A Cyberattack in Saudi Arabia Had a Deadly Goal. Experts Fear Another Try.
http://ift.tt/2HBvFCe
Submitted March 15, 2018 at 06:33PM by joey_php
via reddit http://ift.tt/2FVdH09
http://ift.tt/2HBvFCe
Submitted March 15, 2018 at 06:33PM by joey_php
via reddit http://ift.tt/2FVdH09
Nytimes
A Cyberattack in Saudi Arabia Had a Deadly Goal. Experts Fear Another Try.
Petrochemical companies were hit by a series of cyberassaults last year. The worst of them, against a widely used safety system, could have set off an explosion.
Analyzing VPC flow logs
http://ift.tt/2FSZ1P5
Submitted March 15, 2018 at 06:46PM by tech-tramp
via reddit http://ift.tt/2HAjJ3s
http://ift.tt/2FSZ1P5
Submitted March 15, 2018 at 06:46PM by tech-tramp
via reddit http://ift.tt/2HAjJ3s
TotalCloud Blog
Analyze VPC flow logs | Security | Performance - TotalCloud Blog
The VPC flow logs capture important information about the IP traffic to and from network interfaces, subnets and VPCs in the AWS infrastructure. They are used to monitor security by tracking traffic reaching and leaving the resources(instance, databases,…
Flash, Windows Users: It’s Time to Patch
http://ift.tt/2FPu5PF
Submitted March 15, 2018 at 08:08PM by volci
via reddit http://ift.tt/2peDC8G
http://ift.tt/2FPu5PF
Submitted March 15, 2018 at 08:08PM by volci
via reddit http://ift.tt/2peDC8G
reddit
Flash, Windows Users: It’s Time to Patch • r/security
1 points and 1 comments so far on reddit
How do I secure an Amazon Echo, and secure my network and privacy from it?
I’ve just purchased my parents an Amazon Echo however, as most people are, I’m concerned with the level of privacy these units respect.I plan to sign up to Amazon with a dummy email, there will be no smart devices, no locks, no lights, the Echo will just be used to assist my parents with quick info etc.My question is, what can I do to improve the security of the device and my household, whilst retaining my right to privacy?I’d really like to be able to set a schedule for when the microphone is activated, is that a thing?Note: I use pfSense with a managed UniFi switch and AC Pro’s - the plan is to build an IoT network VLANd off from the rest of my network, and I was also considering time-based firewall rules to ensure Alexa can’t talk outside my network after 12 for example.
Submitted March 15, 2018 at 08:05PM by mscaff
via reddit http://ift.tt/2IuiDHF
I’ve just purchased my parents an Amazon Echo however, as most people are, I’m concerned with the level of privacy these units respect.I plan to sign up to Amazon with a dummy email, there will be no smart devices, no locks, no lights, the Echo will just be used to assist my parents with quick info etc.My question is, what can I do to improve the security of the device and my household, whilst retaining my right to privacy?I’d really like to be able to set a schedule for when the microphone is activated, is that a thing?Note: I use pfSense with a managed UniFi switch and AC Pro’s - the plan is to build an IoT network VLANd off from the rest of my network, and I was also considering time-based firewall rules to ensure Alexa can’t talk outside my network after 12 for example.
Submitted March 15, 2018 at 08:05PM by mscaff
via reddit http://ift.tt/2IuiDHF
reddit
How do I secure an Amazon Echo, and secure my network... • r/security
I’ve just purchased my parents an Amazon Echo however, as most people are, I’m concerned with the level of privacy these units respect. I plan to...
Sources for Threats to IT and Hosting Providers
Does anyone know of any literature or sources that shed some light on threats within the IT industry for IT support and hosting providers? Anything from statistics to news articles would be appreciated. Thanks in advance.
Submitted March 15, 2018 at 08:28PM by wrec_
via reddit http://ift.tt/2Gwa8vd
Does anyone know of any literature or sources that shed some light on threats within the IT industry for IT support and hosting providers? Anything from statistics to news articles would be appreciated. Thanks in advance.
Submitted March 15, 2018 at 08:28PM by wrec_
via reddit http://ift.tt/2Gwa8vd
reddit
Sources for Threats to IT and Hosting Providers • r/security
Does anyone know of any literature or sources that shed some light on threats within the IT industry for IT support and hosting providers?...
