Water Utility Infected by Cryptocurrency Mining Software
http://ift.tt/2Esb4lL
Submitted February 14, 2018 at 08:09PM by volci
via reddit http://ift.tt/2CkwPyE
http://ift.tt/2Esb4lL
Submitted February 14, 2018 at 08:09PM by volci
via reddit http://ift.tt/2CkwPyE
reddit
Water Utility Infected by Cryptocurrency Mining Software • r/security
2 points and 0 comments so far on reddit
Telegram zero-day exploit is a warning
http://ift.tt/2o5H5WJ
Submitted February 14, 2018 at 07:56PM by wlscr
via reddit http://ift.tt/2EuF8Or
http://ift.tt/2o5H5WJ
Submitted February 14, 2018 at 07:56PM by wlscr
via reddit http://ift.tt/2EuF8Or
Roses are red, Kaspersky is blue: 'That ban's unconstitutional!' Boo hoo hoo
http://ift.tt/2Bv7bLd
Submitted February 14, 2018 at 07:55PM by wlscr
via reddit http://ift.tt/2BY5Kpo
http://ift.tt/2Bv7bLd
Submitted February 14, 2018 at 07:55PM by wlscr
via reddit http://ift.tt/2BY5Kpo
www.theregister.co.uk
Roses are red, Kaspersky is blue: 'That ban's unconstitutional!' Boo hoo hoo
New front opens in Russian firm's legal fight with US gov
Security In 5: Episode 174 - How To Create An Incident Response Plan In A Few Easy Steps
http://ift.tt/2BtR9AV
Submitted February 14, 2018 at 07:35PM by BinaryBlog
via reddit http://ift.tt/2C2zIZs
http://ift.tt/2BtR9AV
Submitted February 14, 2018 at 07:35PM by BinaryBlog
via reddit http://ift.tt/2C2zIZs
Libsyn
Security In Five Podcast: Episode 174 - How To Create An Incident Response Plan In A Few Easy Steps
When you have an incident in your business, from a virus infection or massive outage, do you and your business know how to react? Incident response plans are an important part of an effective security program. This episode lays out some simple steps to begin…
Why the hack-back is still the worst idea in cybersecurity
http://ift.tt/2Es1ETZ
Submitted February 14, 2018 at 09:05PM by CrankyBear
via reddit http://ift.tt/2F4if1s
http://ift.tt/2Es1ETZ
Submitted February 14, 2018 at 09:05PM by CrankyBear
via reddit http://ift.tt/2F4if1s
TechBeacon
Why the hack-back is still the worst idea in cybersecurity
Too much can go wrong when private firms have permission to pursue attackers into other companies' networks, security experts say.
Using Google Analytics for data extraction - How to Bypassing CSP with Google Analytics
http://ift.tt/2Dqn0Rr
Submitted February 14, 2018 at 10:08PM by speckz
via reddit http://ift.tt/2F2YbfH
http://ift.tt/2Dqn0Rr
Submitted February 14, 2018 at 10:08PM by speckz
via reddit http://ift.tt/2F2YbfH
reddit
Using Google Analytics for data extraction - How to... • r/security
1 points and 0 comments so far on reddit
Forensic Readiness: Setting the Foundation For Cybersecurity
http://ift.tt/2Ge1Y9o
Submitted February 14, 2018 at 10:06PM by houlila
via reddit http://ift.tt/2EE6Zem
http://ift.tt/2Ge1Y9o
Submitted February 14, 2018 at 10:06PM by houlila
via reddit http://ift.tt/2EE6Zem
CrossRealms
Forensic Readiness: Setting the Foundation For Cybersecurity
Although data collection is a sub section of forensic readiness, it cannot be underestimated because in every incident I have participated in, the logs pertaining to the attack were never sufficient.
Can Consumers' Online Data Be Protected?
http://ift.tt/2EpjcAq
Submitted February 14, 2018 at 11:34PM by volci
via reddit http://ift.tt/2EtU5R1
http://ift.tt/2EpjcAq
Submitted February 14, 2018 at 11:34PM by volci
via reddit http://ift.tt/2EtU5R1
reddit
Can Consumers' Online Data Be Protected? • r/security
1 points and 0 comments so far on reddit
Did the UN check their certs before declaring Symantec the most ethical company?
http://ift.tt/2Eo9SAS
Submitted February 14, 2018 at 11:54PM by Noobmode
via reddit http://ift.tt/2o6CWlr
http://ift.tt/2Eo9SAS
Submitted February 14, 2018 at 11:54PM by Noobmode
via reddit http://ift.tt/2o6CWlr
Symantec
ROI That Matters – Return On Integrity
For 11th Consecutive Year, Symantec Recognized as one of the World's Most Ethical Companies
Meltdown, Spectre, and user stories from the new security “normal”
http://ift.tt/2nZpLn0
Submitted February 15, 2018 at 12:46AM by personman
via reddit http://ift.tt/2o7yXoC
http://ift.tt/2nZpLn0
Submitted February 15, 2018 at 12:46AM by personman
via reddit http://ift.tt/2o7yXoC
Medium
Meltdown, Spectre, and user stories from the new security “normal”
This article was originally published on the ThoughtWorks Insights blog.
