Netsec – Telegram
Netsec
7.42K subscribers
22.4K links
This channel posts the feed from r/netsec.
For any suggestions dm @streaak
Donate to keep the bot running https://www.paypal.me/akhilgv
Download Telegram
What is the point of security screws?
Security screws seem to offer security by obscurity, and anyone can buy a screwdriver with the right head. Some security screws have ratchet heads and are not removable at all, but a rivet, a bolt with a nut, or a weld can do the same job. So what's the point of security screws?

Submitted March 10, 2018 at 01:16AM by Sparklingcobweb
via reddit http://ift.tt/2p0PdIm
Strange browser extension behaviour: uBlock Origin
I have Win10 with SQL Server installed. I notice a cpu spike in SQL Server whenever I have the uBlock Origin extension enabled with an open browser window (Firefox, Opera, Edge). Closing the browser or disabling the uBlock Origin extension immediately drops the cpu usage for the SQL process.This seems suspicious to me. Firstly, can anyone reproduce this? How would I begin to investigate the cause?Many thanks.SQL server default or named instance, current user account as dbo.

Submitted March 10, 2018 at 04:58PM by dspprnc
via reddit http://ift.tt/2twM48C
Bypassing fingerprint scanner by breaking it.
https://www.reddit.com/r/huaweip10/comments/7fzkfp/fingerprint_allowing_anyone_in/I came across this post of a Reddit user, which dropped the phone, and now anyone can get in with fingerprint. So the devices are not secure. Anyone can just break it and they might get in the phone.

Submitted March 10, 2018 at 07:44PM by F4LLCON
via reddit http://ift.tt/2FsOrPp
How “brute checkers” are used to rob your online accounts
http://ift.tt/2Fri0RA

Submitted March 10, 2018 at 08:26PM by Deku-shrub
via reddit http://ift.tt/2tvyTFd
Password manager maker Keeper, currently suing a reporter, is hit by another security snafu
http://ift.tt/2Ifn8WD

Submitted March 10, 2018 at 09:18PM by moooooky
via reddit http://ift.tt/2p4J6mf
How do people who set up fake hotspots steal my information?
I am new to this sub so apologies in advance if this doesn't belong here. I was thinking about "hackers" trying to steal peoples information by setting up fake wifi hot spots in cafeterias and gas stations.If I use HTTPS how is it possible? There are only so many CA's my computer trusts. If this person tries to spoof WellsFargos website my computer will know that his certificate is invalid since it's not generated by a CA it trusts. Unless this person figured out a way around the public key cryptography, how can he/she steal my data?

Submitted March 10, 2018 at 09:09PM by pokemonptrrr
via reddit http://ift.tt/2oYm818
The Guppy Proxy (Burp Alternative)
http://ift.tt/2Fr0gWx

Submitted March 10, 2018 at 12:17AM by roglew2
via reddit http://ift.tt/2HlQCRj
Background check: Does anybody know anything about the open source program, Handbrake? Is it safe for Windows?
I really need to use this software, but not if it's dirty. Does anybody have any experience with it? Is it reputable and virus free? https://handbrake.fr/

Submitted March 10, 2018 at 11:21PM by ChampionDreamerMusic
via reddit http://ift.tt/2FvsOdg
How “brute checkers” are used to rob your online accounts
http://ift.tt/2Fri0RA

Submitted March 11, 2018 at 12:31AM by Deku-shrub
via reddit http://ift.tt/2oYMHTU
Rootstealer, Program to detect when linux user opens terminal with root and inject intrusive commands in terminal
http://ift.tt/2oYroBJ

Submitted March 11, 2018 at 01:13AM by al-maisan
via reddit http://ift.tt/2FrdVNb
Rop-Tool - A Tool To Help You Write Binary Exploits [Full Sources - See Comment]
http://ift.tt/2DfV9T5

Submitted March 11, 2018 at 04:36AM by TechLord2
via reddit http://ift.tt/2FDNPpD
Leveraging INF Files Fetch & Execute Techniques to Bypass Application Whitelisting, Deter Host-Based Security Products, and Achieve ‘hidden’ Persistence (Part 2)
http://ift.tt/2IjU9AO

Submitted March 11, 2018 at 04:32AM by TechLord2
via reddit http://ift.tt/2twTkkZ