DFIR - extracting timestamps of open network connections in usermode
http://ift.tt/2tMoWmY
Submitted March 15, 2018 at 09:10PM by hadar0x
via reddit http://ift.tt/2pgUBqS
http://ift.tt/2tMoWmY
Submitted March 15, 2018 at 09:10PM by hadar0x
via reddit http://ift.tt/2pgUBqS
Illusivenetworks
Why and How to Extract Network Connection Timestamps for DFIR Investigations
For as long as I have been doing forensics, or more specifically, live response, there has been a lot of value in reviewing a Windows system’s network connections during an investigation. In this blog I introduce the importance of extracting an unfamiliar…
Critical Infrastructure Security & Protection Services in Wyoming
http://ift.tt/2Gx63qK
Submitted March 15, 2018 at 10:45PM by burris123
via reddit http://ift.tt/2tV3QD0
http://ift.tt/2Gx63qK
Submitted March 15, 2018 at 10:45PM by burris123
via reddit http://ift.tt/2tV3QD0
Burris Security
Best Critical Infrastructure Security & Protection Services Wyoming
Burris Security Services has great deal of experience managing protective force operations for governments and multinational corporations. It employs highly-trained experts in counter-terrorism, special operations, training, weapons, explosives, security…
VPN Providers HotSpot Shield, Pure VPN, & Zenmate are leaking your IP
http://ift.tt/2tMrMrU
Submitted March 15, 2018 at 10:40PM by timmyRS
via reddit http://ift.tt/2GwwHQA
http://ift.tt/2tMrMrU
Submitted March 15, 2018 at 10:40PM by timmyRS
via reddit http://ift.tt/2GwwHQA
The Hacker News
Warning – 3 Popular VPN Services Are Leaking Your IP Address
3 Popular VPN Services—HotSpot Shield, PureVPN, and Zenmate—Are Leaking Your IP Address And Online Activities
This is gonna be fun. Couldn't have got a cooler intro to Metasploit. Time to wake up
http://ift.tt/2tS5AwE
Submitted March 15, 2018 at 09:55PM by thematrix1001
via reddit http://ift.tt/2FYdzNy
http://ift.tt/2tS5AwE
Submitted March 15, 2018 at 09:55PM by thematrix1001
via reddit http://ift.tt/2FYdzNy
Aggressive password policy: When your security turns against you.
http://ift.tt/2GwmTpP
Submitted March 15, 2018 at 10:44PM by alex91ar
via reddit http://ift.tt/2Dt8R56
http://ift.tt/2GwmTpP
Submitted March 15, 2018 at 10:44PM by alex91ar
via reddit http://ift.tt/2Dt8R56
Medium
Aggressive password policy: When your security turns against you.
Say you have an application on a pentesting gig. Say that application has a special “Recover your account” routine, which includes…
Mining Mimecast: brute forcing your way to success
http://ift.tt/2tM6Xg8
Submitted March 15, 2018 at 10:33PM by eth0izzle
via reddit http://ift.tt/2FVUz25
http://ift.tt/2tM6Xg8
Submitted March 15, 2018 at 10:33PM by eth0izzle
via reddit http://ift.tt/2FVUz25
MikroTik RouterOS SMB Buffer Overflow (unauthenticated RCE)
http://ift.tt/2GvIRcm
Submitted March 15, 2018 at 10:48PM by pepit0r
via reddit http://ift.tt/2FLz5Sd
http://ift.tt/2GvIRcm
Submitted March 15, 2018 at 10:48PM by pepit0r
via reddit http://ift.tt/2FLz5Sd
Core Security
MikroTik RouterOS SMB Buffer Overflow
1. Advisory InformationTitle: MikroTik RouterOS SMB Buffer OverflowAdvisory ID: CORE-2018-0003Advisory URL: http://www.coresecurity.com/advisories/mikrotik-routeros-smb-buffer-overflowDate published: 2018-03-15Date of last update: 2018-03-15Vendors contacted:…
Pre-Installed Malware Found On 5 Million Popular Android Phones
http://ift.tt/2phgpmr
Submitted March 16, 2018 at 02:31AM by alessiodelv
via reddit http://ift.tt/2FMJaOQ
http://ift.tt/2phgpmr
Submitted March 16, 2018 at 02:31AM by alessiodelv
via reddit http://ift.tt/2FMJaOQ
The Hacker News
Pre-Installed Malware Found On 5 Million Popular Android Phones
Advanced Malware Discovered Pre-installed on 5 MILLION Android Devices from Honor, Huawei, Xiaomi, OPPO, Vivo, GIONEE and Samsung
A list of the most secure apps based on distribution. Feel free to add with distro, name of app and short denoscription.