Your ISP is Probably Spying On You
http://ift.tt/2F79a8h
Submitted February 15, 2018 at 02:11AM by fo0bat
via reddit http://ift.tt/2Ety3JO
http://ift.tt/2F79a8h
Submitted February 15, 2018 at 02:11AM by fo0bat
via reddit http://ift.tt/2Ety3JO
Orchestrating New Employee Onboarding With Custom Playbook
http://ift.tt/2Clbrta
Submitted February 15, 2018 at 02:09AM by abhishekiyer
via reddit http://ift.tt/2F79bJn
http://ift.tt/2Clbrta
Submitted February 15, 2018 at 02:09AM by abhishekiyer
via reddit http://ift.tt/2F79bJn
Demisto
How Demisto Uses Demisto Part 1: Orchestrating Employee Onboarding
Learn how we use a custom Demisto playbook that orchestrates actions across people, processes, and technology to ensure seamless new employee onboarding.
U.S. intelligence agencies are still warning against buying Huawei and ZTE phones
http://ift.tt/2HdI6Vg
Submitted February 15, 2018 at 01:43AM by liotier
via reddit http://ift.tt/2ssoSrL
http://ift.tt/2HdI6Vg
Submitted February 15, 2018 at 01:43AM by liotier
via reddit http://ift.tt/2ssoSrL
TechCrunch
U.S. intelligence agencies are still warning against buying Huawei and ZTE phones
Things are still looking pretty bleak for Huawei’s plans to conquer the U.S. market. Earlier this week, half a dozen top members of intelligence agencies, including the FBI, CIA and NSA…
Differing service names in the Google Service Management API cause an authorization bypass (And a $7500 bounty)
http://ift.tt/2Bu8cD2
Submitted February 15, 2018 at 01:37AM by epereiralopez
via reddit http://ift.tt/2EIZOlg
http://ift.tt/2Bu8cD2
Submitted February 15, 2018 at 01:37AM by epereiralopez
via reddit http://ift.tt/2EIZOlg
Google
$7.5k Google services mix-up - Ezequiel Pereira
Testing
ROP, NX and ASLR - A Love Triangle - Remote Code Execution - CVE-2018-5767
http://ift.tt/2Ckmnra
Submitted February 15, 2018 at 03:24AM by JustAPenTester
via reddit http://ift.tt/2sun95n
http://ift.tt/2Ckmnra
Submitted February 15, 2018 at 03:24AM by JustAPenTester
via reddit http://ift.tt/2sun95n
Fidus InfoSecurity | Cyber Security, Penetration Testing, Red Teaming
ROP, NX and ASLR - A Love Triangle - Remote Code Execution - CVE-2018-5767 - Fidus InfoSecurity | Cyber Security, Penetration Testing…
Remote Code Execution (CVE-2018-5767) Walkthrough on Tenda AC15 Router Introduction In this post we will be presenting a pre-authenticated remote code execution vulnerability present in Tenda’s AC15 router. We start by analysing the vulnerability, before…
An analysis of logic flaws in web-of-trust services.
http://ift.tt/2EGvY0E
Submitted February 15, 2018 at 02:44AM by sxcurity
via reddit http://ift.tt/2stwpXf
http://ift.tt/2EGvY0E
Submitted February 15, 2018 at 02:44AM by sxcurity
via reddit http://ift.tt/2stwpXf
Edoverflow
An analysis of logic flaws in web-of-trust services.
Web-of-trust services (WOT) such as Keybase, Onename, and Blockstack promise to verify individuals' identities on the web. Since many applications on the web are not consistent this often leads to unintended behaviour and therefore security vulnerabilities…
z00mtrack: User Tracking via the Browser Zoom Levels
http://ift.tt/2EqWtb4
Submitted February 15, 2018 at 04:35AM by ackro_
via reddit http://ift.tt/2BZnVLg
http://ift.tt/2EqWtb4
Submitted February 15, 2018 at 04:35AM by ackro_
via reddit http://ift.tt/2BZnVLg
GitHub
0xSobky/HackVault
HackVault - A container repository for my public web hacks!
