Changing my Phone
I have an iPhone which I want to upgrade. Will my Google Authenticator app(Which have lot of my credentials) work with new phone or do I have to import my stored passwords from Authenticator app first before erasing my phone?
Submitted April 02, 2018 at 03:06PM by saqibcpe06
via reddit https://ift.tt/2GpID9L
I have an iPhone which I want to upgrade. Will my Google Authenticator app(Which have lot of my credentials) work with new phone or do I have to import my stored passwords from Authenticator app first before erasing my phone?
Submitted April 02, 2018 at 03:06PM by saqibcpe06
via reddit https://ift.tt/2GpID9L
reddit
Changing my Phone • r/security
I have an iPhone which I want to upgrade. Will my Google Authenticator app(Which have lot of my credentials) work with new phone or do I have to...
If the light is on
then the door is unlockedhttps://www.reddit.com/user/ApatheticSaiyan/
Submitted April 02, 2018 at 04:08PM by ApatheticSaiyan
via reddit https://ift.tt/2pZ4Sbx
then the door is unlockedhttps://www.reddit.com/user/ApatheticSaiyan/
Submitted April 02, 2018 at 04:08PM by ApatheticSaiyan
via reddit https://ift.tt/2pZ4Sbx
reddit
Takushi Eternal (u/ApatheticSaiyan) - Reddit
https://www.patreon.com/NateAndBry
Are other parts of physical memory accessed during a segfault ?
As part of a learning project, I've worked a bit on Spectre and Meltdown PoCs to get myself more confortable with the concept. I have managed to recover previously accessed data using the clock timers, but now I'm wondering how do they actually read physical memory from that point.Which leads to my question : in a lot of Spectre v1\v2 examples, you can read this piece of toy-code example:
Submitted April 02, 2018 at 05:37PM by thejuror8
via reddit https://ift.tt/2uFquj1
As part of a learning project, I've worked a bit on Spectre and Meltdown PoCs to get myself more confortable with the concept. I have managed to recover previously accessed data using the clock timers, but now I'm wondering how do they actually read physical memory from that point.Which leads to my question : in a lot of Spectre v1\v2 examples, you can read this piece of toy-code example:
if (x<y) { z = array[x]; } with x supposedly being equal to : attacked_adress - adress_of_array, which will effectively lead to z getting the value at attacked_adress.In the example it's quite easy to understand, but in reality how do they even know what attacked_adress looks like ? Is it a virtual address with an offset, or a physical address, and how do they manage to find where is the "important memory" located in the first place ?Submitted April 02, 2018 at 05:37PM by thejuror8
via reddit https://ift.tt/2uFquj1
reddit
Are other parts of physical memory accessed during a... • r/security
As part of a learning project, I've worked a bit on Spectre and Meltdown PoCs to get myself more confortable with the concept. I have managed to...
Security In 5: Episode 207 - Alexa Is Recording What You Say, Here Is How You Delete It
https://ift.tt/2GsB5n3
Submitted April 02, 2018 at 06:32PM by BinaryBlog
via reddit https://ift.tt/2Guz0Tw
https://ift.tt/2GsB5n3
Submitted April 02, 2018 at 06:32PM by BinaryBlog
via reddit https://ift.tt/2Guz0Tw
Libsyn
Security In Five Podcast: Episode 207 - Alexa Is Recording What You Say, Here Is How You Delete It
With the inclusion of all these home automation, personal assistants into our lives we are adding more ears listening. Each one of the devices have microphones listening, some when you don't think they are, and your voices, conversations and lives are uploaded…
Fauxpersky Keylogger masqueraded as Kaspersky Antivirus and spreads via USB drives
https://ift.tt/2J4o6Ft
Submitted April 02, 2018 at 08:27PM by Eliad-Cybereason
via reddit https://ift.tt/2H4X9km
https://ift.tt/2J4o6Ft
Submitted April 02, 2018 at 08:27PM by Eliad-Cybereason
via reddit https://ift.tt/2H4X9km
Cybereason
Fauxpersky: CredStealer malware written in AutoHotKey masquerades as Kaspersky Antivirus, spreading through infecting USB drives
Cybereason researchers discovered a credstealer written with AutoHotKey that masquerades as Kaspersky Antivirus and spreads through infected USB drives. We’ve named it Fauxpersky.
