Revealed: 8 most dangerous scams to watch for this year - and how to stay safe
http://ift.tt/2pumv34
Submitted March 21, 2018 at 02:56PM by ObjectiveNovel
via reddit http://ift.tt/2IGhWLQ
http://ift.tt/2pumv34
Submitted March 21, 2018 at 02:56PM by ObjectiveNovel
via reddit http://ift.tt/2IGhWLQ
mirror
Revealed: 8 most dangerous scams to watch for this year - and how to stay safe
The report by NatWest has warned that scammers will also try to cash in on those tying the knot this year on the back of the Royal wedding
Using Proxies for Instagram to help your Marketing efforts
http://ift.tt/2FWgYt2
Submitted March 21, 2018 at 02:55PM by Lime_proxies
via reddit http://ift.tt/2IChWfL
http://ift.tt/2FWgYt2
Submitted March 21, 2018 at 02:55PM by Lime_proxies
via reddit http://ift.tt/2IChWfL
Limeproxies
Using Proxies for Instagram to help your Marketing efforts
After seeing the popularity of Facebook I didn’t think that there would be any social media platform that could sustain the competition from Facebook. Of course, I was proved wrong by Instagram, a name that we all have surely heard of.
When Less is More in Cybersecurity
http://ift.tt/2GOZa4l
Submitted March 21, 2018 at 04:18PM by Uminekoshi
via reddit http://ift.tt/2DK2zy1
http://ift.tt/2GOZa4l
Submitted March 21, 2018 at 04:18PM by Uminekoshi
via reddit http://ift.tt/2DK2zy1
Nehemiah Security
When Less is More in Cybersecurity - Nehemiah Security
Don’t have time to read? Start listening to this blog post now: I am convinced any business leader who strives to optimize an operation has heard the cliché, “Less is more!” While cybersecurity professionals have certainly heard the expression, their reality…
Blacklist to block facebook
http://ift.tt/27WoQ6X
Submitted March 21, 2018 at 03:57PM by matoas7
via reddit http://ift.tt/2GNELwr
http://ift.tt/27WoQ6X
Submitted March 21, 2018 at 03:57PM by matoas7
via reddit http://ift.tt/2GNELwr
GitHub
jmdugan/blocklists
blocklists - Shared lists of problem domains people may want to block with hosts files
Utility to generate similar IDN domain names and block them at the email stage.
http://ift.tt/2FZZA6D
Submitted March 21, 2018 at 04:50PM by jekapats
via reddit http://ift.tt/2Gd0Syv
http://ift.tt/2FZZA6D
Submitted March 21, 2018 at 04:50PM by jekapats
via reddit http://ift.tt/2Gd0Syv
GitHub
phishai/idn_generator
idn_generator - Utility to generate similar IDN domain names
Cambridge Analytica Used ProtonMail to Hide Email Paper Trails
http://ift.tt/2pskYLk
Submitted March 21, 2018 at 05:51PM by CasperVPN
via reddit http://ift.tt/2FPEonQ
http://ift.tt/2pskYLk
Submitted March 21, 2018 at 05:51PM by CasperVPN
via reddit http://ift.tt/2FPEonQ
Infosecurity Magazine
Cambridge Analytica Used ProtonMail to Hide Email Paper Trails
ProtonMail now included in CA saga
Why Cyberattacks Happen and how to Stop it?
http://ift.tt/2HStuuf
Submitted March 21, 2018 at 05:39PM by cywarelabs12
via reddit http://ift.tt/2FTghVd
http://ift.tt/2HStuuf
Submitted March 21, 2018 at 05:39PM by cywarelabs12
via reddit http://ift.tt/2FTghVd
Cyware
Why Cyberattacks Happen and how to Stop it?
