Does NBC Universal have any strong ties with the government? A SCADA security video was striked and removed by them, but I have doubts as to whether it really contained copyrighted content.
No text found
Submitted February 20, 2018 at 06:19PM by PseudoSecuritay
via reddit http://ift.tt/2EWede5
No text found
Submitted February 20, 2018 at 06:19PM by PseudoSecuritay
via reddit http://ift.tt/2EWede5
reddit
Does NBC Universal have any strong ties with the... • r/security
4 points and 0 comments so far on reddit
Security In 5: Episode 178 - Google To Start Labeling HTTP Website As Not Secure
http://ift.tt/2ocWfKt
Submitted February 20, 2018 at 07:31PM by BinaryBlog
via reddit http://ift.tt/2ojUESp
http://ift.tt/2ocWfKt
Submitted February 20, 2018 at 07:31PM by BinaryBlog
via reddit http://ift.tt/2ojUESp
Libsyn
Security In Five Podcast: Episode 178 - Google To Start Labeling HTTP Website As Not Secure
Google is slowly moving toward a complete secure web. Starting in June Chrome will begin to label all HTTP only websites as Not Secure. This episode goes into the details, what the difference is between HTTP and HTTPS and why this is a good move for everyone. …
People Are Actually Using a Joke Dating Site That Matches People Based on Their Passwords
http://ift.tt/2BqeiUS
Submitted February 20, 2018 at 07:45PM by speckz
via reddit http://ift.tt/2FhBAMy
http://ift.tt/2BqeiUS
Submitted February 20, 2018 at 07:45PM by speckz
via reddit http://ift.tt/2FhBAMy
Motherboard
People Are Actually Using a Joke Dating Site That Matches People Based on Their Passwords
This website answers the question no one ever asked: what if you dated someone who used the same password?
Security In 5: Episode 178 - Google To Start Labeling HTTP Website As Not Secure
http://ift.tt/2ocWfKt
Submitted February 20, 2018 at 07:31PM by BinaryBlog
via reddit http://ift.tt/2ojUESp
http://ift.tt/2ocWfKt
Submitted February 20, 2018 at 07:31PM by BinaryBlog
via reddit http://ift.tt/2ojUESp
Libsyn
Security In Five Podcast: Episode 178 - Google To Start Labeling HTTP Website As Not Secure
Google is slowly moving toward a complete secure web. Starting in June Chrome will begin to label all HTTP only websites as Not Secure. This episode goes into the details, what the difference is between HTTP and HTTPS and why this is a good move for everyone. …
10 Online Security Measures Everyone Should Implement in 2018
http://ift.tt/2o7yxP0
Submitted February 20, 2018 at 06:50PM by FamiliarQuit
via reddit http://ift.tt/2oi1dG7
http://ift.tt/2o7yxP0
Submitted February 20, 2018 at 06:50PM by FamiliarQuit
via reddit http://ift.tt/2oi1dG7
Event Review: SAP GRC
http://ift.tt/2BBKHbn
Submitted February 20, 2018 at 06:39PM by Uminekoshi
via reddit http://ift.tt/2oid2Lo
http://ift.tt/2BBKHbn
Submitted February 20, 2018 at 06:39PM by Uminekoshi
via reddit http://ift.tt/2oid2Lo
Nehemiah Security
Event Review: SAP GRC - Nehemiah Security
Our team attended the SAPInsider GRC 2018 event last week in Las Vegas—it was powerful! We want to share some of our notes in case you weren’t able to make it (or are considering attending next year). What were the top 3 things you learned at the event? …
eyes - BASH noscript for domain/IP address information gathering
http://ift.tt/2sH4Qd8
Submitted February 20, 2018 at 07:17PM by aScottishBoat
via reddit http://ift.tt/2BGsutj
http://ift.tt/2sH4Qd8
Submitted February 20, 2018 at 07:17PM by aScottishBoat
via reddit http://ift.tt/2BGsutj
reddit
eyes - BASH noscript for domain/IP address... • r/netsecstudents
[eyes](https://github.com/naltun/eyes) is a little noscript I wrote (adapted to BASH from a Python2 noscript at github.com/UltimateHackers/ReconDog)...
