hacking your neighbour's Wi-Fi
http://ift.tt/2IENTnF
Submitted March 21, 2018 at 10:58AM by defaultnamehere
via reddit http://ift.tt/2G0s2Fv
http://ift.tt/2IENTnF
Submitted March 21, 2018 at 10:58AM by defaultnamehere
via reddit http://ift.tt/2G0s2Fv
mango.pdf.zone
Hacking your neighbour's Wi-Fi
Hacking Wi-Fi, cracking passwords, and spying on mysterious handshakes is an easy game for babies.
What does your home network setup looks like?
Looking at products like the bitdefender box, I wonder what are people doing to secure their home networks? What does your setup look like?
Submitted March 21, 2018 at 01:32PM by gaijinboricua
via reddit http://ift.tt/2puMSpt
Looking at products like the bitdefender box, I wonder what are people doing to secure their home networks? What does your setup look like?
Submitted March 21, 2018 at 01:32PM by gaijinboricua
via reddit http://ift.tt/2puMSpt
reddit
What does your home network setup looks like? • r/security
Looking at products like the bitdefender box, I wonder what are people doing to secure their home networks? What does your setup look like?
Expedia's Orbitz Says 880,000 Payment Cards Compromised in Security Breach
http://ift.tt/2IBjxlP
Submitted March 21, 2018 at 01:17PM by Horus_Sirius
via reddit http://ift.tt/2pu74rh
http://ift.tt/2IBjxlP
Submitted March 21, 2018 at 01:17PM by Horus_Sirius
via reddit http://ift.tt/2pu74rh
TSecurity Portal
Expedia's Orbitz Says 880,000 Payment Cards Compromised in Security Breach
How secure is Mobile Pay?
Just out of curiosity, how safe is Mobile pay?
I don't know much about it and have never set it up on my phone but have been thinking about it.
I have a galaxy, so it would be Samsung Pay.
I haven't heard of issues with it, but just curious.
Thanks in advance.
Submitted March 21, 2018 at 02:43PM by GreekNord
via reddit http://ift.tt/2HRIKaE
Just out of curiosity, how safe is Mobile pay?
I don't know much about it and have never set it up on my phone but have been thinking about it.
I have a galaxy, so it would be Samsung Pay.
I haven't heard of issues with it, but just curious.
Thanks in advance.
Submitted March 21, 2018 at 02:43PM by GreekNord
via reddit http://ift.tt/2HRIKaE
reddit
How secure is Mobile Pay? • r/security
Just out of curiosity, how safe is Mobile pay? I don't know much about it and have never set it up on my phone but have been thinking about it. ...
Windows Remote Assistance XXE vulnerability
http://ift.tt/2ppryla
Submitted March 21, 2018 at 02:06PM by Mempodipper
via reddit http://ift.tt/2u7RqHY
http://ift.tt/2ppryla
Submitted March 21, 2018 at 02:06PM by Mempodipper
via reddit http://ift.tt/2u7RqHY
Revealed: 8 most dangerous scams to watch for this year - and how to stay safe
http://ift.tt/2pumv34
Submitted March 21, 2018 at 02:56PM by ObjectiveNovel
via reddit http://ift.tt/2IGhWLQ
http://ift.tt/2pumv34
Submitted March 21, 2018 at 02:56PM by ObjectiveNovel
via reddit http://ift.tt/2IGhWLQ
mirror
Revealed: 8 most dangerous scams to watch for this year - and how to stay safe
The report by NatWest has warned that scammers will also try to cash in on those tying the knot this year on the back of the Royal wedding
Using Proxies for Instagram to help your Marketing efforts
http://ift.tt/2FWgYt2
Submitted March 21, 2018 at 02:55PM by Lime_proxies
via reddit http://ift.tt/2IChWfL
http://ift.tt/2FWgYt2
Submitted March 21, 2018 at 02:55PM by Lime_proxies
via reddit http://ift.tt/2IChWfL
Limeproxies
Using Proxies for Instagram to help your Marketing efforts
After seeing the popularity of Facebook I didn’t think that there would be any social media platform that could sustain the competition from Facebook. Of course, I was proved wrong by Instagram, a name that we all have surely heard of.
