Strange browser extension behaviour: uBlock Origin
I have Win10 with SQL Server installed. I notice a cpu spike in SQL Server whenever I have the uBlock Origin extension enabled with an open browser window (Firefox, Opera, Edge). Closing the browser or disabling the uBlock Origin extension immediately drops the cpu usage for the SQL process.This seems suspicious to me. Firstly, can anyone reproduce this? How would I begin to investigate the cause?Many thanks.SQL server default or named instance, current user account as dbo.
Submitted March 10, 2018 at 04:58PM by dspprnc
via reddit http://ift.tt/2twM48C
I have Win10 with SQL Server installed. I notice a cpu spike in SQL Server whenever I have the uBlock Origin extension enabled with an open browser window (Firefox, Opera, Edge). Closing the browser or disabling the uBlock Origin extension immediately drops the cpu usage for the SQL process.This seems suspicious to me. Firstly, can anyone reproduce this? How would I begin to investigate the cause?Many thanks.SQL server default or named instance, current user account as dbo.
Submitted March 10, 2018 at 04:58PM by dspprnc
via reddit http://ift.tt/2twM48C
reddit
Strange browser extension behaviour: uBlock Origin • r/security
I have Win10 with SQL Server installed. I notice a cpu spike in SQL Server whenever I have the uBlock Origin extension enabled with an open...
Security is not a buzz-word business model, but our cumulative effort
http://ift.tt/2Fn1bqK
Submitted March 10, 2018 at 05:28PM by xrna
via reddit http://ift.tt/2HmjGIu
http://ift.tt/2Fn1bqK
Submitted March 10, 2018 at 05:28PM by xrna
via reddit http://ift.tt/2HmjGIu
Cyber Sins Security Blog
Security is not a buzz-word business model, but our cumulative effort
This article conveys my personal opinion towards security and it's underlying revenue model; I would recommend to read it with a pinch of salt (+ tequila, while we are on it). I shall be covering either side of the coin, the heads where pentesters try to…
Who Will Steal Satoshi’s Bitcoins? (a good overview of quantum computing)
http://ift.tt/2FqqJmM
Submitted March 10, 2018 at 05:51PM by al-maisan
via reddit http://ift.tt/2IhSLz0
http://ift.tt/2FqqJmM
Submitted March 10, 2018 at 05:51PM by al-maisan
via reddit http://ift.tt/2IhSLz0
Medium
Who Will Steal Satoshi’s Bitcoins?
I woke up in the middle of the night so I fired up Twitter and I encountered two well-known cryptographers’ conversation about quantum…
Bypassing fingerprint scanner by breaking it.
https://www.reddit.com/r/huaweip10/comments/7fzkfp/fingerprint_allowing_anyone_in/I came across this post of a Reddit user, which dropped the phone, and now anyone can get in with fingerprint. So the devices are not secure. Anyone can just break it and they might get in the phone.
Submitted March 10, 2018 at 07:44PM by F4LLCON
via reddit http://ift.tt/2FsOrPp
https://www.reddit.com/r/huaweip10/comments/7fzkfp/fingerprint_allowing_anyone_in/I came across this post of a Reddit user, which dropped the phone, and now anyone can get in with fingerprint. So the devices are not secure. Anyone can just break it and they might get in the phone.
Submitted March 10, 2018 at 07:44PM by F4LLCON
via reddit http://ift.tt/2FsOrPp
reddit
Fingerprint allowing anyone in • r/huaweip10
So I recently dropped my phone, the screen cracked a little and the tiny crack ran all the way to my fingerprint sensor. Now as I've experimented,...
How “brute checkers” are used to rob your online accounts
http://ift.tt/2Fri0RA
Submitted March 10, 2018 at 08:26PM by Deku-shrub
via reddit http://ift.tt/2tvyTFd
http://ift.tt/2Fri0RA
Submitted March 10, 2018 at 08:26PM by Deku-shrub
via reddit http://ift.tt/2tvyTFd
pirate dot london
How “brute checkers” are used to rob your online accounts
My motto — as my colleagues will attest — is:
Password manager maker Keeper, currently suing a reporter, is hit by another security snafu
http://ift.tt/2Ifn8WD
Submitted March 10, 2018 at 09:18PM by moooooky
via reddit http://ift.tt/2p4J6mf
http://ift.tt/2Ifn8WD
Submitted March 10, 2018 at 09:18PM by moooooky
via reddit http://ift.tt/2p4J6mf
ZDNet
Password manager maker Keeper hit by another security snafu
The exposed server contained the company's downloadable software -- including a code-signing certificate.
How do people who set up fake hotspots steal my information?