Command and control server in social media (Twitter, Instagram, Youtube + Telegram)
http://ift.tt/2C0Ctuv
Submitted February 15, 2018 at 03:52AM by Mysterii8
via reddit http://ift.tt/2swT70v
http://ift.tt/2C0Ctuv
Submitted February 15, 2018 at 03:52AM by Mysterii8
via reddit http://ift.tt/2swT70v
Medium
Command and control server in social media (Twitter, Instagram, Youtube + Telegram)
TL;DR As a proof of concept, I wrote noscript which abuses social media in order to send commands to infected machines, i.e bots. It uses…
NIST 800-63-3 case studies?
Hey.I'm taking a long and hard look at NIST 800-63-3 and the changes it put forward for password management. This is a topic that was discussed a bit last year, but since then I haven't seen much in terms of actual case studies. So I'm asking here.Have you made significant changes to your password management practices following the publication of this standard? Are you considering it? If you adopted the new approach, do you have any insights regarding how it can be implemented in an organisation? Any edge cases to consider?Thx
Submitted February 15, 2018 at 03:06AM by Sultan_Of_Ping
via reddit http://ift.tt/2BwBd16
Hey.I'm taking a long and hard look at NIST 800-63-3 and the changes it put forward for password management. This is a topic that was discussed a bit last year, but since then I haven't seen much in terms of actual case studies. So I'm asking here.Have you made significant changes to your password management practices following the publication of this standard? Are you considering it? If you adopted the new approach, do you have any insights regarding how it can be implemented in an organisation? Any edge cases to consider?Thx
Submitted February 15, 2018 at 03:06AM by Sultan_Of_Ping
via reddit http://ift.tt/2BwBd16
reddit
NIST 800-63-3 case studies? • r/security
Hey. I'm taking a long and hard look at NIST 800-63-3 and the changes it put forward for password management. This is a topic that was discussed...
Alternatively ways to lock my bedroom door
I'm unable to put a lock on the door because of the material of the door so I want to find alternative things i could buy to stop someone coming in my room as my little brother trys to get in when I'm playing on my consoles
Submitted February 15, 2018 at 03:04AM by renwinter92
via reddit http://ift.tt/2EK27EN
I'm unable to put a lock on the door because of the material of the door so I want to find alternative things i could buy to stop someone coming in my room as my little brother trys to get in when I'm playing on my consoles
Submitted February 15, 2018 at 03:04AM by renwinter92
via reddit http://ift.tt/2EK27EN
reddit
Alternatively ways to lock my bedroom door • r/security
I'm unable to put a lock on the door because of the material of the door so I want to find alternative things i could buy to stop someone coming...
Call to Arms for a Goodware
As the noscript says lately I’ve been thinking about a goodware. You may have imagined that the name comes from “good” and “software”. The idea is to infect other devices with the goodware and patch them. New vulnerabilities will be added to this worm as they are released publicly in order to infect other devices and patch them as well. All this to prevent infection, spread and damage caused by malwares like those we have seen lately in The Internet. Mirai, Persirai, Wannacry, etc. Personally I wouldn’t mind being infected by a goodware if I get to read its source code. I’m no developer (learning the basics) and I’m perfectly aware that this idea is illegal, but it could be a good exercise just for development purposes. There’s not only the Dark Side or the Light Side, there’s Grey as well. Why the heck aren’t we as a species contributing to ourselves? Instead of mining with stolen computing power we should steal computing power in order to help scientist cure cancer. (I know, OT) What I mean is that sometimes playing the game as your enemy helps win a battle, and a proactive way to do it could be the creation of a goodware.Tl;dr: Utopia
Submitted February 15, 2018 at 06:52AM by xawos
via reddit http://ift.tt/2C1QZ4Q
As the noscript says lately I’ve been thinking about a goodware. You may have imagined that the name comes from “good” and “software”. The idea is to infect other devices with the goodware and patch them. New vulnerabilities will be added to this worm as they are released publicly in order to infect other devices and patch them as well. All this to prevent infection, spread and damage caused by malwares like those we have seen lately in The Internet. Mirai, Persirai, Wannacry, etc. Personally I wouldn’t mind being infected by a goodware if I get to read its source code. I’m no developer (learning the basics) and I’m perfectly aware that this idea is illegal, but it could be a good exercise just for development purposes. There’s not only the Dark Side or the Light Side, there’s Grey as well. Why the heck aren’t we as a species contributing to ourselves? Instead of mining with stolen computing power we should steal computing power in order to help scientist cure cancer. (I know, OT) What I mean is that sometimes playing the game as your enemy helps win a battle, and a proactive way to do it could be the creation of a goodware.Tl;dr: Utopia
Submitted February 15, 2018 at 06:52AM by xawos
via reddit http://ift.tt/2C1QZ4Q
reddit
Call to Arms for a Goodware • r/security
As the noscript says lately I’ve been thinking about a goodware. You may have imagined that the name comes from “good” and “software”. The idea is to...