[March 6-8, 2018] Information Technology and Cyber Security Conference + Training in Tokyo, Japan (Discount coupon in comments)
http://ift.tt/2lywZhw
Submitted February 12, 2018 at 07:25PM by dhparams
via reddit http://ift.tt/2EC0Xeo
http://ift.tt/2lywZhw
Submitted February 12, 2018 at 07:25PM by dhparams
via reddit http://ift.tt/2EC0Xeo
Personal salt. Easy password model concept I came up with, wondering if this is a good idea.
I'm personally using at least 6 different passwords and it's getting very hard to remember where I'm using what, so I came up with the following idea inspired by xkcd comic strip.What is a personal salt?Personal salt is a simple global passphrase which is meant to make your password safer, meet the security criteria of passwords of internet sites, while making the overall remembering of the password simpler.The idea behind a personal salt is for an individual to come up with at least three unconnected word passphrase including capital letters, lowercase letters and one or more numbers and then append a simple word or the internet site domain name to it as an appendix, coming up with unique pass for every site.Domain based password:Example: Dave chooses a personal salt "FrogThresholdMATRIX399", then as a result he could use it on every site, with little variance, for example, Dave's LinkedIn password could be "FrogThresholdMATRIX399LinkedIn", his Facebook password could be "FrogThresholdMATRIX399Facebook", his Gmail password could be "FrogThresholdMATRIX399Gmail", and so on. You can see that Dave only has to remember one complex sequence of characters that easily passes all the security policies of any site online, while his password is different for all sites he has an account on.This way Dave always remembers his password and he has new unique password for the next site he intends to register an account to.Concluding:Pros:Only have to remember one passphrase and can easily derive the rest from domain name.Password is complex enough to pass the security requirements.Resilient to dictionary attack even without salting in the server side (which is usually always done anyway).Impossible to brute force within any reasonable time with today's technology.No extra software needed to manage passwords.Cons:If someone finds out Dave's password in text form, and this technique is known, they might be able to guess the pattern and try it on other sites Dave has an account on. (See Common word based password below)Can be lengthy to write, especially when typo is made during an attempt to access account.If the site forces to change the password at interval, then using domain name is not enough. (See solution to changing password below.)Common word based password: Alternatively Dave may use some other word instead of domain name, which is simple enough to remember later, like everyday objects, so on site A, his password might be "FrogThresholdMATRIX399Milk" and on site B, his pass might be "FrogThresholdMATRIX399Pen", so he just remembers "Milk" and "Pen" and no longer there's a domain name in the password and the perpetrator who has acquired Dave's password for site A has no idea what password Dave is using or might be using on site B.Solution to changing password: There are certain sites that force you to change the password periodically, which means having domain appended password is not possible for longer time. Dave may add a current month number to end of the domain name in this case. For example when during February the site forces Dave to change the password, he may use "FrogThresholdMATRIX399Pets2", where the number 2 corresponds to February. Then in an attempt to remember the password in March Dave can try whether the password ends with 3 or 2, resulting only in one failed attempt to sign in. Alternatively he can use random common words and just rotate existing known passwords for him. In any case, without writing it down or using password manager, password change is painful and this system doesn't attempt to solve it nor makes it any worse.What do you think?
