Netsec – Telegram
Netsec
7.42K subscribers
22.4K links
This channel posts the feed from r/netsec.
For any suggestions dm @streaak
Donate to keep the bot running https://www.paypal.me/akhilgv
Download Telegram
Frida 10.7 is out with full support for the Electra jailbreak on iOS 11
http://ift.tt/2InLq0T

Submitted March 14, 2018 at 02:22AM by oleavr
via reddit http://ift.tt/2pfyUYy
Visual Basic GUI: A Tool to Inject Keystrokes on a SSH Client via an X11 Forwarded Session
http://ift.tt/2pfDB4C

Submitted March 14, 2018 at 03:12AM by pergnib
via reddit http://ift.tt/2DqoEBr
MWC2018 – Digital Security Roundup
http://ift.tt/2FoJ5oj

Submitted March 14, 2018 at 03:41AM by Iot_Security
via reddit http://ift.tt/2p9AbAT
Rate my security setup out of 10 🔒
Hello, i have just recently buffed my digital security across various accounts and was wondering if anyone here could have a look at what i have set up so far and tell me if there is anything i could improve on. I decided to make these updates after an attempt was made on one of my accounts. I have 3 main important accounts such as email ect accounts and 10 lesser accounts.My security is as follows:3 main accounts: 30+ character passwords comprising of different phrases and numbers/characters mixed in randomly. 2FA using either sms or authenticator app. Various devices setup. Backup recovery email address never used unless for recovery also with 2FA Backup codes setup everywhere.10+lesser accounts: 16+ character passwords same setup as above 2FA where provided Backup codes where providedIn addition: None off my passwords are the same, all are long and complex All my privacy settings for accounts are as private as possible I delete cookies and history regularly No passwords or bank details saved on websites All passwords are memorised and have them self encrypted written down in a safe in my house just incase My mobile company have verbal passwords and pin set up for customer service.Please let me know if there are any gaps in my security or if there are any areas i could improve.Cheers.

Submitted March 14, 2018 at 05:17AM by Bango-Fett
via reddit http://ift.tt/2HyYhMh
Malware over SSL
So we're looking at SSL visibility tools and we're questioning the value of them. When I do research on the threat, I see almost exclusively ZScaler written or referenced articles, which makes me think that it's just them pushing an agenda. When I think about how malware over ssl would work, the only way I can think it would work is if somehow the actual website was infected and was serving up malware with an intact cert.People have suggested that the malware could come in via advertisements or as an email attachment with a https reference, but that has me confused because most advertising I've seen is either http traffic, or has a valid SSL cert (which again means that the serving website must have been hacked). The only other way I can think of that malware via SSL would work is if the bad guys actually managed to register a cert that was widely trusted - but one would think that wouldn't last too long before someone revoked it.Can someone fill me in on what I'm missing here?Thanks.

Submitted March 14, 2018 at 05:10AM by Never_Been_Missed
via reddit http://ift.tt/2FMDWWL
Network Segmentation Needs to Evolve
http://ift.tt/2EvrEOj

Submitted March 14, 2018 at 04:39AM by SecurityTrust
via reddit http://ift.tt/2FFKfYS
Using FRIDA to bypass the Android 7+ Network Security Configuration feature
http://ift.tt/2FvcfSV

Submitted March 14, 2018 at 08:05AM by numberbuzy
via reddit http://ift.tt/2tKJ5tt
Find out the top elements to keep in mind to secure your data.
http://ift.tt/2IphbGF

Submitted March 14, 2018 at 01:47PM by grogerysolberg
via reddit http://ift.tt/2pcOO5S
Tutorial - How to deal with rootkit analysis step by step: laboratory setup, Windows kernel architecture and API, Windows protection, Windows 10 64 bits
http://ift.tt/2fHX6A7

Submitted March 14, 2018 at 04:45PM by TechLord2
via reddit http://ift.tt/2pauYc7