CSS keylogger that exploits react
http://ift.tt/2odMpYQ
Submitted February 21, 2018 at 01:13PM by James-t-rustles
via reddit http://ift.tt/2CacXTk
http://ift.tt/2odMpYQ
Submitted February 21, 2018 at 01:13PM by James-t-rustles
via reddit http://ift.tt/2CacXTk
GitHub
maxchehab/CSS-Keylogging
CSS-Keylogging - Chrome extension and Express server that exploits keylogging abilities of CSS.
Andy Bates: Cybersecurity Will Be the Biggest User of AI in 2018
http://ift.tt/2GxUQoF
Submitted February 21, 2018 at 02:44PM by htbridgedigital
via reddit http://ift.tt/2BGqHUM
http://ift.tt/2GxUQoF
Submitted February 21, 2018 at 02:44PM by htbridgedigital
via reddit http://ift.tt/2BGqHUM
Htbridge
Andy Bates: Cybersecurity Will Be the Biggest User of AI in 2018
High-Tech Bridge opens a series of interviews with cybersecurity influencers and thought leaders who shape the industry. Please meet Andy Bates, Director of Global Cyber Alliance.
OWASP Automated Threat Handbook [pdf]
http://ift.tt/1hoT8ch
Submitted February 21, 2018 at 02:41PM by dentrasi
via reddit http://ift.tt/2sJ6Hya
http://ift.tt/1hoT8ch
Submitted February 21, 2018 at 02:41PM by dentrasi
via reddit http://ift.tt/2sJ6Hya
SUPERAntiSpyware VS SpyBot
http://ift.tt/2EHBOeV
Submitted February 21, 2018 at 04:00PM by tomasstatkus
via reddit http://ift.tt/2Fiv4FB
http://ift.tt/2EHBOeV
Submitted February 21, 2018 at 04:00PM by tomasstatkus
via reddit http://ift.tt/2Fiv4FB
Reviewedbypro
SUPERAntiSpyware VS SpyBot
SuperAntiSpyware and SpyBot are both similar anti-spyware applications that aim to detect and remove malicious software and various types of malware. Both applications provide low-budget
Hackers have turned the Nintendo Switch into a functional Linux tablet
http://ift.tt/2okzlQC
Submitted February 21, 2018 at 05:30PM by Iot_Security
via reddit http://ift.tt/2ogy262
http://ift.tt/2okzlQC
Submitted February 21, 2018 at 05:30PM by Iot_Security
via reddit http://ift.tt/2ogy262
The Verge
Hackers have turned the Nintendo Switch into a functional Linux tablet
But you’ll have to guess how they did it.
Hardware vs. Software-based detection: Why it can’t be one or the other
http://ift.tt/2olkC7Y
Submitted February 21, 2018 at 05:04PM by shleimeleh
via reddit http://ift.tt/2EItkbz
http://ift.tt/2olkC7Y
Submitted February 21, 2018 at 05:04PM by shleimeleh
via reddit http://ift.tt/2EItkbz
Perception Point
Hardware vs. Software-based detection | Perception Point
As with any market where crime is lucrative, cybersecurity will always exist, and the more digital the world becomes, the more it will grow. This market is so dynamic because it follows a cat-and-mouse model where the defenders are continuously trying to…
CVEs are dead
http://ift.tt/2C36pWT
Submitted February 21, 2018 at 04:50PM by Iot_Security
via reddit http://ift.tt/2FiejKw
http://ift.tt/2C36pWT
Submitted February 21, 2018 at 04:50PM by Iot_Security
via reddit http://ift.tt/2FiejKw
Help Net Security
Still relying solely on CVE and NVD for vulnerability tracking? Bad idea - Help Net Security
Incredibly, we see too many companies still relying on CVE and NVD for vulnerability tracking, despite the US government funded organization falling short year after year.
Bogus Linux vulnerability gets publicity
http://ift.tt/2sHE3xk
Submitted February 21, 2018 at 05:53PM by Iot_Security
via reddit http://ift.tt/2EIo9Vb
http://ift.tt/2sHE3xk
Submitted February 21, 2018 at 05:53PM by Iot_Security
via reddit http://ift.tt/2EIo9Vb
ZDNet
Bogus Linux vulnerability gets publicity | ZDNet
No, there's not a new security hole that gives attackers complete control over Linux servers. But, if you use a poor password, yes, you can still get hacked. Imagine!