When Less is More in Cybersecurity
http://ift.tt/2GOZa4l
Submitted March 21, 2018 at 04:18PM by Uminekoshi
via reddit http://ift.tt/2DK2zy1
http://ift.tt/2GOZa4l
Submitted March 21, 2018 at 04:18PM by Uminekoshi
via reddit http://ift.tt/2DK2zy1
Nehemiah Security
When Less is More in Cybersecurity - Nehemiah Security
Don’t have time to read? Start listening to this blog post now: I am convinced any business leader who strives to optimize an operation has heard the cliché, “Less is more!” While cybersecurity professionals have certainly heard the expression, their reality…
Blacklist to block facebook
http://ift.tt/27WoQ6X
Submitted March 21, 2018 at 03:57PM by matoas7
via reddit http://ift.tt/2GNELwr
http://ift.tt/27WoQ6X
Submitted March 21, 2018 at 03:57PM by matoas7
via reddit http://ift.tt/2GNELwr
GitHub
jmdugan/blocklists
blocklists - Shared lists of problem domains people may want to block with hosts files
Utility to generate similar IDN domain names and block them at the email stage.
http://ift.tt/2FZZA6D
Submitted March 21, 2018 at 04:50PM by jekapats
via reddit http://ift.tt/2Gd0Syv
http://ift.tt/2FZZA6D
Submitted March 21, 2018 at 04:50PM by jekapats
via reddit http://ift.tt/2Gd0Syv
GitHub
phishai/idn_generator
idn_generator - Utility to generate similar IDN domain names
Cambridge Analytica Used ProtonMail to Hide Email Paper Trails
http://ift.tt/2pskYLk
Submitted March 21, 2018 at 05:51PM by CasperVPN
via reddit http://ift.tt/2FPEonQ
http://ift.tt/2pskYLk
Submitted March 21, 2018 at 05:51PM by CasperVPN
via reddit http://ift.tt/2FPEonQ
Infosecurity Magazine
Cambridge Analytica Used ProtonMail to Hide Email Paper Trails
ProtonMail now included in CA saga
Why Cyberattacks Happen and how to Stop it?
http://ift.tt/2HStuuf
Submitted March 21, 2018 at 05:39PM by cywarelabs12
via reddit http://ift.tt/2FTghVd
http://ift.tt/2HStuuf
Submitted March 21, 2018 at 05:39PM by cywarelabs12
via reddit http://ift.tt/2FTghVd
Cyware
Why Cyberattacks Happen and how to Stop it?
Cybercrime which was a rivulet some time back has quickly turned into a big river comprising myriad cyber crimes being reported. The reason being-- the rise of the internet at breakneck speed and organizations and companies using it for all their operations.…
Utility to generate similar IDN domain names and block them at the email stage.
http://ift.tt/2FZZA6D
Submitted March 21, 2018 at 04:40PM by jekapats
via reddit http://ift.tt/2GPyujJ
http://ift.tt/2FZZA6D
Submitted March 21, 2018 at 04:40PM by jekapats
via reddit http://ift.tt/2GPyujJ
GitHub
phishai/idn_generator
idn_generator - Utility to generate similar IDN domain names
The most absurd concept I've ever seen: Guns with a wifi connection.
http://ift.tt/2a5DuEA
Submitted March 21, 2018 at 06:41PM by iamcryptoki
via reddit http://ift.tt/2IFD8S3
http://ift.tt/2a5DuEA
Submitted March 21, 2018 at 06:41PM by iamcryptoki
via reddit http://ift.tt/2IFD8S3
WIRED
Hackers Can Disable a Sniper Rifle—Or Change Its Target
If a hacker attacks your TrackingPoint smart gun over its Wi-Fi connection, you may find the weapon is aiming at a different target than you think.
