Joke dating site matches people based on their passwords
http://ift.tt/2o2voRg
Submitted February 15, 2018 at 07:42PM by volci
via reddit http://ift.tt/2BwFnpJ
http://ift.tt/2o2voRg
Submitted February 15, 2018 at 07:42PM by volci
via reddit http://ift.tt/2BwFnpJ
Naked Security
Joke dating site matches people based on their passwords
Hey baby, nice little “abc123” ya got there.
Targeting of Olympic Games IT Infrastructure Remains Unattributed
http://ift.tt/2Eum0Ak
Submitted February 15, 2018 at 07:41PM by volci
via reddit http://ift.tt/2BY1V3L
http://ift.tt/2Eum0Ak
Submitted February 15, 2018 at 07:41PM by volci
via reddit http://ift.tt/2BY1V3L
Recorded Future
Targeting of Olympic Games IT Infrastructure Remains Unattributed
The operation to disrupt the PyeongChang Winter Olympic Games was more extensive than originally reported. The Olympic Destroyer malware should be treated with a high level of concern.
Researchers discover new ways to abuse Meltdown and Spectre flaws
http://ift.tt/2ByNLom
Submitted February 15, 2018 at 07:41PM by DJRWolf
via reddit http://ift.tt/2sxX7On
http://ift.tt/2ByNLom
Submitted February 15, 2018 at 07:41PM by DJRWolf
via reddit http://ift.tt/2sxX7On
Engadget
Researchers discover new ways to abuse Meltdown and Spectre flaws
A team of researchers from NVIDIA and Princeton University found new ways to exploit the Spectre and Meltdown CPU vulnerabilities.
Security In 5: Episode 175 - Business Email Compromise Scams Affect Everyone, But You Can Avoid It Easily
http://ift.tt/2o2ZpQT
Submitted February 15, 2018 at 07:40PM by BinaryBlog
via reddit http://ift.tt/2ssUddM
http://ift.tt/2o2ZpQT
Submitted February 15, 2018 at 07:40PM by BinaryBlog
via reddit http://ift.tt/2ssUddM
Libsyn
Security In Five Podcast: Episode 175 - Business Email Compromise Scams Affect Everyone, But You Can Avoid It Easily
Business email compromise emails or also known as the CEO email scams impact basically every organization. You are at risk of getting one and there is nothing you can do to prevent one from being delivered. This episode goes into what this scam is, why people…
CVE 2018-0101: Cisco ASA DoS and RCE(?)
http://ift.tt/2CnMg9o
Submitted February 15, 2018 at 07:42PM by utahrd37
via reddit http://ift.tt/2ErDYzd
http://ift.tt/2CnMg9o
Submitted February 15, 2018 at 07:42PM by utahrd37
via reddit http://ift.tt/2ErDYzd
cve.mitre.org
CVE -
CVE-2018-0101
CVE-2018-0101
Common Vulnerabilities and Exposures (CVE®) is a list of entries — each containing an identification number, a denoscription, and at least one public reference — for publicly known cybersecurity vulnerabilities. Assigned by CVE Numbering Authorities (CNAs)…
Intelligence Agencies Warn Americans Against Using Huawei Phones
http://ift.tt/2EFFCAt
Submitted February 15, 2018 at 07:42PM by thatshirtman
via reddit http://ift.tt/2EqybtL
http://ift.tt/2EFFCAt
Submitted February 15, 2018 at 07:42PM by thatshirtman
via reddit http://ift.tt/2EqybtL
Fortune
Don't Use Huawei Phones, Warn Six Top U.S. Intelligence Chiefs
They could "conduct undetected espionage."
Recommended sites for gathering IP reputation
http://ift.tt/2EukzO2
Submitted February 15, 2018 at 08:32PM by dssntnt
via reddit http://ift.tt/2GcFx4D
http://ift.tt/2EukzO2
Submitted February 15, 2018 at 08:32PM by dssntnt
via reddit http://ift.tt/2GcFx4D
reddit
Recommended sites for gathering IP reputation • r/AskNetsec
What sites have you found work well to check the reputation of an IP address? Any big difference between free and paid sites?