Submitted February 12, 2018 at 11:36PM by deadlock_jones
via reddit http://ift.tt/2EXigUO
I'm personally using at least 6 different passwords and it's getting very hard to remember where I'm using what, so I came up with the following idea inspired by xkcd comic strip.What is a personal salt?Personal salt is a simple global passphrase which is meant to make your password safer, meet the security criteria of passwords of internet sites, while making the overall remembering of the password simpler.The idea behind a personal salt is for an individual to come up with at least three unconnected word passphrase including capital letters, lowercase letters and one or more numbers and then append a simple word or the internet site domain name to it as an appendix, coming up with unique pass for every site.Domain based password:Example: Dave chooses a personal salt "FrogThresholdMATRIX399", then as a result he could use it on every site, with little variance, for example, Dave's LinkedIn password could be "FrogThresholdMATRIX399LinkedIn", his Facebook password could be "FrogThresholdMATRIX399Facebook", his Gmail password could be "FrogThresholdMATRIX399Gmail", and so on. You can see that Dave only has to remember one complex sequence of characters that easily passes all the security policies of any site online, while his password is different for all sites he has an account on.This way Dave always remembers his password and he has new unique password for the next site he intends to register an account to.Concluding:Pros:Only have to remember one passphrase and can easily derive the rest from domain name.Password is complex enough to pass the security requirements.Resilient to dictionary attack even without salting in the server side (which is usually always done anyway).Impossible to brute force within any reasonable time with today's technology.No extra software needed to manage passwords.Cons:If someone finds out Dave's password in text form, and this technique is known, they might be able to guess the pattern and try it on other sites Dave has an account on. (See Common word based password below)Can be lengthy to write, especially when typo is made during an attempt to access account.If the site forces to change the password at interval, then using domain name is not enough. (See solution to changing password below.)Common word based password: Alternatively Dave may use some other word instead of domain name, which is simple enough to remember later, like everyday objects, so on site A, his password might be "FrogThresholdMATRIX399Milk" and on site B, his pass might be "FrogThresholdMATRIX399Pen", so he just remembers "Milk" and "Pen" and no longer there's a domain name in the password and the perpetrator who has acquired Dave's password for site A has no idea what password Dave is using or might be using on site B.Solution to changing password: There are certain sites that force you to change the password periodically, which means having domain appended password is not possible for longer time. Dave may add a current month number to end of the domain name in this case. For example when during February the site forces Dave to change the password, he may use "FrogThresholdMATRIX399Pets2", where the number 2 corresponds to February. Then in an attempt to remember the password in March Dave can try whether the password ends with 3 or 2, resulting only in one failed attempt to sign in. Alternatively he can use random common words and just rotate existing known passwords for him. In any case, without writing it down or using password manager, password change is painful and this system doesn't attempt to solve it nor makes it any worse.What do you think?
Submitted February 12, 2018 at 11:36PM by deadlock_jones
via reddit http://ift.tt/2EXigUO
xkcd
Password Strength
Free Ethical Hacking Course - Module 4 -Enumeration of Objective Systems
http://ift.tt/2ElZDZs
Submitted February 13, 2018 at 03:23AM by gburu
via reddit http://ift.tt/2EXGQVC
http://ift.tt/2ElZDZs
Submitted February 13, 2018 at 03:23AM by gburu
via reddit http://ift.tt/2EXGQVC
en.gburu.net
Ethical Hacking Course - Module 4 -Enumeration of Objective Systems - en.gburu.net
Free Ethical Hacking Course. Module 4 - Enumeration of Objective Systems, you will learn the techniques that hackers use to list systems.