Cybercrime which was a rivulet some time back has quickly turned into a big river comprising myriad cyber crimes being reported. The reason being-- the rise of the internet at breakneck speed and organizations and companies using it for all their operations.…
Utility to generate similar IDN domain names and block them at the email stage.
http://ift.tt/2FZZA6D
Submitted March 21, 2018 at 04:40PM by jekapats
via reddit http://ift.tt/2GPyujJ
http://ift.tt/2FZZA6D
Submitted March 21, 2018 at 04:40PM by jekapats
via reddit http://ift.tt/2GPyujJ
GitHub
phishai/idn_generator
idn_generator - Utility to generate similar IDN domain names
The most absurd concept I've ever seen: Guns with a wifi connection.
http://ift.tt/2a5DuEA
Submitted March 21, 2018 at 06:41PM by iamcryptoki
via reddit http://ift.tt/2IFD8S3
http://ift.tt/2a5DuEA
Submitted March 21, 2018 at 06:41PM by iamcryptoki
via reddit http://ift.tt/2IFD8S3
WIRED
Hackers Can Disable a Sniper Rifle—Or Change Its Target
If a hacker attacks your TrackingPoint smart gun over its Wi-Fi connection, you may find the weapon is aiming at a different target than you think.
Security In 5: Episode 199 - The Top 5 Challenges Of Meeting GDPR
http://ift.tt/2G0FEAJ
Submitted March 21, 2018 at 06:34PM by BinaryBlog
via reddit http://ift.tt/2IFDacD
http://ift.tt/2G0FEAJ
Submitted March 21, 2018 at 06:34PM by BinaryBlog
via reddit http://ift.tt/2IFDacD
Libsyn
Security In Five Podcast: Episode 199 - The Top 5 Challenges Of Meeting GDPR
The General Data Protection Rule (GDPR) is the new privacy framework for the EU data starting in May, 2018. Many companies have been working toward compliance to these new laws but 50% won't make it. This episode talks about the five biggest challenges companies…
World’s Biggest Data Breaches & Hacks — Information is Beautiful
http://ift.tt/2FSca7O
Submitted March 21, 2018 at 07:06PM by cryptochild121
via reddit http://ift.tt/2FNyeEC
http://ift.tt/2FSca7O
Submitted March 21, 2018 at 07:06PM by cryptochild121
via reddit http://ift.tt/2FNyeEC
Information is Beautiful
World’s Biggest Data Breaches & Hacks — Information is Beautiful
Data visualization of the world biggest data breaches, leaks and hacks. Constantly updated. Powered by VizSweet.
AMD confirms CTS exploits, patches available in weeks
http://ift.tt/2u9G6uI
Submitted March 21, 2018 at 08:16PM by dfv157
via reddit http://ift.tt/2IFzF5V
http://ift.tt/2u9G6uI
Submitted March 21, 2018 at 08:16PM by dfv157
via reddit http://ift.tt/2IFzF5V
Amd
AMD Corporate: Initial AMD Technical Assessment... | Community
On March 12, 2018, AMD received a communication from CTS Labs regarding research into security vulnerabilities involving some AMD products. Less than 24
Umbral: Threshold proxy re-encryption for scalable end-to-end encrypted data sharing
http://ift.tt/2DJxRoH
Submitted March 21, 2018 at 07:57PM by mswilkison
via reddit http://ift.tt/2pumyvG
http://ift.tt/2DJxRoH
Submitted March 21, 2018 at 07:57PM by mswilkison
via reddit http://ift.tt/2pumyvG
NuCypher
Unveiling Umbral
Threshold proxy re-encryption for scalable end-to-end encrypted data sharing
Google brings DDoS protection and other new security features to its cloud
http://ift.tt/2GfTWjY
Submitted March 21, 2018 at 08:59PM by volci
via reddit http://ift.tt/2FZTWl5
http://ift.tt/2GfTWjY
Submitted March 21, 2018 at 08:59PM by volci
via reddit http://ift.tt/2FZTWl5
TechCrunch
Google brings new security features to its cloud
For the longest time, enterprises worried about how secure their data would be in the cloud, and for some, that was a major roadblock for moving out of their own data centers. At this point, most m…
The Legitimisation of Have I Been Pwned
http://ift.tt/2II0fv6
Submitted March 21, 2018 at 08:59PM by volci
via reddit http://ift.tt/2FYbiyw
http://ift.tt/2II0fv6
Submitted March 21, 2018 at 08:59PM by volci
via reddit http://ift.tt/2FYbiyw
Troy Hunt
The Legitimisation of Have I Been Pwned
There's no way to sugar-coat this: Have I Been Pwned (HIBP) only exists due to a whole bunch of highly illegal activity that has harmed many individuals and organisations alike. That harm extends all the way from those in data breaches feeling a sense of…
A flaw in Ledger Crypto Wallets could allow to drain your cryptocurrency accounts. Fix it!