I am new to this sub so apologies in advance if this doesn't belong here. I was thinking about "hackers" trying to steal peoples information by setting up fake wifi hot spots in cafeterias and gas stations.If I use HTTPS how is it possible? There are only so many CA's my computer trusts. If this person tries to spoof WellsFargos website my computer will know that his certificate is invalid since it's not generated by a CA it trusts. Unless this person figured out a way around the public key cryptography, how can he/she steal my data?
Submitted March 10, 2018 at 09:09PM by pokemonptrrr
via reddit http://ift.tt/2oYm818
I am new to this sub so apologies in advance if this doesn't belong here. I was thinking about "hackers" trying to steal peoples information by setting up fake wifi hot spots in cafeterias and gas stations.If I use HTTPS how is it possible? There are only so many CA's my computer trusts. If this person tries to spoof WellsFargos website my computer will know that his certificate is invalid since it's not generated by a CA it trusts. Unless this person figured out a way around the public key cryptography, how can he/she steal my data?
Submitted March 10, 2018 at 09:09PM by pokemonptrrr
via reddit http://ift.tt/2oYm818
reddit
How do people who set up fake hotspots steal my... • r/security
I am new to this sub so apologies in advance if this doesn't belong here. I was thinking about "hackers" trying to steal peoples information by...
The Guppy Proxy (Burp Alternative)
http://ift.tt/2Fr0gWx
Submitted March 10, 2018 at 12:17AM by roglew2
via reddit http://ift.tt/2HlQCRj
http://ift.tt/2Fr0gWx
Submitted March 10, 2018 at 12:17AM by roglew2
via reddit http://ift.tt/2HlQCRj
GitHub
roglew/guppy-proxy
guppy-proxy - The Guppy Proxy (GUI Pappy)
Background check: Does anybody know anything about the open source program, Handbrake? Is it safe for Windows?
I really need to use this software, but not if it's dirty. Does anybody have any experience with it? Is it reputable and virus free? https://handbrake.fr/
Submitted March 10, 2018 at 11:21PM by ChampionDreamerMusic
via reddit http://ift.tt/2FvsOdg
I really need to use this software, but not if it's dirty. Does anybody have any experience with it? Is it reputable and virus free? https://handbrake.fr/
Submitted March 10, 2018 at 11:21PM by ChampionDreamerMusic
via reddit http://ift.tt/2FvsOdg
handbrake.fr
HandBrake: Open Source Video Transcoder
HandBrake is an open-source, GPL-licensed, multiplatform, multithreaded video transcoder.
How “brute checkers” are used to rob your online accounts
http://ift.tt/2Fri0RA
Submitted March 11, 2018 at 12:31AM by Deku-shrub
via reddit http://ift.tt/2oYMHTU
http://ift.tt/2Fri0RA
Submitted March 11, 2018 at 12:31AM by Deku-shrub
via reddit http://ift.tt/2oYMHTU
pirate dot london
How “brute checkers” are used to rob your online accounts
My motto — as my colleagues will attest — is:
Emulating Exynos 4210 BootROM in QEMU
http://ift.tt/2tBuS1U
Submitted March 11, 2018 at 12:52AM by PapouDesCarpates
via reddit http://ift.tt/2Get2qt
http://ift.tt/2tBuS1U
Submitted March 11, 2018 at 12:52AM by PapouDesCarpates
via reddit http://ift.tt/2Get2qt
fred's notes
Emulating Exynos 4210 BootROM in QEMU
QEMU has support for the SMDKC210 machine, an ARM board based on Exynos 4210 SoC. Peripherals implemented in QEMU for this machine are UART, SDHCI, FIMD, I2C, Interrupt Combiner, GIC, Clock, PMU, RNG, MCT, PWM, RTC. Samsung Galaxy S2 phone is also based on…
How To Secure The Network Edge
http://ift.tt/2FPvfIy
Submitted March 11, 2018 at 01:12AM by speckz
via reddit http://ift.tt/2p47e8J
http://ift.tt/2FPvfIy
Submitted March 11, 2018 at 01:12AM by speckz
via reddit http://ift.tt/2p47e8J
Semiconductor Engineering
How To Secure The Network Edge
The risk of breaches is growing, and so is the potential damage.
Rootstealer, Program to detect when linux user opens terminal with root and inject intrusive commands in terminal
http://ift.tt/2oYroBJ
Submitted March 11, 2018 at 01:13AM by al-maisan
via reddit http://ift.tt/2FrdVNb
http://ift.tt/2oYroBJ
Submitted March 11, 2018 at 01:13AM by al-maisan
via reddit http://ift.tt/2FrdVNb
GitHub
CoolerVoid/rootstealer
rootstealer - X11 trick to inject commands on root terminal.
