Why the hack-back is still the worst idea in cybersecurity
http://ift.tt/2Es1ETZ
Submitted February 14, 2018 at 09:05PM by CrankyBear
via reddit http://ift.tt/2F4if1s
http://ift.tt/2Es1ETZ
Submitted February 14, 2018 at 09:05PM by CrankyBear
via reddit http://ift.tt/2F4if1s
TechBeacon
Why the hack-back is still the worst idea in cybersecurity
Too much can go wrong when private firms have permission to pursue attackers into other companies' networks, security experts say.
Using Google Analytics for data extraction - How to Bypassing CSP with Google Analytics
http://ift.tt/2Dqn0Rr
Submitted February 14, 2018 at 10:08PM by speckz
via reddit http://ift.tt/2F2YbfH
http://ift.tt/2Dqn0Rr
Submitted February 14, 2018 at 10:08PM by speckz
via reddit http://ift.tt/2F2YbfH
reddit
Using Google Analytics for data extraction - How to... • r/security
1 points and 0 comments so far on reddit
Forensic Readiness: Setting the Foundation For Cybersecurity
http://ift.tt/2Ge1Y9o
Submitted February 14, 2018 at 10:06PM by houlila
via reddit http://ift.tt/2EE6Zem
http://ift.tt/2Ge1Y9o
Submitted February 14, 2018 at 10:06PM by houlila
via reddit http://ift.tt/2EE6Zem
CrossRealms
Forensic Readiness: Setting the Foundation For Cybersecurity
Although data collection is a sub section of forensic readiness, it cannot be underestimated because in every incident I have participated in, the logs pertaining to the attack were never sufficient.
Can Consumers' Online Data Be Protected?
http://ift.tt/2EpjcAq
Submitted February 14, 2018 at 11:34PM by volci
via reddit http://ift.tt/2EtU5R1
http://ift.tt/2EpjcAq
Submitted February 14, 2018 at 11:34PM by volci
via reddit http://ift.tt/2EtU5R1
reddit
Can Consumers' Online Data Be Protected? • r/security
1 points and 0 comments so far on reddit
Did the UN check their certs before declaring Symantec the most ethical company?
http://ift.tt/2Eo9SAS
Submitted February 14, 2018 at 11:54PM by Noobmode
via reddit http://ift.tt/2o6CWlr
http://ift.tt/2Eo9SAS
Submitted February 14, 2018 at 11:54PM by Noobmode
via reddit http://ift.tt/2o6CWlr
Symantec
ROI That Matters – Return On Integrity
For 11th Consecutive Year, Symantec Recognized as one of the World's Most Ethical Companies
Meltdown, Spectre, and user stories from the new security “normal”
http://ift.tt/2nZpLn0
Submitted February 15, 2018 at 12:46AM by personman
via reddit http://ift.tt/2o7yXoC
http://ift.tt/2nZpLn0
Submitted February 15, 2018 at 12:46AM by personman
via reddit http://ift.tt/2o7yXoC
Medium
Meltdown, Spectre, and user stories from the new security “normal”
This article was originally published on the ThoughtWorks Insights blog.
Your ISP is Probably Spying On You
http://ift.tt/2F79a8h
Submitted February 15, 2018 at 02:11AM by fo0bat
via reddit http://ift.tt/2Ety3JO
http://ift.tt/2F79a8h
Submitted February 15, 2018 at 02:11AM by fo0bat
via reddit http://ift.tt/2Ety3JO
Orchestrating New Employee Onboarding With Custom Playbook
http://ift.tt/2Clbrta
Submitted February 15, 2018 at 02:09AM by abhishekiyer
via reddit http://ift.tt/2F79bJn
http://ift.tt/2Clbrta
Submitted February 15, 2018 at 02:09AM by abhishekiyer
via reddit http://ift.tt/2F79bJn
Demisto
How Demisto Uses Demisto Part 1: Orchestrating Employee Onboarding
Learn how we use a custom Demisto playbook that orchestrates actions across people, processes, and technology to ensure seamless new employee onboarding.