/r/netsec's Q2 2018 Information Security Hiring Thread
OverviewIf you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.Please reserve top level comments for those posting open positions.Rules & GuidelinesInclude the company name in the post. If you want to be topsykret, go recruit elsewhere.Include the geographic location of the position along with the availability of relocation assistance.If you are a third party recruiter, you must disclose this in your posting.Please be thorough and upfront with the position details.Use of non-hr'd (realistic) requirements is encouraged.While it's fine to link to the position on your companies website, provide the important details in the comment.Mention if applicants should apply officially through HR, or directly through you.Please clearly list citizenship, visa, and security clearance requirements.You can see an example of acceptable posts by perusing past hiring threads.FeedbackFeedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
Submitted April 02, 2018 at 07:52PM by ranok
via reddit https://ift.tt/2H1gaEl
OverviewIf you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.Please reserve top level comments for those posting open positions.Rules & GuidelinesInclude the company name in the post. If you want to be topsykret, go recruit elsewhere.Include the geographic location of the position along with the availability of relocation assistance.If you are a third party recruiter, you must disclose this in your posting.Please be thorough and upfront with the position details.Use of non-hr'd (realistic) requirements is encouraged.While it's fine to link to the position on your companies website, provide the important details in the comment.Mention if applicants should apply officially through HR, or directly through you.Please clearly list citizenship, visa, and security clearance requirements.You can see an example of acceptable posts by perusing past hiring threads.FeedbackFeedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
Submitted April 02, 2018 at 07:52PM by ranok
via reddit https://ift.tt/2H1gaEl
Cracking Cisco’s Sourcefire licensing system
https://ift.tt/2uBdevy
Submitted April 02, 2018 at 07:37PM by j-sevilleja
via reddit https://ift.tt/2GrR4RZ
https://ift.tt/2uBdevy
Submitted April 02, 2018 at 07:37PM by j-sevilleja
via reddit https://ift.tt/2GrR4RZ
hcn
Cracking Cisco’s Sourcefire licensing system
Free the Kraken!
Docker Portable Attack Suite
https://ift.tt/2pV6nso
Submitted April 02, 2018 at 07:26PM by ZephrX112
via reddit https://ift.tt/2IlX0Zk
https://ift.tt/2pV6nso
Submitted April 02, 2018 at 07:26PM by ZephrX112
via reddit https://ift.tt/2IlX0Zk
ZeroSec - Adventures In Information Security
LTR101 - Disposable Attack Containers (DAC)
My take on using docker for disposable attack images, basically leveraging docker images for Bug Bounties & Pentesting.
Georgia Senate Passes Bill That Criminalizes Unauthorized Pen-Tests
https://ift.tt/2IjzNXL
Submitted April 02, 2018 at 09:09PM by zexterio
via reddit https://ift.tt/2H3S4c8
https://ift.tt/2IjzNXL
Submitted April 02, 2018 at 09:09PM by zexterio
via reddit https://ift.tt/2H3S4c8
BleepingComputer
Georgia Senate Passes Bill That Criminalizes Unauthorized Pen-Tests
A bill was passed yesterday by the state of Georgia that causes any unauthorized access to a computer to be considered "Unauthorized Computer Access" & "shall be punished for a misdemeanor of a high and aggravated nature". This bill amends the Georgia code…
Here’s an idea.
A monthly paid suite/ecosystem of secure social networking apps
Submitted April 02, 2018 at 10:10PM by kendalpercimoney
via reddit https://ift.tt/2ImkRYS
A monthly paid suite/ecosystem of secure social networking apps
Submitted April 02, 2018 at 10:10PM by kendalpercimoney
via reddit https://ift.tt/2ImkRYS
reddit
Here’s an idea. • r/security
A monthly paid suite/ecosystem of secure social networking apps
Managing open-source vulnerabilities for C projects
https://scantist.io
Submitted April 02, 2018 at 02:09PM by scantist
via reddit https://ift.tt/2Gsn6O1
https://scantist.io
Submitted April 02, 2018 at 02:09PM by scantist
via reddit https://ift.tt/2Gsn6O1
This small robot lures hackers away from other robots
https://ift.tt/2GtvRr6
Submitted April 02, 2018 at 10:40PM by TommyAdagio
via reddit https://ift.tt/2H2FWbi
https://ift.tt/2GtvRr6
Submitted April 02, 2018 at 10:40PM by TommyAdagio
via reddit https://ift.tt/2H2FWbi
ZDNet
This small robot lures hackers away from other robots
Created by researchers at Georgia Tech, HoneyBot was inspired by IT security.