MacOS - Windows - LinuxProtonMail - secure email provider, based in switzerland - uses a JS version of PGP. Cryptomator - open source app for de- and encryption for cloud based file storage.
Submitted March 16, 2018 at 06:04AM by NebelMe
via reddit http://ift.tt/2FDHlYy
MacOS - Windows - LinuxProtonMail - secure email provider, based in switzerland - uses a JS version of PGP. Cryptomator - open source app for de- and encryption for cloud based file storage.
Submitted March 16, 2018 at 06:04AM by NebelMe
via reddit http://ift.tt/2FDHlYy
reddit
A list of the most secure apps based on distribution.... • r/security
**MacOS - Windows - Linux** **ProtonMail** - secure email provider, based in switzerland - uses a JS version of PGP. **Cryptomator** - open...
Pentest noscripts, tools & more
http://ift.tt/2GxBdhL
Submitted March 16, 2018 at 05:38AM by X1M_
via reddit http://ift.tt/2HzNEZJ
http://ift.tt/2GxBdhL
Submitted March 16, 2018 at 05:38AM by X1M_
via reddit http://ift.tt/2HzNEZJ
x1m.nl
Pentest noscripts, tools & more
The bread and butter of pentesting: nmap
How to: Arbitrary Host headers via. CloudFront Domain Fronting
http://ift.tt/2FK8rt6
Submitted March 16, 2018 at 07:15AM by vysec
via reddit http://ift.tt/2tUjsXj
http://ift.tt/2FK8rt6
Submitted March 16, 2018 at 07:15AM by vysec
via reddit http://ift.tt/2tUjsXj
Medium
Domain Fronting: Who Am I?
TLDR; Set whatever Host header you want in your Domain Fronting packet when you use CloudFront
A near invisible sticker for your headlight, which has RFID tech....who could benefit and would you? (2 question survey).
http://ift.tt/2HClE7T
Submitted March 16, 2018 at 07:04AM by Motionlicker
via reddit http://ift.tt/2FMwB6e
http://ift.tt/2HClE7T
Submitted March 16, 2018 at 07:04AM by Motionlicker
via reddit http://ift.tt/2FMwB6e
Surveymonkey
Market Size - Determination Survey
Web survey powered by SurveyMonkey.com. Create your own online survey now with SurveyMonkey's expert certified FREE templates.
Firefox tunnel to bypass any firewall [Paper, Step-by-Step Tut to run PoC, Complete Sources and Complete Sources - See Comment]
http://ift.tt/2phZiAX
Submitted March 16, 2018 at 06:23AM by TechLord2
via reddit http://ift.tt/2DvGOSJ
http://ift.tt/2phZiAX
Submitted March 16, 2018 at 06:23AM by TechLord2
via reddit http://ift.tt/2DvGOSJ
GitHub
CoolerVoid/firefox_tunnel
firefox_tunnel - The way to use firefox to make a tunnel to remote communication, bypass any firewall
Our Interesting Call with CTS-Labs | Anandtech
http://ift.tt/2pfc1F7
Submitted March 16, 2018 at 07:48AM by elkbattle
via reddit http://ift.tt/2tSFPfx
http://ift.tt/2pfc1F7
Submitted March 16, 2018 at 07:48AM by elkbattle
via reddit http://ift.tt/2tSFPfx
Anandtech
Our Interesting Call with CTS-Labs
Better Check IOT Boys
http://ift.tt/29tgTR8
Submitted March 16, 2018 at 07:21AM by AlpraCream
via reddit http://ift.tt/2FZBJai
http://ift.tt/29tgTR8
Submitted March 16, 2018 at 07:21AM by AlpraCream
via reddit http://ift.tt/2FZBJai
Bullguard
Internet of Things (IoT) Scanner - BullGuard
Check if your internet-connected devices at home (webcams, smart TVs etc) are public on Shodan. If they are, this means they are accessible to the public, and hackers.
How to maintain Phone Privacy
http://ift.tt/2piL8jN
Submitted March 16, 2018 at 09:28AM by Lime_proxies
via reddit http://ift.tt/2FO9JTI
http://ift.tt/2piL8jN
Submitted March 16, 2018 at 09:28AM by Lime_proxies
via reddit http://ift.tt/2FO9JTI
Limeproxies
How to maintain Phone Privacy
Mobile phones have become a necessity in our lives. If we just sit back and think as to how mobile phones have affected our daily life, we will be stumped. This is exactly what I did and at the end, I