Forensic Readiness: Setting the Foundation for Cybersecurity
I’ve been involved in addressing many different cyberattacks in 2017 and early 2018, with some attacks being more successful than others. My involvement was usually in identifying the nature of the attack in a post mortem fashion or thwarting the advancement of an attack in progress. One common thread among all of them was the lack of forensic readiness by the organization that was attacked. So, what exactly is forensic readiness? Most organizations deploy some advanced hardware at the perimeter (such as firewall/application proxy) to control North-South traffic that is either generated from the local network heading to the Internet or vice versa. Other organizations adopt a more advanced model of installing an additional Intrusion Detection System on the network that monitors East-West traffic (traffic that moves between the users, servers, storage etc.). A logging system is installed to capture the events and then the assumption is that we can defend this echo system successfully. The reality, as many of you reading this blog understand, is that this type of installation is typical but inadequate. If something were to happen (user account hacked, USB device, malware traversing an email file or someone gaining access to a cloud tenancy, etc.), the logs provided by the firewall and the IDS device would not be sufficient to ascertain what happened let alone attempt to prosecute the case if the business was harmed. I’m going to walk you through some of the changes that I think are necessary for a strong foundation in cyber security and pertain only to the data collection portion of the forensic process. Identifying Sources of Data: • Local equipment such as firewalls, servers, local Active Directory controllers, wireless devices, etc. • Remote equipment: Similar to above but residing in a different location such as remote offices and data centers • Cloud providers: O365, Azure, AWS, Google, and other hosting providers whether hosting Infrastructure or Application as a Service Acquiring the data: • Set up an NTP server to synchronize all devices to ensure that incoming data has proper timing (for correlation purposes) • Configure the sources to send the logs to a centralized SIEM (Security Information and Event Management) system such as Splunk or AlienVault • Configure the sources to have the necessary settings for the logs in order to sufficiently identify an attack and/or present enough evidence to allow prosecution • Configure the cloud tenancies to adequately collect and forward the logs to the SIEM • Install Intrusion Detection Systems/Capabilities on your VPN tunnels and any other external connector with a partner or client and ensure that proper logging is enabled and forwarding to your SIEM Although data collection is a sub section of forensic readiness, it cannot be underestimated because in every incident I have participated in, the logs pertaining to the attack were never sufficient. Please feel free to comment on this blog and or contact me at uhoulila@crossrealms.com. Be on the lookout for my upcoming forensic toolkit, which addresses forensic readiness more comprehensively.
Submitted February 13, 2018 at 03:14AM by houlila
via reddit http://ift.tt/2G89q5Z
I’ve been involved in addressing many different cyberattacks in 2017 and early 2018, with some attacks being more successful than others. My involvement was usually in identifying the nature of the attack in a post mortem fashion or thwarting the advancement of an attack in progress. One common thread among all of them was the lack of forensic readiness by the organization that was attacked. So, what exactly is forensic readiness? Most organizations deploy some advanced hardware at the perimeter (such as firewall/application proxy) to control North-South traffic that is either generated from the local network heading to the Internet or vice versa. Other organizations adopt a more advanced model of installing an additional Intrusion Detection System on the network that monitors East-West traffic (traffic that moves between the users, servers, storage etc.). A logging system is installed to capture the events and then the assumption is that we can defend this echo system successfully. The reality, as many of you reading this blog understand, is that this type of installation is typical but inadequate. If something were to happen (user account hacked, USB device, malware traversing an email file or someone gaining access to a cloud tenancy, etc.), the logs provided by the firewall and the IDS device would not be sufficient to ascertain what happened let alone attempt to prosecute the case if the business was harmed. I’m going to walk you through some of the changes that I think are necessary for a strong foundation in cyber security and pertain only to the data collection portion of the forensic process. Identifying Sources of Data: • Local equipment such as firewalls, servers, local Active Directory controllers, wireless devices, etc. • Remote equipment: Similar to above but residing in a different location such as remote offices and data centers • Cloud providers: O365, Azure, AWS, Google, and other hosting providers whether hosting Infrastructure or Application as a Service Acquiring the data: • Set up an NTP server to synchronize all devices to ensure that incoming data has proper timing (for correlation purposes) • Configure the sources to send the logs to a centralized SIEM (Security Information and Event Management) system such as Splunk or AlienVault • Configure the sources to have the necessary settings for the logs in order to sufficiently identify an attack and/or present enough evidence to allow prosecution • Configure the cloud tenancies to adequately collect and forward the logs to the SIEM • Install Intrusion Detection Systems/Capabilities on your VPN tunnels and any other external connector with a partner or client and ensure that proper logging is enabled and forwarding to your SIEM Although data collection is a sub section of forensic readiness, it cannot be underestimated because in every incident I have participated in, the logs pertaining to the attack were never sufficient. Please feel free to comment on this blog and or contact me at uhoulila@crossrealms.com. Be on the lookout for my upcoming forensic toolkit, which addresses forensic readiness more comprehensively.