Two questions about security on osx and windows
Hello all So I have two questions but I thought I'd keep them in one post for the sake of being tidy.First is a simple one for windows, can you setup ipsec without a domain? So I was thinking outbound with authentication if possible, inbound blocked without authentication? I won't be using encryption for this, and via firewall rules.Secondly is osx, I have a mac at home and it's nice to switch to from Windows from time to time, but I setup my machines like a less secured PAW, but is a similar setup possible on Mac? While user accounts are simple enough what about the secure boot process etc?Many thanks
Submitted February 20, 2018 at 08:16PM by Tuktuc
via reddit http://ift.tt/2obTr0e
Hello all So I have two questions but I thought I'd keep them in one post for the sake of being tidy.First is a simple one for windows, can you setup ipsec without a domain? So I was thinking outbound with authentication if possible, inbound blocked without authentication? I won't be using encryption for this, and via firewall rules.Secondly is osx, I have a mac at home and it's nice to switch to from Windows from time to time, but I setup my machines like a less secured PAW, but is a similar setup possible on Mac? While user accounts are simple enough what about the secure boot process etc?Many thanks
Submitted February 20, 2018 at 08:16PM by Tuktuc
via reddit http://ift.tt/2obTr0e
reddit
Two questions about security on osx and windows • r/security
Hello all So I have two questions but I thought I'd keep them in one post for the sake of being tidy. First is a simple one for windows, can you...
Malwarebytes vs Internet Security
can Malwarebytes compensate the working of internet security program like Bitdefender ?? for windows of course .
Submitted February 20, 2018 at 09:05PM by westrox
via reddit http://ift.tt/2oc0fuO
can Malwarebytes compensate the working of internet security program like Bitdefender ?? for windows of course .
Submitted February 20, 2018 at 09:05PM by westrox
via reddit http://ift.tt/2oc0fuO
reddit
Malwarebytes vs Internet Security • r/security
can Malwarebytes compensate the working of internet security program like Bitdefender ?? for windows of course .
Any advice for a newbie?
I've been working in IT for the past few year and I recently decided I wanted to focus on security. It's always been a part of my job but it's never been my core focus. Since making that decision, I have taken and passed the CISSP exam and ISC2 graciously accepted my years working in identity and access management and network security as enough to qualify me fully.However I'm finding it difficult to break into the full time security business and part of the issue I think is I don't really know what role I want to go for.Can anyone advise what roles they think would be good for a someone with a support/consultancy background and a decent bit of security knowledge, but lack of formal experience?
Submitted February 20, 2018 at 08:53PM by Ryanaston
via reddit http://ift.tt/2olFegr
I've been working in IT for the past few year and I recently decided I wanted to focus on security. It's always been a part of my job but it's never been my core focus. Since making that decision, I have taken and passed the CISSP exam and ISC2 graciously accepted my years working in identity and access management and network security as enough to qualify me fully.However I'm finding it difficult to break into the full time security business and part of the issue I think is I don't really know what role I want to go for.Can anyone advise what roles they think would be good for a someone with a support/consultancy background and a decent bit of security knowledge, but lack of formal experience?
Submitted February 20, 2018 at 08:53PM by Ryanaston
via reddit http://ift.tt/2olFegr
reddit
Any advice for a newbie? • r/security
I've been working in IT for the past few year and I recently decided I wanted to focus on security. It's always been a part of my job but it's...
[Audio] Understanding the different roles in the security sector
http://ift.tt/2Cd9546
Submitted February 20, 2018 at 08:49PM by LiamBigDataDonoghue
via reddit http://ift.tt/2CyToQi
http://ift.tt/2Cd9546
Submitted February 20, 2018 at 08:49PM by LiamBigDataDonoghue
via reddit http://ift.tt/2CyToQi
Venturi Group
Understanding the different roles in the security sector
In this episode Andy Davis talks to James Packer. James is a Cyber Security Consultant at a Big 4 professional services firm.