U.S. intelligence agencies are still warning against buying Huawei and ZTE phones
http://ift.tt/2HdI6Vg
Submitted February 15, 2018 at 01:43AM by liotier
via reddit http://ift.tt/2ssoSrL
http://ift.tt/2HdI6Vg
Submitted February 15, 2018 at 01:43AM by liotier
via reddit http://ift.tt/2ssoSrL
TechCrunch
U.S. intelligence agencies are still warning against buying Huawei and ZTE phones
Things are still looking pretty bleak for Huawei’s plans to conquer the U.S. market. Earlier this week, half a dozen top members of intelligence agencies, including the FBI, CIA and NSA…
Differing service names in the Google Service Management API cause an authorization bypass (And a $7500 bounty)
http://ift.tt/2Bu8cD2
Submitted February 15, 2018 at 01:37AM by epereiralopez
via reddit http://ift.tt/2EIZOlg
http://ift.tt/2Bu8cD2
Submitted February 15, 2018 at 01:37AM by epereiralopez
via reddit http://ift.tt/2EIZOlg
Google
$7.5k Google services mix-up - Ezequiel Pereira
Testing
ROP, NX and ASLR - A Love Triangle - Remote Code Execution - CVE-2018-5767
http://ift.tt/2Ckmnra
Submitted February 15, 2018 at 03:24AM by JustAPenTester
via reddit http://ift.tt/2sun95n
http://ift.tt/2Ckmnra
Submitted February 15, 2018 at 03:24AM by JustAPenTester
via reddit http://ift.tt/2sun95n
Fidus InfoSecurity | Cyber Security, Penetration Testing, Red Teaming
ROP, NX and ASLR - A Love Triangle - Remote Code Execution - CVE-2018-5767 - Fidus InfoSecurity | Cyber Security, Penetration Testing…
Remote Code Execution (CVE-2018-5767) Walkthrough on Tenda AC15 Router Introduction In this post we will be presenting a pre-authenticated remote code execution vulnerability present in Tenda’s AC15 router. We start by analysing the vulnerability, before…
An analysis of logic flaws in web-of-trust services.
http://ift.tt/2EGvY0E
Submitted February 15, 2018 at 02:44AM by sxcurity
via reddit http://ift.tt/2stwpXf
http://ift.tt/2EGvY0E
Submitted February 15, 2018 at 02:44AM by sxcurity
via reddit http://ift.tt/2stwpXf
Edoverflow
An analysis of logic flaws in web-of-trust services.
Web-of-trust services (WOT) such as Keybase, Onename, and Blockstack promise to verify individuals' identities on the web. Since many applications on the web are not consistent this often leads to unintended behaviour and therefore security vulnerabilities…
z00mtrack: User Tracking via the Browser Zoom Levels
http://ift.tt/2EqWtb4
Submitted February 15, 2018 at 04:35AM by ackro_
via reddit http://ift.tt/2BZnVLg
http://ift.tt/2EqWtb4
Submitted February 15, 2018 at 04:35AM by ackro_
via reddit http://ift.tt/2BZnVLg
GitHub
0xSobky/HackVault
HackVault - A container repository for my public web hacks!
Command and control server in social media (Twitter, Instagram, Youtube + Telegram)
http://ift.tt/2C0Ctuv
Submitted February 15, 2018 at 03:52AM by Mysterii8
via reddit http://ift.tt/2swT70v
http://ift.tt/2C0Ctuv
Submitted February 15, 2018 at 03:52AM by Mysterii8
via reddit http://ift.tt/2swT70v
Medium
Command and control server in social media (Twitter, Instagram, Youtube + Telegram)
TL;DR As a proof of concept, I wrote noscript which abuses social media in order to send commands to infected machines, i.e bots. It uses…
NIST 800-63-3 case studies?
Hey.I'm taking a long and hard look at NIST 800-63-3 and the changes it put forward for password management. This is a topic that was discussed a bit last year, but since then I haven't seen much in terms of actual case studies. So I'm asking here.Have you made significant changes to your password management practices following the publication of this standard? Are you considering it? If you adopted the new approach, do you have any insights regarding how it can be implemented in an organisation? Any edge cases to consider?Thx
Submitted February 15, 2018 at 03:06AM by Sultan_Of_Ping
via reddit http://ift.tt/2BwBd16
Hey.I'm taking a long and hard look at NIST 800-63-3 and the changes it put forward for password management. This is a topic that was discussed a bit last year, but since then I haven't seen much in terms of actual case studies. So I'm asking here.Have you made significant changes to your password management practices following the publication of this standard? Are you considering it? If you adopted the new approach, do you have any insights regarding how it can be implemented in an organisation? Any edge cases to consider?Thx
Submitted February 15, 2018 at 03:06AM by Sultan_Of_Ping
via reddit http://ift.tt/2BwBd16
reddit
NIST 800-63-3 case studies? • r/security
Hey. I'm taking a long and hard look at NIST 800-63-3 and the changes it put forward for password management. This is a topic that was discussed...
Alternatively ways to lock my bedroom door
I'm unable to put a lock on the door because of the material of the door so I want to find alternative things i could buy to stop someone coming in my room as my little brother trys to get in when I'm playing on my consoles
Submitted February 15, 2018 at 03:04AM by renwinter92
via reddit http://ift.tt/2EK27EN
I'm unable to put a lock on the door because of the material of the door so I want to find alternative things i could buy to stop someone coming in my room as my little brother trys to get in when I'm playing on my consoles
Submitted February 15, 2018 at 03:04AM by renwinter92
via reddit http://ift.tt/2EK27EN
reddit
Alternatively ways to lock my bedroom door • r/security
I'm unable to put a lock on the door because of the material of the door so I want to find alternative things i could buy to stop someone coming...