Saks and Lord and Taylor hit by credit card theft. 5m cards for sale on dark web.
https://ift.tt/2H2dt5v
Submitted April 02, 2018 at 10:37PM by DrGrinch
via reddit https://ift.tt/2H5J5r0
https://ift.tt/2H2dt5v
Submitted April 02, 2018 at 10:37PM by DrGrinch
via reddit https://ift.tt/2H5J5r0
Financial Post
These 3 Saks stores in Canada were exposed to the data breach that hit Hudson's Bay Co.
Gemini Advisory LLC says three Canadian Saks locations were exposed to the breach
Rate email address exposure from 1 - 10
There is now an analysis of pwned data to help see your relative personal data exposure. See what data may be exposed and more. Inoitsu.com
Submitted April 02, 2018 at 11:57PM by inoitsu
via reddit https://ift.tt/2Gr1xx2
There is now an analysis of pwned data to help see your relative personal data exposure. See what data may be exposed and more. Inoitsu.com
Submitted April 02, 2018 at 11:57PM by inoitsu
via reddit https://ift.tt/2Gr1xx2
reddit
Rate email address exposure from 1 - 10 • r/security
There is now an analysis of pwned data to help see your relative personal data exposure. See what data may be exposed and more. Inoitsu.com
Debunking Common GDPR Myths
https://ift.tt/2Isjby2
Submitted April 02, 2018 at 11:18PM by volci
via reddit https://ift.tt/2JfEuDq
https://ift.tt/2Isjby2
Submitted April 02, 2018 at 11:18PM by volci
via reddit https://ift.tt/2JfEuDq
Secureworks
Debunking Common GDPR Myths
Many impacted organisations remain unprepared for – and even unaware of GDPR, and to help mitigate risks of noncompliance, it’s critical to understand the realities of the new data protection laws.
Rate Email Address Data Breach Exposure from 1-10
https://www.inoitsu.com
Submitted April 03, 2018 at 12:43AM by inoitsu
via reddit https://ift.tt/2H34z7P
https://www.inoitsu.com
Submitted April 03, 2018 at 12:43AM by inoitsu
via reddit https://ift.tt/2H34z7P
HIMMS Survey: State of cyber security in health care 2018
https://ift.tt/2IkEeli
Submitted April 03, 2018 at 01:07AM by zinsi-
via reddit https://ift.tt/2Ee2O4w
https://ift.tt/2IkEeli
Submitted April 03, 2018 at 01:07AM by zinsi-
via reddit https://ift.tt/2Ee2O4w
Templarbit Inc.
HIMMS Survey: State of cyber security in health care 2018
Each year, HIMSS (Healthcare Information and Management Systems...
Introduction to USB Detective
https://ift.tt/2H62CHQ
Submitted April 03, 2018 at 01:39AM by 13Cubed
via reddit https://ift.tt/2ImU3aR
https://ift.tt/2H62CHQ
Submitted April 03, 2018 at 01:39AM by 13Cubed
via reddit https://ift.tt/2ImU3aR
BREACH ALERT: 5 million payment cards stolen from Saks, Lord & Taylor stores
https://ift.tt/2Imsbnh
Submitted April 03, 2018 at 02:16AM by moonjeff
via reddit https://ift.tt/2Jbxvvf
https://ift.tt/2Imsbnh
Submitted April 03, 2018 at 02:16AM by moonjeff
via reddit https://ift.tt/2Jbxvvf
THE DARK SIDE OF THE MOON
BREACH ALERT: 5 million payment cards stolen from Saks, Lord & Taylor stores
Over the weekend a major credit card theft was reported involving Saks 5 Avenue and Lord & Taylor stores. The hacker group JokerFlash has started marketing for sale large bundles of this data…
Web-enabled devices raise cyber risk fears
https://ift.tt/2H8TQsI
Submitted April 03, 2018 at 02:06AM by Iot_Security
via reddit https://ift.tt/2uFQb33
https://ift.tt/2H8TQsI
Submitted April 03, 2018 at 02:06AM by Iot_Security
via reddit https://ift.tt/2uFQb33
Risk.net
Web-enabled devices raise cyber risk fears - Risk.net
OpRisk North America: banks wary of growth in ‘internet of things’
NSAFE - Free DNS for Security plus Web Filtering - 35.198.131.255 (x-post /r/dns)
https://nsafe.io
Submitted April 03, 2018 at 04:18AM by TruthSeekerWW
via reddit https://ift.tt/2JbiZmW
https://nsafe.io
Submitted April 03, 2018 at 04:18AM by TruthSeekerWW
via reddit https://ift.tt/2JbiZmW