Hardware vs. Software-based detection: Why it can’t be one or the other.
http://ift.tt/2olkC7Y
Submitted February 20, 2018 at 10:06PM by shleimeleh
via reddit http://ift.tt/2EGx1P7
http://ift.tt/2olkC7Y
Submitted February 20, 2018 at 10:06PM by shleimeleh
via reddit http://ift.tt/2EGx1P7
Perception Point
Hardware vs. Software-based detection | Perception Point
As with any market where crime is lucrative, cybersecurity will always exist, and the more digital the world becomes, the more it will grow. This market is so dynamic because it follows a cat-and-mouse model where the defenders are continuously trying to…
Bombing the Cloud: Why Amazon, Microsoft, and Google Cloud Should Be Classified as Critical Infrastructure
http://ift.tt/2FfHVIo
Submitted February 20, 2018 at 11:08PM by DEAF-LAMONT
via reddit http://ift.tt/2BFhoV6
http://ift.tt/2FfHVIo
Submitted February 20, 2018 at 11:08PM by DEAF-LAMONT
via reddit http://ift.tt/2BFhoV6
Inc.com
Bombing the Cloud: Why an Attack on Amazon, Microsoft, or Google Cloud Could Lead to 'Cybergeddon'
A study projects $15 billion in economic damage to U.S. companies triggered by a three-day cloud computing outage
Identify vulnerability in the code
Hello guys! I need help with this code. Can someone to identify what kind of vulnerability it has? I think that it is buffer overflow. But how exactly it is vulnerable? Can someone explain it to me pls?#include <stdio.h>int main(int argc, char * argv[]) {
Submitted February 20, 2018 at 11:28PM by Brain2life
via reddit http://ift.tt/2okS7HF
Hello guys! I need help with this code. Can someone to identify what kind of vulnerability it has? I think that it is buffer overflow. But how exactly it is vulnerable? Can someone explain it to me pls?#include <stdio.h>int main(int argc, char * argv[]) {
char user_input[64]; fgets(user_input, 64, stdin); printf(user_input); return 0;}
Submitted February 20, 2018 at 11:28PM by Brain2life
via reddit http://ift.tt/2okS7HF
reddit
Identify vulnerability in the code • r/security
Hello guys! I need help with this code. Can someone to identify what kind of vulnerability it has? I think that it is buffer overflow. But how...
Petya Ransomware: What is it and How does it work?
http://ift.tt/2odszNd
Submitted February 20, 2018 at 11:17PM by anonywise
via reddit http://ift.tt/2ojew84
http://ift.tt/2odszNd
Submitted February 20, 2018 at 11:17PM by anonywise
via reddit http://ift.tt/2ojew84
Anonywise
Petya Ransomware: What is it and How does it work? - Anonywise
In short: Petya, a malware belonging to the encrypting ransomware family that attacked thousands of computers worldwide in 2016 and 2017. The Petya ransomware aims to attack Microsoft Windows-based systems and it encrypts the hard drive. It afterward demands…
utorrent: various JSON-RPC issues resulting in remote code execution, information disclosure, etc.