Internet of Baby Monitors: 56.000 Baby Monitors Can Be Spied On With Ease
http://ift.tt/2GxaD7a
Submitted February 21, 2018 at 06:16PM by kafbas
via reddit http://ift.tt/2ogAKZg
http://ift.tt/2GxaD7a
Submitted February 21, 2018 at 06:16PM by kafbas
via reddit http://ift.tt/2ogAKZg
Sec-Consult
Internet of Babies – When baby monitors fail to be smart | SEC Consult
Baby monitors serve an important purpose in securing and monitoring our loved ones. An estimated 52k user accounts and video baby monitors are affected by a
Disabling Docker ICC Still Allows Raw Ethernet Communications Between Containers
http://ift.tt/2Gwe5ie
Submitted February 21, 2018 at 08:02PM by The_Giant_Panda
via reddit http://ift.tt/2BHVBMP
http://ift.tt/2Gwe5ie
Submitted February 21, 2018 at 08:02PM by The_Giant_Panda
via reddit http://ift.tt/2BHVBMP
GitHub
brthor/docker-layer2-icc
docker-layer2-icc - Demonstrating that disabling ICC in docker does not block raw packets between containers.
Security In 5: Episode 179 - Facebook Offering A Free VPN - DO NOT USE IT!!!
http://ift.tt/2EIzBQF
Submitted February 21, 2018 at 07:31PM by BinaryBlog
via reddit http://ift.tt/2FiZAix
http://ift.tt/2EIzBQF
Submitted February 21, 2018 at 07:31PM by BinaryBlog
via reddit http://ift.tt/2FiZAix
Libsyn
Security In Five Podcast: Episode 179 - Facebook Offering A Free VPN - DO NOT USE IT!!!
I am 100% pro-VPN for personal use. It protects you, your privacy, keeps your Internet use away from prying eyes. Facebook is getting on board and not offering a VPN for iOS users. DO NOT USE IT! PERIOD! RUN AWAY!!! This episode goes into why you should never…
CSS keylogging exploit
http://ift.tt/2odMpYQ
Submitted February 21, 2018 at 09:09PM by julian88888888
via reddit http://ift.tt/2oeuy42
http://ift.tt/2odMpYQ
Submitted February 21, 2018 at 09:09PM by julian88888888
via reddit http://ift.tt/2oeuy42
GitHub
maxchehab/CSS-Keylogging
CSS-Keylogging - Chrome extension and Express server that exploits keylogging abilities of CSS.
Homographs, Attack!
http://ift.tt/2HkwEaF
Submitted February 21, 2018 at 08:51PM by speckz
via reddit http://ift.tt/2EWkW7q
http://ift.tt/2HkwEaF
Submitted February 21, 2018 at 08:51PM by speckz
via reddit http://ift.tt/2EWkW7q
The Practical Dev
Homographs, Attack!
Background on a decades-old hack that just keeps coming back.
Cisco Elastic Services Controller Service Portal Auth Bypass Vuln
http://ift.tt/2or51nJ
Submitted February 21, 2018 at 10:35PM by ghost-train
via reddit http://ift.tt/2FjfABd
http://ift.tt/2or51nJ
Submitted February 21, 2018 at 10:35PM by ghost-train
via reddit http://ift.tt/2FjfABd
Cisco
Cisco Security Threat and Vulnerability Intelligence
The Cisco Security portal provides actionable intelligence for security threats and vulnerabilities in Cisco products and services and third-party products.