Submitted February 13, 2018 at 03:14AM by houlila
via reddit http://ift.tt/2G89q5Z
CrossRealms International
Home | CrossRealms International
At CrossRealms International, we provide exceptional IT services for forward-thinking companies. With a team of certified engineers available around the clock on a scalable model to support your business infrastructure, cloud, applications, and security,…
A safe os for daily use and crypto assets
Hi y'all, anybody here loving the DLT space? I do, it's exciting.Anyway, i'm running windows 10 on my PC and i've had it with this OS. Got weirdness going on every now and then and been trying to find those damn viruses or other malware, too scared to use my wallets, i need a better OS. I have just once tried Tails for a few days, besides that only windows.It's my daily PC that i use for browsing/watching/trading etc. I also want to run a Bitcoin lightning node if that is profitable AND mine anything profitable and popular. Specs: intel g3258 3.2ghz 4gb ram 120gb ssd 1tb hdd A single Ati 280x tri-xI've just had a look at linux Manjaro KDE from a usb stick, surprised that it looks and feels nice! I dont know if it has good enough safety and if it is suitable for running a lightning node/mining/keeping wallets/trading..When it comes to safety i'm new to most of the things i've read about such as tor, php, deep packet inspection, vpn and whatever else could work. But that's what i want and need with all the scamming in the cryptospace, sufficient safety.
Submitted February 13, 2018 at 04:10AM by Cryptocats2point0
via reddit http://ift.tt/2EnZZ6a
Hi y'all, anybody here loving the DLT space? I do, it's exciting.Anyway, i'm running windows 10 on my PC and i've had it with this OS. Got weirdness going on every now and then and been trying to find those damn viruses or other malware, too scared to use my wallets, i need a better OS. I have just once tried Tails for a few days, besides that only windows.It's my daily PC that i use for browsing/watching/trading etc. I also want to run a Bitcoin lightning node if that is profitable AND mine anything profitable and popular. Specs: intel g3258 3.2ghz 4gb ram 120gb ssd 1tb hdd A single Ati 280x tri-xI've just had a look at linux Manjaro KDE from a usb stick, surprised that it looks and feels nice! I dont know if it has good enough safety and if it is suitable for running a lightning node/mining/keeping wallets/trading..When it comes to safety i'm new to most of the things i've read about such as tor, php, deep packet inspection, vpn and whatever else could work. But that's what i want and need with all the scamming in the cryptospace, sufficient safety.
Submitted February 13, 2018 at 04:10AM by Cryptocats2point0
via reddit http://ift.tt/2EnZZ6a
reddit
A safe os for daily use and crypto assets • r/security
Hi y'all, anybody here loving the DLT space? I do, it's exciting. Anyway, i'm running windows 10 on my PC and i've had it with this OS. Got...
API Security Checklist
http://ift.tt/2CN1xlo
Submitted February 13, 2018 at 05:40AM by zinsi-
via reddit http://ift.tt/2sq2S0t
http://ift.tt/2CN1xlo
Submitted February 13, 2018 at 05:40AM by zinsi-
via reddit http://ift.tt/2sq2S0t
Templarbit Inc.
API Security Checklist
Modern web applications depend heavily on third-party APIs...
Kotlin and Java: How Hackers See Your Code
http://ift.tt/2Epb2Ms
Submitted February 13, 2018 at 08:20AM by numberbuzy
via reddit http://ift.tt/2G7zM8c
http://ift.tt/2Epb2Ms
Submitted February 13, 2018 at 08:20AM by numberbuzy
via reddit http://ift.tt/2G7zM8c
brompwnie.github.io
Kotlin and Java: How Hackers See Your Code
Hello! In this blog post, I’ll be sharing with you a recent experiment I did with Java and Kotlin Android applications. Kotlin is new to the Android space an...