http://ift.tt/2Hy1LQa
Submitted February 20, 2018 at 11:57PM by weirdasianfaces
via reddit http://ift.tt/2CamLgo
http://ift.tt/2Hy1LQa
Submitted February 20, 2018 at 11:57PM by weirdasianfaces
via reddit http://ift.tt/2CamLgo
reddit
utorrent: various JSON-RPC issues resulting in remote... • r/netsec
19 points and 1 comments so far on reddit
New Research: Crypto-mining Drives Almost 90% of All Remote Code Execution Attacks – Blog | Imperva
http://ift.tt/2GuuKCT
Submitted February 21, 2018 at 12:37AM by buildops
via reddit http://ift.tt/2ERG7Yn
http://ift.tt/2GuuKCT
Submitted February 21, 2018 at 12:37AM by buildops
via reddit http://ift.tt/2ERG7Yn
Blog | Imperva
New Research: Crypto-mining Drives Almost 90% of All Remote Code Execution Attacks – Blog | Imperva
It’s early in 2018 and we have already witnessed one of the top contenders in this year’s web application attacks. Continuing the trend from the last months of 2017, crypto-mining malware is quickly becoming attackers’ favorite modus operandi. In December…
Convergence of Messaging, Payments and Cryptocurrency
http://ift.tt/2Filqmb
Submitted February 21, 2018 at 01:18AM by Mi3Security
via reddit http://ift.tt/2Gw1Pya
http://ift.tt/2Filqmb
Submitted February 21, 2018 at 01:18AM by Mi3Security
via reddit http://ift.tt/2Gw1Pya
Mi3 Security
Convergence of Messaging, Payments and Cryptocurrency
The growth of mobility has seen an explosion of messaging applications. Instant messaging has been the “killer app” for smartphones. As messaging providers look to enhance their product offerings beyond sending text and emojis, payments and money transfer…
Smart home devices can be risky, but not for the reasons you think Siri vs Alexa
https://youtu.be/f_1dhKsELzs
Submitted February 21, 2018 at 03:27AM by Iot_Security
via reddit http://ift.tt/2CxqeRP
https://youtu.be/f_1dhKsELzs
Submitted February 21, 2018 at 03:27AM by Iot_Security
via reddit http://ift.tt/2CxqeRP
YouTube
Siri vs Alexa
I'm on cameo if you want some sort of personalised message from a man with zero integrity.
www.cameo.com/jamesveitch
James's Tech Reviews! Episode 1
With thanks to www.upclosefilms.com
www.cameo.com/jamesveitch
James's Tech Reviews! Episode 1
With thanks to www.upclosefilms.com
Machine Learning Use Cases for Security Orchestration and Automation
http://ift.tt/2EFDky9
Submitted February 21, 2018 at 02:57AM by abhishekiyer
via reddit http://ift.tt/2FgZZ55
http://ift.tt/2EFDky9
Submitted February 21, 2018 at 02:57AM by abhishekiyer
via reddit http://ift.tt/2FgZZ55
Demisto
Demisto’s Top Machine Learning Use Cases – Part 1
Learn how Demisto's machine learning helps enhance responder productivity, accelerate workflow creation, and enable leaner, more efficient security operations.
I'm looking to set up an attack/defense capture-the-flag competition. Do you guys know of any open-source systems out there that I could use for that?
For those who don't know what I'm talking about, I'm referring to a gametype wherein different teams each have their own server hosting different services that other teams can attack.Every team has the same services, and the goal is to infiltrate other teams' servers and take "flags" from their systems using vulnerabilities that you find by looking at the source code of your own services. When you find a vulnerability, you patch it on your own service and steal the flags of other unpatched services. Make sense?I've played in a couple of those types of CTFs, and I loved it, and I'd love to host my own for my coworkers. Any special knowledge on where I could find something like this?
Submitted February 21, 2018 at 02:45AM by TheFilipinoFire
via reddit http://ift.tt/2EERkZ1
For those who don't know what I'm talking about, I'm referring to a gametype wherein different teams each have their own server hosting different services that other teams can attack.Every team has the same services, and the goal is to infiltrate other teams' servers and take "flags" from their systems using vulnerabilities that you find by looking at the source code of your own services. When you find a vulnerability, you patch it on your own service and steal the flags of other unpatched services. Make sense?I've played in a couple of those types of CTFs, and I loved it, and I'd love to host my own for my coworkers. Any special knowledge on where I could find something like this?
Submitted February 21, 2018 at 02:45AM by TheFilipinoFire
via reddit http://ift.tt/2EERkZ1
reddit
I'm looking to set up an attack/defense... • r/security
For those who don't know what I'm talking about, I'm referring to a gametype wherein different teams each have their own server hosting different...