Code Exection in IDA via Strings
http://ift.tt/2FhIjWU
Submitted February 21, 2018 at 10:11PM by MalwareSeattle
via reddit http://ift.tt/2FnGyaZ
http://ift.tt/2FhIjWU
Submitted February 21, 2018 at 10:11PM by MalwareSeattle
via reddit http://ift.tt/2FnGyaZ
reddit
Code Exection in IDA via Strings • r/netsec
2 points and 0 comments so far on reddit
Trend Micro Email Encryption Gateway Multiple Vulnerabilities
http://ift.tt/2CAKUYU
Submitted February 21, 2018 at 11:18PM by pepit0r
via reddit http://ift.tt/2sL686P
http://ift.tt/2CAKUYU
Submitted February 21, 2018 at 11:18PM by pepit0r
via reddit http://ift.tt/2sL686P
Core Security
Trend Micro Email Encryption Gateway Multiple Vulnerabilities
1. Advisory InformationTitle: Trend Micro Email Encryption Gateway Multiple VulnerabilitiesAdvisory ID: CORE-2017-0006Advisory URL: http://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilitiesDate published: 2018-02…
Need help to solve the problew with record in the sudoers file Linux
Hi folks! Can someone pls help me with this record in the /etc/sudoers file:
Submitted February 21, 2018 at 10:44PM by Brain2life
via reddit http://ift.tt/2GAnpSt
Hi folks! Can someone pls help me with this record in the /etc/sudoers file:
non_root_user ALL=(ALL) NOPASSWD: /usr/sbin/lessDoes it safe to write like this?I think that this record will allow non root users launch less text editor and view documents that they are not authorized to do so.What do you think? Do I need to erase this record or rewrite it in a more safe way?
Submitted February 21, 2018 at 10:44PM by Brain2life
via reddit http://ift.tt/2GAnpSt
reddit
Need help to solve the problew with record in the... • r/security
Hi folks! Can someone pls help me with this record in the /etc/sudoers file: non_root_user ALL=(ALL) NOPASSWD: /usr/sbin/less Does it...
IBM X-Force IRIS Uncovers Active Business Email Compromise Campaign Targeting Fortune 500 Companies
http://ift.tt/2EY2ueG
Submitted February 21, 2018 at 10:16PM by cloudster314
via reddit http://ift.tt/2sJrb9P
http://ift.tt/2EY2ueG
Submitted February 21, 2018 at 10:16PM by cloudster314
via reddit http://ift.tt/2sJrb9P
Security Intelligence
IBM X-Force IRIS Uncovers Active Business Email Compromise Campaign Targeting Fortune 500 Companies
IBM X-Force IRIS observed a widespread business email compromise (BEC) campaign targeting many Fortune 500 companies that exploits flaws in common accounts payable processes.
Validating Leaked Passwords with k-Anonymity
http://ift.tt/2ogpOLf
Submitted February 22, 2018 at 12:38AM by civicode
via reddit http://ift.tt/2ELED2D
http://ift.tt/2ogpOLf
Submitted February 22, 2018 at 12:38AM by civicode
via reddit http://ift.tt/2ELED2D
The Cloudflare Blog
Validating Leaked Passwords with k-Anonymity
Today, v2 of Pwned Passwords was released as part of the Have I Been Pwned service offered by Troy Hunt. Containing over half a billion real world leaked passwords, this database provides a vital tool for correcting the course of how the industry combats…
How Developers got Password Security so Wrong
http://ift.tt/2CdawQ3
Submitted February 22, 2018 at 12:38AM by civicode
via reddit http://ift.tt/2CzjTW1
http://ift.tt/2CdawQ3
Submitted February 22, 2018 at 12:38AM by civicode
via reddit http://ift.tt/2CzjTW1
Cloudflare Blog
How Developers got Password Security so Wrong
Both in our real lives, and online, there are times where we need to authenticate ourselves - where we need to confirm we are who we say we are. This can be done using three things: Something you know Something you have Something you are Passwords are an…
FOSS slides for explaining Meltdown and Spectre
http://ift.tt/2Fofqsp
Submitted February 22, 2018 at 02:16AM by xux-xux
via reddit http://ift.tt/2GxEnRi
http://ift.tt/2Fofqsp
Submitted February 22, 2018 at 02:16AM by xux-xux
via reddit http://ift.tt/2GxEnRi
GitHub
neuhalje/presentation_meltdown_spectre
presentation_meltdown_spectre - Meltdown and spectre explained -- for normal people