Call to Arms for a Goodware
As the noscript says lately I’ve been thinking about a goodware. You may have imagined that the name comes from “good” and “software”. The idea is to infect other devices with the goodware and patch them. New vulnerabilities will be added to this worm as they are released publicly in order to infect other devices and patch them as well. All this to prevent infection, spread and damage caused by malwares like those we have seen lately in The Internet. Mirai, Persirai, Wannacry, etc. Personally I wouldn’t mind being infected by a goodware if I get to read its source code. I’m no developer (learning the basics) and I’m perfectly aware that this idea is illegal, but it could be a good exercise just for development purposes. There’s not only the Dark Side or the Light Side, there’s Grey as well. Why the heck aren’t we as a species contributing to ourselves? Instead of mining with stolen computing power we should steal computing power in order to help scientist cure cancer. (I know, OT) What I mean is that sometimes playing the game as your enemy helps win a battle, and a proactive way to do it could be the creation of a goodware.Tl;dr: Utopia
Submitted February 15, 2018 at 06:52AM by xawos
via reddit http://ift.tt/2C1QZ4Q
As the noscript says lately I’ve been thinking about a goodware. You may have imagined that the name comes from “good” and “software”. The idea is to infect other devices with the goodware and patch them. New vulnerabilities will be added to this worm as they are released publicly in order to infect other devices and patch them as well. All this to prevent infection, spread and damage caused by malwares like those we have seen lately in The Internet. Mirai, Persirai, Wannacry, etc. Personally I wouldn’t mind being infected by a goodware if I get to read its source code. I’m no developer (learning the basics) and I’m perfectly aware that this idea is illegal, but it could be a good exercise just for development purposes. There’s not only the Dark Side or the Light Side, there’s Grey as well. Why the heck aren’t we as a species contributing to ourselves? Instead of mining with stolen computing power we should steal computing power in order to help scientist cure cancer. (I know, OT) What I mean is that sometimes playing the game as your enemy helps win a battle, and a proactive way to do it could be the creation of a goodware.Tl;dr: Utopia
Submitted February 15, 2018 at 06:52AM by xawos
via reddit http://ift.tt/2C1QZ4Q
reddit
Call to Arms for a Goodware • r/security
As the noscript says lately I’ve been thinking about a goodware. You may have imagined that the name comes from “good” and “software”. The idea is to...
1Password displayed my usernames BEFORE completing Face ID. This is bad, right?
http://ift.tt/2C0H7Zh
Submitted February 15, 2018 at 06:33AM by mkarolian
via reddit http://ift.tt/2szPIym
http://ift.tt/2C0H7Zh
Submitted February 15, 2018 at 06:33AM by mkarolian
via reddit http://ift.tt/2szPIym
Crosspost: The Easiest Metasploit Guide You'll Ever Read
http://ift.tt/2Bv2DEh
Submitted February 15, 2018 at 09:55AM by nexangelus
via reddit http://ift.tt/2EFeKAK
http://ift.tt/2Bv2DEh
Submitted February 15, 2018 at 09:55AM by nexangelus
via reddit http://ift.tt/2EFeKAK
a.ndronic.us
The Easiest Metasploit Guide You'll Ever Read | Scott Morris (Andronicus)
"The Easiest Metasploit Guide You'll Ever Read" is a guide for folks who are "good with computers." It targets those who would like to know how to use Metasploit, but haven't really much direction in where to start.
CNN tech video says you should look for the "s" in "https", while their own website is just unsecure "http"
Check it for yourself: http://money.cnn.com/2018/02/14/technology/huawei-intelligence-chiefs/index.htmlAbout 1:50 in the video.Here is a screenshot https://i.imgur.com/K5LAMQw.png
Submitted February 15, 2018 at 12:37PM by pascal28
via reddit http://ift.tt/2Gfcgq0
Check it for yourself: http://money.cnn.com/2018/02/14/technology/huawei-intelligence-chiefs/index.htmlAbout 1:50 in the video.Here is a screenshot https://i.imgur.com/K5LAMQw.png
Submitted February 15, 2018 at 12:37PM by pascal28
via reddit http://ift.tt/2Gfcgq0
CNNMoney
The FBI, CIA and NSA say American citizens shouldn't use Huawei phones
U.S. intelligence agencies have issued a stern warning to Americans: Do not buy smartphones made by Chinese tech companies Huawei or ZTE.
Security Services Dallas, TX | Champion National Security, Inc.
http://ift.tt/2F3tZ4a
Submitted February 15, 2018 at 01:02PM by ChampionNationalSec
via reddit http://ift.tt/2ErsQm6
http://ift.tt/2F3tZ4a
Submitted February 15, 2018 at 01:02PM by ChampionNationalSec
via reddit http://ift.tt/2ErsQm6
Champion National Security, Inc.
Security Services Dallas, TX | Champion National Security, Inc.
Champion National Security offers premier security services in Dallas, TX and focuses on the needs of the client and providing the highest level of