IT Pros: IoT Devices Most Vulnerable to Wi-Fi Attacks
http://ift.tt/2Er76dZ
Submitted February 15, 2018 at 08:44PM by CasperVPN
via reddit http://ift.tt/2ConQga
http://ift.tt/2Er76dZ
Submitted February 15, 2018 at 08:44PM by CasperVPN
via reddit http://ift.tt/2ConQga
Infosecurity Magazine
IT Pros: IoT Devices Most Vulnerable to Wi-Fi Attacks
92% of IT pros concerned about risks of using public Wi-Fi on company-owned devices
CVE 2018 0101 - Cisco ASA DoS and(?) RCE
http://ift.tt/2CkRClL
Submitted February 15, 2018 at 09:06PM by utahrd37
via reddit http://ift.tt/2oakBUj
http://ift.tt/2CkRClL
Submitted February 15, 2018 at 09:06PM by utahrd37
via reddit http://ift.tt/2oakBUj
UK government vows to make Russia pay for NotPetya cyber attack
http://ift.tt/2Ew8EDu
Submitted February 15, 2018 at 09:41PM by wlscr
via reddit http://ift.tt/2Cmrxmw
http://ift.tt/2Ew8EDu
Submitted February 15, 2018 at 09:41PM by wlscr
via reddit http://ift.tt/2Cmrxmw
NS Tech
UK government vows to make Russia pay for NotPetya cyber attack - NS Tech
The UK government has vowed to make Russia pay for the NotPetya ransomware attack that crippled critical infrastructure across Europe last year. The defence secretary Gavin Williamson accused the Russian government of “ripping up the rulebook” by “undermining…
Trojan Droppers Exploiting Symbolic Link (.SLK) Files - to avoid Microsoft Office Protected View sandbox
http://ift.tt/2EEz1GL
Submitted February 15, 2018 at 10:14PM by digicat
via reddit http://ift.tt/2HjwEYc
http://ift.tt/2EEz1GL
Submitted February 15, 2018 at 10:14PM by digicat
via reddit http://ift.tt/2HjwEYc
AppRiver
Warning! Trojan Droppers Exploiting Symbolic Link (.SLK) Files
Trojan Droppers Exploiting Symbolic Link Files Malicious actors routinely attempt to confuse recipients of messages with obscure file extensions to load malicious files on the victims machine. For …
iOS Indian language (Telugu) character bug
http://ift.tt/2Gi5WOp
Submitted February 15, 2018 at 10:20PM by digitallofts
via reddit http://ift.tt/2GiaJQ1
http://ift.tt/2Gi5WOp
Submitted February 15, 2018 at 10:20PM by digitallofts
via reddit http://ift.tt/2GiaJQ1
The Verge
Major new iOS bug can crash iPhones and disable access to apps and iMessages
Here we go again
MeltdownPrime and SpectrePrime: Automatically-Synthesized Attacks Exploiting Invalidation-Based Coherence Protocols (PDF)
http://ift.tt/2ss7NxY
Submitted February 15, 2018 at 11:12PM by dim23
via reddit http://ift.tt/2EumV3t
http://ift.tt/2ss7NxY
Submitted February 15, 2018 at 11:12PM by dim23
via reddit http://ift.tt/2EumV3t
reddit
MeltdownPrime and SpectrePrime:... • r/netsec
2 points and 0 comments so far on reddit
Going beyond Wireshark: experiments in visualising network traffic
http://ift.tt/2EutEuh
Submitted February 15, 2018 at 11:49PM by daanraman
via reddit http://ift.tt/2HkUdjA
http://ift.tt/2EutEuh
Submitted February 15, 2018 at 11:49PM by daanraman
via reddit http://ift.tt/2HkUdjA
NVISO LABS - blog
Going beyond Wireshark: experiments in visualising network traffic
Introduction At NVISO Labs, we are constantly trying to find better ways of understanding the data our analysts are looking at. This ranges from our SOC analysts looking at millions of collected da…
eBook: If your friend was put in charge of measuring cyber risk at their company, what advice would you give them?
