Resilient, Disposable, Secure, and Agile Infrastructure for Red Teams
http://ift.tt/2EwvY3r
Submitted February 09, 2018 at 02:40AM by coalfirelabs
via reddit http://ift.tt/2sd36YI
http://ift.tt/2EwvY3r
Submitted February 09, 2018 at 02:40AM by coalfirelabs
via reddit http://ift.tt/2sd36YI
Coalfire.com
Post
Coalfire Labs blog posts with opinions, findings and research from the technical testing of IT perspective.
Cyber security, telecommuting, natural disasters
Hi,Does anyone have any statistics or resources speaking to increased cyber attacks that coincide with natural disasters? For example, a company has to enact its Business Continuity Plan because of a massive snowstorm, and the whole office telecommutes for days from less secure home networks. Any trends or information/comments you could point me to or share would be very welcome. Thanks!
Submitted February 09, 2018 at 02:47AM by young_monet
via reddit http://ift.tt/2FYDLnJ
Hi,Does anyone have any statistics or resources speaking to increased cyber attacks that coincide with natural disasters? For example, a company has to enact its Business Continuity Plan because of a massive snowstorm, and the whole office telecommutes for days from less secure home networks. Any trends or information/comments you could point me to or share would be very welcome. Thanks!
Submitted February 09, 2018 at 02:47AM by young_monet
via reddit http://ift.tt/2FYDLnJ
reddit
Cyber security, telecommuting, natural disasters • r/security
Hi, Does anyone have any statistics or resources speaking to increased cyber attacks that coincide with natural disasters? For example, a company...
Sacramento Bee Leaks 19.5 Million California Voter Records, Promptly Compromised by Hackers
http://ift.tt/2ErR0Qn
Submitted February 09, 2018 at 02:35AM by austingwalters
via reddit http://ift.tt/2H1qiwo
http://ift.tt/2ErR0Qn
Submitted February 09, 2018 at 02:35AM by austingwalters
via reddit http://ift.tt/2H1qiwo
Gizmodo
Sacramento Bee Leaks 19.5 Million California Voter Records, Promptly Compromised by Hackers
Last month, a local California newspaper left more than 19 million voter records exposed online. Gizmodo confirmed this week that the records were compromised during an apparent ransomware attack.
Google has paid security researchers almost $12 million for bug bounties, $2.9 million in 2017 alone
http://ift.tt/2FWWSyl
Submitted February 09, 2018 at 02:07AM by speckz
via reddit http://ift.tt/2EPdRDi
http://ift.tt/2FWWSyl
Submitted February 09, 2018 at 02:07AM by speckz
via reddit http://ift.tt/2EPdRDi
VentureBeat
Google has paid security researchers almost $12 million for bug bounties, $2.9 million in 2017 alone
Google today announced it has paid out almost $12 million since launching its bug bounty program in November 2010. In the past year alone, the company paid 274 different security researchers $2.9 million, although the year before that it paid out over $3…
unfurl, An Entropy-Based Link Vulnerability Analysis Tool. Triages potentially vulnerable URLs from large-sample collections.
http://ift.tt/2GYBpGq
Submitted February 09, 2018 at 05:51AM by jalospinoso
via reddit http://ift.tt/2nXfbvI
http://ift.tt/2GYBpGq
Submitted February 09, 2018 at 05:51AM by jalospinoso
via reddit http://ift.tt/2nXfbvI
jlospinoso.github.io
unfurl, An Entropy-Based Link Vulnerability Analysis Tool
The Blog of Josh Lospinoso