We need to continue the debate on the ethics and perils of publishing security research
http://ift.tt/2BOqX50
Submitted February 13, 2018 at 09:31AM by SuccessfulOperation
via reddit http://ift.tt/2BpbIyG
http://ift.tt/2BOqX50
Submitted February 13, 2018 at 09:31AM by SuccessfulOperation
via reddit http://ift.tt/2BpbIyG
Virusbulletin
Virus Bulletin :: We need to continue the debate on the ethics and perils of publishing security research
An article by security researcher Collin Anderson reopens the debate on whether publishing threat analyses is always in the public interest.
Looks like itunes india may have been hit by the cryptojacking malware to mine monero.
http://ift.tt/2sqEkEP
Submitted February 13, 2018 at 10:43AM by sojana
via reddit http://ift.tt/2sqia5H
http://ift.tt/2sqEkEP
Submitted February 13, 2018 at 10:43AM by sojana
via reddit http://ift.tt/2sqia5H
reddit
Looks like itunes india may have been hit by the... • r/india
It seems the itunes india website might have been [compromised](https://twitter.com/Banbreach/status/963138304274239488) to secretly mine monero....
Competent Event Security Services Company in Dubai, UAE
http://ift.tt/2CfXcpH
Submitted February 13, 2018 at 03:32PM by amberjhon215
via reddit http://ift.tt/2EpWyvN
http://ift.tt/2CfXcpH
Submitted February 13, 2018 at 03:32PM by amberjhon215
via reddit http://ift.tt/2EpWyvN
Liverpooldubai
Competent Event Security Services Company in Dubai, UAE
Event & Concert Security Services, Our team close protection officers are discreet and Professional with a substantial amount of Dubai, UAE experience
Recon Brussels slides
http://ift.tt/2Cekz2V
Submitted February 13, 2018 at 04:06PM by sanderD
via reddit http://ift.tt/2ChuFQv
http://ift.tt/2Cekz2V
Submitted February 13, 2018 at 04:06PM by sanderD
via reddit http://ift.tt/2ChuFQv
recon.cx
Slides
REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques.
Linux hacked on to the Nintendo Switch thanks to CPU flaw
http://ift.tt/2G8Si01
Submitted February 13, 2018 at 04:39PM by Iot_Security
via reddit http://ift.tt/2EZEpSB
http://ift.tt/2G8Si01
Submitted February 13, 2018 at 04:39PM by Iot_Security
via reddit http://ift.tt/2EZEpSB
KitGuru
Linux hacked on to the Nintendo Switch thanks to CPU flaw - KitGuru
Hackers have been hard at work on the Nintendo Switch during its first year in circulation, successf
Consumers want more #IoT regulation
http://ift.tt/2EFDl8N
Submitted February 13, 2018 at 04:34PM by Iot_Security
via reddit http://ift.tt/2EiMkcj
http://ift.tt/2EFDl8N
Submitted February 13, 2018 at 04:34PM by Iot_Security
via reddit http://ift.tt/2EiMkcj
Help Net Security
Consumers want more IoT regulation - Help Net Security
According to a study from Market Strategies International, consumers who understand IoT technologies want more IoT regulation.
Necurs Fuels Massive Valentine's Day Spam Campaign
http://ift.tt/2BTEDvD
Submitted February 13, 2018 at 05:42PM by CasperVPN
via reddit http://ift.tt/2EpIgqE
http://ift.tt/2BTEDvD
Submitted February 13, 2018 at 05:42PM by CasperVPN
via reddit http://ift.tt/2EpIgqE
Infosecurity Magazine
Necurs Fuels Massive Valentine's Day Spam Campaign
The campaign delivers short email blurbs supposedly from Russian women living in the US.
Is it Time to Add Entry Control Security Gates to Your Multi-Family Community?
http://ift.tt/2o1KSEo
Submitted February 13, 2018 at 05:41PM by Francegerona
via reddit http://ift.tt/2nWcoUA
http://ift.tt/2o1KSEo
Submitted February 13, 2018 at 05:41PM by Francegerona
via reddit http://ift.tt/2nWcoUA
Tusco, Inc.