http://ift.tt/2pwB1XI
Submitted March 21, 2018 at 08:21PM by CasperVPN
via reddit http://ift.tt/2HSmz3W
http://ift.tt/2pwB1XI
Submitted March 21, 2018 at 08:21PM by CasperVPN
via reddit http://ift.tt/2HSmz3W
Security Affairs
A flaw in Ledger Crypto Wallets could allow to drain your cryptocurrency accounts. Fix it!
Saleem Rashid, a 15-year-old researcher from UK, has discovered a severe vulnerability in cryptocurrency hardware wallets made by the Ledger company.
Tracking Users with CSS
http://ift.tt/2DJen3F
Submitted March 21, 2018 at 10:08PM by zinsi-
via reddit http://ift.tt/2FQfLaK
http://ift.tt/2DJen3F
Submitted March 21, 2018 at 10:08PM by zinsi-
via reddit http://ift.tt/2FQfLaK
Templarbit Inc.
Tracking Users with CSS
In early 2018, a physics student named Jan Böhmer created...
Kaspersky's 'Slingshot' report burned an ISIS-focused intelligence operation
http://ift.tt/2u7dv9u
Submitted March 21, 2018 at 09:38PM by campuscodi
via reddit http://ift.tt/2GP79hC
http://ift.tt/2u7dv9u
Submitted March 21, 2018 at 09:38PM by campuscodi
via reddit http://ift.tt/2GP79hC
Cyberscoop
Kaspersky's 'Slingshot' report burned an ISIS-focused intelligence operation
CyberScoop has learned that Kaspersky's 'Slingshot' is an active, U.S.-led counterterrorism cyber-espionage operation used to target ISIS and Al-Qaeda.
Windows Kernel Exploitation Tutorial Part 7: Uninitialized Heap Variable
http://ift.tt/2DInba3
Submitted March 21, 2018 at 10:57PM by TechLord2
via reddit http://ift.tt/2puy4I9
http://ift.tt/2DInba3
Submitted March 21, 2018 at 10:57PM by TechLord2
via reddit http://ift.tt/2puy4I9
rootkit
Windows Kernel Exploitation Tutorial Part 7: Uninitialized Heap Variable - rootkit
Overview In the previous part, we looked into an Uninitialized Stack Variable vulnerability. In this part, we’ll discuss about another vulnerability on similar lines, Uninitialized Heap Variable. We’d be grooming Paged Pool in this one, so as to direct our…
Windows Kernel Exploitation Tutorial Part 7: Uninitialized Heap Variable
http://ift.tt/2DInba3
Submitted March 21, 2018 at 10:57PM by TechLord2
via reddit http://ift.tt/2puy4I9
http://ift.tt/2DInba3
Submitted March 21, 2018 at 10:57PM by TechLord2
via reddit http://ift.tt/2puy4I9
rootkit
Windows Kernel Exploitation Tutorial Part 7: Uninitialized Heap Variable - rootkit
Overview In the previous part, we looked into an Uninitialized Stack Variable vulnerability. In this part, we’ll discuss about another vulnerability on similar lines, Uninitialized Heap Variable. We’d be grooming Paged Pool in this one, so as to direct our…
The AG of India defends the security of the national biometric database by saying that the data center has walls around the place :/
https://twitter.com/CNBCTV18News/status/976500202541522945
Submitted March 21, 2018 at 11:08PM by DisjointedHuntsville
via reddit http://ift.tt/2IIMhsP
https://twitter.com/CNBCTV18News/status/976500202541522945
Submitted March 21, 2018 at 11:08PM by DisjointedHuntsville
via reddit http://ift.tt/2IIMhsP
Twitter
CNBC-TV18
The Attorney General kicks off his defence of Aadhaar's security by saying the data centre is surrounded by walls that are 13 feet high and 5 feet thick. @AshmitTejKumar brings us more. https://t.co/pk9Q9oBMhD