http://ift.tt/2F4A0xF
Submitted February 16, 2018 at 12:51AM by Uminekoshi
via reddit http://ift.tt/2EtW0AW
http://ift.tt/2F4A0xF
Submitted February 16, 2018 at 12:51AM by Uminekoshi
via reddit http://ift.tt/2EtW0AW
Nehemiah Security
eBook: 7 Experts on Justifying Security Spend - Nehemiah Security
If your friend was put in charge of measuring cyber risk at their company, what advice would you give them? We created this Guide to advance the risk management conversation amongst cyber professionals. Many would claim they are able to pinpoint technical…
Reported Critical Vulnerabilities In Microsoft Software On the Rise
http://ift.tt/2sslsVK
Submitted February 15, 2018 at 11:47PM by _prasket
via reddit http://ift.tt/2CoieCm
http://ift.tt/2sslsVK
Submitted February 15, 2018 at 11:47PM by _prasket
via reddit http://ift.tt/2CoieCm
Threatpost | The first stop for security news
Reported Critical Vulnerabilities In Microsoft Software On the Rise
The number of reported vulnerabilities in Microsoft software has mounted from 325 in 2013 to 685 last year, a rise of 111 percent, according to new research.Moreover, there has also been a 54 perc
Hiding in the Cloud: Cobalt Strike Beacon C2 using Amazon APIs
http://ift.tt/2swHnv0
Submitted February 16, 2018 at 01:18AM by SpenGietz
via reddit http://ift.tt/2HiUkMD
http://ift.tt/2swHnv0
Submitted February 16, 2018 at 01:18AM by SpenGietz
via reddit http://ift.tt/2HiUkMD
Rhino Security Labs
Hiding in the Cloud:Cobalt Strike Beacon C2 using Amazon APIs - Rhino Security Labs
Rhino Security Labs shows how Amazon's AWS APIs can be used for malware C2, subverting blocking and monitoring with a malware channel that uses AWS APIs.
I've developed a multi-layer security strategy. What all does yours include? In this video, I talk about a cloud-based firewall. Do you think that's important?
http://ift.tt/2Es3556
Submitted February 16, 2018 at 02:55AM by AskBIS
via reddit http://ift.tt/2F2KfSZ
http://ift.tt/2Es3556
Submitted February 16, 2018 at 02:55AM by AskBIS
via reddit http://ift.tt/2F2KfSZ
BIS, Inc.
Security Expert Discusses Defense in Depth with a Cloud Based Firewall
Watch Phillip's latest video in the Defense-in-Depth series where he discusses how a cloud based firewall adds an extra layer of protection.
Does Segmentation Enhance Security? Yes and No...
http://ift.tt/2EvrEOj
Submitted February 16, 2018 at 02:50AM by SecurityTrust
via reddit http://ift.tt/2F5QpSB
http://ift.tt/2EvrEOj
Submitted February 16, 2018 at 02:50AM by SecurityTrust
via reddit http://ift.tt/2F5QpSB
Vidder
Segmentation: Where to Begin?
A New Paper Suggests it’s Time to Think Differently about Segmentation.
Week 7 in Information Security, 2018
http://ift.tt/2EJHWqg
Submitted February 16, 2018 at 03:36AM by undercomm
via reddit http://ift.tt/2oa1sCa
http://ift.tt/2EJHWqg
Submitted February 16, 2018 at 03:36AM by undercomm
via reddit http://ift.tt/2oa1sCa
Malgregator
InfoSec Week 7, 2018
The Fidelis Cybersecurity researcher Jason Reaves demonstrated how covertly exchange data using X.509 digital certificates. The proof of...
Thirty-year stagnation: Problems of modern e-mail systems.
http://ift.tt/2syUdsM
Submitted February 16, 2018 at 05:05AM by safead
via reddit http://ift.tt/2F6FIir
http://ift.tt/2syUdsM
Submitted February 16, 2018 at 05:05AM by safead
via reddit http://ift.tt/2F6FIir
reddit
Thirty-year stagnation: Problems of modern e-mail systems. • r/safead
E-mail is a traditional method of communicating on the internet. The earliest version of e-mail was created in 1971, and it has practically not...