Tusco, Inc. - Perimeter Security Solutions
Tusco, Inc. has ben a leading supplier of perimeter security solutions, commercial fencing, and access controls throughout the United States since 1974.
Thieves are using regular people's names and identities to swindle the US government in a new scam that puts anyone at risk
http://ift.tt/2smQpuy
Submitted February 13, 2018 at 06:46PM by iliketechnews
via reddit http://ift.tt/2Gam9Fv
http://ift.tt/2smQpuy
Submitted February 13, 2018 at 06:46PM by iliketechnews
via reddit http://ift.tt/2Gam9Fv
Business Insider
Thieves are using regular people's names and identities to swindle the US government in a new scam that puts anyone at risk
Equifax exposed the personal information of 143 million Americans — and fraudsters may be using that data to apply for FEMA disaster relief.
How to SPICE It Up And Gain That Funding For Your Security Operations.
http://ift.tt/2ElxaHk
Submitted February 13, 2018 at 06:41PM by Uminekoshi
via reddit http://ift.tt/2ChB0vk
http://ift.tt/2ElxaHk
Submitted February 13, 2018 at 06:41PM by Uminekoshi
via reddit http://ift.tt/2ChB0vk
Nehemiah Security
SPICE it up and gain that funding for your security operations - Nehemiah Security
What can this story teach us from a cybersecurity spend perspective? Sometimes, some education needs to take place in order to approve funding for cyber projects.
Security In 5: Episode 173 - What Is Malicious Cryptomining And Why Is It Harmful For Your Business
http://ift.tt/2HbELpP
Submitted February 13, 2018 at 07:35PM by BinaryBlog
via reddit http://ift.tt/2Gcniwf
http://ift.tt/2HbELpP
Submitted February 13, 2018 at 07:35PM by BinaryBlog
via reddit http://ift.tt/2Gcniwf
Libsyn
Security In Five Podcast: Episode 173 - What Is Malicious Cryptomining And Why Is It Harmful For Your Business
The new threats to businesses is cryptomining. Instead of delivering ransomware or other damaging malware criminals are turning to secretly using your computer's processor power to mine for cryptocurrencies. This episode goes into why they are doing, how…
Left-to-right zero-day in Telegram
http://ift.tt/2EEWIys
Submitted February 13, 2018 at 07:45PM by RewardfulCopywriter
via reddit http://ift.tt/2o3LoBG
http://ift.tt/2EEWIys
Submitted February 13, 2018 at 07:45PM by RewardfulCopywriter
via reddit http://ift.tt/2o3LoBG
Securelist - Information about Viruses, Hackers and Spam
Zero-day vulnerability in Telegram
In October 2017, we learned of a vulnerability in Telegram Messenger’s Windows client that was being exploited in the wild. It involves the use of a classic right-to-left override attack when a user sends files over the messenger service.
Winter Olympics attack details
http://ift.tt/2sowbAR
Submitted February 13, 2018 at 09:23PM by lormayna
via reddit http://ift.tt/2EBbhmR
http://ift.tt/2sowbAR
Submitted February 13, 2018 at 09:23PM by lormayna
via reddit http://ift.tt/2EBbhmR
Talosintelligence
Olympic Destroyer Takes Aim At Winter Olympics
A blog from the world class Intelligence Group, Talos, Cisco's Intelligence Group
Stalking with Citymapper routes
http://ift.tt/2sqCsfb
Submitted February 13, 2018 at 09:20PM by eth0izzle
via reddit http://ift.tt/2sqDbwV
http://ift.tt/2sqCsfb
Submitted February 13, 2018 at 09:20PM by eth0izzle
via reddit http://ift.tt/2sqDbwV
darkport
Online Stalking: London, Paris, New York
Much like the Strava controversy a few weeks ago, this is a great example of how seemingly innocent data can be used for nefarious purposes. Citymapper is a journey planning application that integrates all modes of transport (public, cycling, walking, driving)…