How do companies protect against a security breach?
http://ift.tt/2IhOyuZ
Submitted March 11, 2018 at 03:27AM by AmazinBlasianRaisin
via reddit http://ift.tt/2p36CjK
http://ift.tt/2IhOyuZ
Submitted March 11, 2018 at 03:27AM by AmazinBlasianRaisin
via reddit http://ift.tt/2p36CjK
Internet Security Central
How do companies protect against a security breach? - Internet Security Central
It is no secret that any criminal will have his eyes on the biggest piece of cake he can acquire....
Rop-Tool - A Tool To Help You Write Binary Exploits [Full Sources - See Comment]
http://ift.tt/2DfV9T5
Submitted March 11, 2018 at 04:36AM by TechLord2
via reddit http://ift.tt/2FDNPpD
http://ift.tt/2DfV9T5
Submitted March 11, 2018 at 04:36AM by TechLord2
via reddit http://ift.tt/2FDNPpD
GitHub
t00sh/rop-tool
rop-tool - A tool to help you write binary exploits
Leveraging INF Files Fetch & Execute Techniques to Bypass Application Whitelisting, Deter Host-Based Security Products, and Achieve ‘hidden’ Persistence (Part 2)
http://ift.tt/2IjU9AO
Submitted March 11, 2018 at 04:32AM by TechLord2
via reddit http://ift.tt/2twTkkZ
http://ift.tt/2IjU9AO
Submitted March 11, 2018 at 04:32AM by TechLord2
via reddit http://ift.tt/2twTkkZ
| bohops |
Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence (Part 2)
Introduction Two weeks ago, I blogged about several “pass-thru” techniques that leveraged the use of INF files (‘.inf’) to “fetch and execute” remote noscript comp…
XBruteForcer - CRM Brute Force Tool (WP, Joomla, DruPal, OpenCart, Magento)
http://ift.tt/2p4lezj
Submitted March 11, 2018 at 04:45AM by TechLord2
via reddit http://ift.tt/2HpTb4V
http://ift.tt/2p4lezj
Submitted March 11, 2018 at 04:45AM by TechLord2
via reddit http://ift.tt/2HpTb4V
GitHub
Moham3dRiahi/XBruteForcer
XBruteForcer - Brute Force Tool 🔓 WordPress , Joomla , DruPal , OpenCart , Magento
Robots can be hacked with ransomware & curse at customers
http://ift.tt/2p41VpP
Submitted March 11, 2018 at 05:45AM by ga-vu
via reddit http://ift.tt/2oYzhXM
http://ift.tt/2p41VpP
Submitted March 11, 2018 at 05:45AM by ga-vu
via reddit http://ift.tt/2oYzhXM
HackRead
Robots can be hacked with ransomware & curse at customers
Hackers can infect Softbank’s NAO and Pepper Robots with ransomware by exploiting an unpatched vulnerability leading to devastating consequences.
Free Ethical Hacking Course - Practice 5 - System Hacking with Examples
http://ift.tt/2IiIDWH
Submitted March 11, 2018 at 06:19AM by gburu
via reddit http://ift.tt/2FGtC2b
http://ift.tt/2IiIDWH
Submitted March 11, 2018 at 06:19AM by gburu
via reddit http://ift.tt/2FGtC2b
en.gburu.net: Blog about technology, free courses, ethical hacking and more!
Practice 5 - System Hacking with Examples - Ethical Hacking Course - en.gburu.net
In this new practice of the free course of ethical hacking, we will see different ways of attacking an objective system, obtaining remote access.
Practice 5 - System Hacking with Examples - Free Ethical Hacking Course
http://ift.tt/2IiIDWH
Submitted March 11, 2018 at 06:10AM by gburu
via reddit http://ift.tt/2Gflfsj
http://ift.tt/2IiIDWH
Submitted March 11, 2018 at 06:10AM by gburu
via reddit http://ift.tt/2Gflfsj
en.gburu.net: Blog about technology, free courses, ethical hacking and more!
Practice 5 - System Hacking with Examples - Ethical Hacking Course - en.gburu.net
In this new practice of the free course of ethical hacking, we will see different ways of attacking an objective system, obtaining remote access.
Major Version Release 1.0 Of Amass, The Subdomain Enumeration Tool Written In Go. Shown To Be More Effective Than Sublist3r.
http://ift.tt/2FyO7uz
Submitted March 11, 2018 at 07:20AM by jeff_foley
via reddit http://ift.tt/2IjrlZi
http://ift.tt/2FyO7uz
Submitted March 11, 2018 at 07:20AM by jeff_foley
via reddit http://ift.tt/2IjrlZi
GitHub
caffix/amass
amass - Subdomain Enumeration in Go