Security In 5: Episode 199 - The Top 5 Challenges Of Meeting GDPR
http://ift.tt/2G0FEAJ
Submitted March 21, 2018 at 06:34PM by BinaryBlog
via reddit http://ift.tt/2IFDacD
http://ift.tt/2G0FEAJ
Submitted March 21, 2018 at 06:34PM by BinaryBlog
via reddit http://ift.tt/2IFDacD
Libsyn
Security In Five Podcast: Episode 199 - The Top 5 Challenges Of Meeting GDPR
The General Data Protection Rule (GDPR) is the new privacy framework for the EU data starting in May, 2018. Many companies have been working toward compliance to these new laws but 50% won't make it. This episode talks about the five biggest challenges companies…
World’s Biggest Data Breaches & Hacks — Information is Beautiful
http://ift.tt/2FSca7O
Submitted March 21, 2018 at 07:06PM by cryptochild121
via reddit http://ift.tt/2FNyeEC
http://ift.tt/2FSca7O
Submitted March 21, 2018 at 07:06PM by cryptochild121
via reddit http://ift.tt/2FNyeEC
Information is Beautiful
World’s Biggest Data Breaches & Hacks — Information is Beautiful
Data visualization of the world biggest data breaches, leaks and hacks. Constantly updated. Powered by VizSweet.
AMD confirms CTS exploits, patches available in weeks
http://ift.tt/2u9G6uI
Submitted March 21, 2018 at 08:16PM by dfv157
via reddit http://ift.tt/2IFzF5V
http://ift.tt/2u9G6uI
Submitted March 21, 2018 at 08:16PM by dfv157
via reddit http://ift.tt/2IFzF5V
Amd
AMD Corporate: Initial AMD Technical Assessment... | Community
On March 12, 2018, AMD received a communication from CTS Labs regarding research into security vulnerabilities involving some AMD products. Less than 24
Umbral: Threshold proxy re-encryption for scalable end-to-end encrypted data sharing
http://ift.tt/2DJxRoH
Submitted March 21, 2018 at 07:57PM by mswilkison
via reddit http://ift.tt/2pumyvG
http://ift.tt/2DJxRoH
Submitted March 21, 2018 at 07:57PM by mswilkison
via reddit http://ift.tt/2pumyvG
NuCypher
Unveiling Umbral
Threshold proxy re-encryption for scalable end-to-end encrypted data sharing
Google brings DDoS protection and other new security features to its cloud
http://ift.tt/2GfTWjY
Submitted March 21, 2018 at 08:59PM by volci
via reddit http://ift.tt/2FZTWl5
http://ift.tt/2GfTWjY
Submitted March 21, 2018 at 08:59PM by volci
via reddit http://ift.tt/2FZTWl5
TechCrunch
Google brings new security features to its cloud
For the longest time, enterprises worried about how secure their data would be in the cloud, and for some, that was a major roadblock for moving out of their own data centers. At this point, most m…
The Legitimisation of Have I Been Pwned
http://ift.tt/2II0fv6
Submitted March 21, 2018 at 08:59PM by volci
via reddit http://ift.tt/2FYbiyw
http://ift.tt/2II0fv6
Submitted March 21, 2018 at 08:59PM by volci
via reddit http://ift.tt/2FYbiyw
Troy Hunt
The Legitimisation of Have I Been Pwned
There's no way to sugar-coat this: Have I Been Pwned (HIBP) only exists due to a whole bunch of highly illegal activity that has harmed many individuals and organisations alike. That harm extends all the way from those in data breaches feeling a sense of…
A flaw in Ledger Crypto Wallets could allow to drain your cryptocurrency accounts. Fix it!
http://ift.tt/2pwB1XI
Submitted March 21, 2018 at 08:21PM by CasperVPN
via reddit http://ift.tt/2HSmz3W
http://ift.tt/2pwB1XI
Submitted March 21, 2018 at 08:21PM by CasperVPN
via reddit http://ift.tt/2HSmz3W
Security Affairs
A flaw in Ledger Crypto Wallets could allow to drain your cryptocurrency accounts. Fix it!
Saleem Rashid, a 15-year-old researcher from UK, has discovered a severe vulnerability in cryptocurrency hardware wallets made by the Ledger company.