New to this sub, any physical security installers or engineers hang out here?
I work for a security integrator and I enjoy talking security, answering and asking questions and sharing ideas. Its how we get better. I was thinking about a solution tonight and I wondered if Reddit had a sub for this so I'm here.
Submitted April 06, 2018 at 07:19AM by Megaseth
via reddit https://ift.tt/2HbVklK
I work for a security integrator and I enjoy talking security, answering and asking questions and sharing ideas. Its how we get better. I was thinking about a solution tonight and I wondered if Reddit had a sub for this so I'm here.
Submitted April 06, 2018 at 07:19AM by Megaseth
via reddit https://ift.tt/2HbVklK
reddit
New to this sub, any physical security installers or... • r/security
I work for a security integrator and I enjoy talking security, answering and asking questions and sharing ideas. Its how we get better. I was...
Bootable & Encrypted Win7/10 USB drive?
I need to create a bootable Win7 or Win10 on an encrypted USB flash drive. I understand/expect the bootloader on the USB would have to remain unencrypted, but the rest of it, hopefully, would be encrypted. Is there a way to do this? Thanks!
Submitted April 06, 2018 at 09:37AM by zot2007
via reddit https://ift.tt/2qbkUPI
I need to create a bootable Win7 or Win10 on an encrypted USB flash drive. I understand/expect the bootloader on the USB would have to remain unencrypted, but the rest of it, hopefully, would be encrypted. Is there a way to do this? Thanks!
Submitted April 06, 2018 at 09:37AM by zot2007
via reddit https://ift.tt/2qbkUPI
reddit
Bootable & Encrypted Win7/10 USB drive? • r/security
I need to create a bootable Win7 or Win10 on an encrypted USB flash drive. I understand/expect the bootloader on the USB would have to remain...
8 Important Tips to Fight Against CyberBullying
https://ift.tt/2HhFdU0
Submitted April 06, 2018 at 10:45AM by JohnnyDoran
via reddit https://ift.tt/2GD6TFT
https://ift.tt/2HhFdU0
Submitted April 06, 2018 at 10:45AM by JohnnyDoran
via reddit https://ift.tt/2GD6TFT
The Next Scoop
8 Important Tips to Fight Against CyberBullying - The Next Scoop
Whenever we talk about data security – the first thing, which comes to our minds, is the protection of our data and all the important information that our website possess. With this note, we all know that we are living in the world of digitization and almost…
Week 14 in Information Security, 2018
https://ift.tt/2GBpRMV
Submitted April 06, 2018 at 11:30AM by undercomm
via reddit https://ift.tt/2q8Kl4H
https://ift.tt/2GBpRMV
Submitted April 06, 2018 at 11:30AM by undercomm
via reddit https://ift.tt/2q8Kl4H
Malgregator
InfoSec Week 14, 2018
There is a critical flaw in Microsoft Malware Protection Engine (CVE-2018-0986). They have used the open source unrar code, changed all...
Introducing FindSubDomains, a new subdomain enumeration and information gathering tool
https://ift.tt/2HdtQwa
Submitted April 06, 2018 at 01:16PM by xrna
via reddit https://ift.tt/2GGyvpz
https://ift.tt/2HdtQwa
Submitted April 06, 2018 at 01:16PM by xrna
via reddit https://ift.tt/2GGyvpz
Github users make commits with sensitive data!
https://ift.tt/2GU4xSj
Submitted April 06, 2018 at 02:17PM by maratmkhitaryan
via reddit https://ift.tt/2Jlo5x0
https://ift.tt/2GU4xSj
Submitted April 06, 2018 at 02:17PM by maratmkhitaryan
via reddit https://ift.tt/2Jlo5x0
Livejournal
Тупые Django юзеры + Github = халявные аккаунты почты
В Django есть файл setting.py, который отвечает за настройки разных вещей, в нашем случае интерес представляет конфигурация SMTP, вот его пример: EMAIL_HOST_USER = "vasya@pypkin.ru" EMAIL_HOST_PASSWORD = "qwerty" В Github можно искать просто искать EMAIL_HOST_PASSWORD…
On-site Request Forgery
https://ift.tt/2uW594K
Submitted April 06, 2018 at 02:04PM by 1lastBr3ath
via reddit https://ift.tt/2GGFFKa
https://ift.tt/2uW594K
Submitted April 06, 2018 at 02:04PM by 1lastBr3ath
via reddit https://ift.tt/2GGFFKa
Charles Proxy Tutorial for iOS
https://ift.tt/2pOx3wu
Submitted April 06, 2018 at 03:31PM by maratmkhitaryan
via reddit https://ift.tt/2qdKDqG
https://ift.tt/2pOx3wu
Submitted April 06, 2018 at 03:31PM by maratmkhitaryan
via reddit https://ift.tt/2qdKDqG
Ray Wenderlich
Charles Proxy Tutorial for iOS
Learn how to intercept, inspect, and modify network requests with Charles Proxy to debug your iOS networking code or to take a peek inside other apps!
Rabobank, IBM aim to use cryptographic pseudonyms for GDPR
https://ift.tt/2HbNQPU
Submitted April 06, 2018 at 03:59PM by ga-vu
via reddit https://ift.tt/2HdJcki
https://ift.tt/2HbNQPU
Submitted April 06, 2018 at 03:59PM by ga-vu
via reddit https://ift.tt/2HdJcki
ZDNet
Rabobank, IBM aim to use cryptographic pseudonyms for GDPR | ZDNet
With IBM Research, Rabobank has come up with an interesting twist to GDPR compliance.
Students using university and college networks to mine cryptocurrency
https://ift.tt/2JqQxOk
Submitted April 06, 2018 at 04:44PM by hightechbridge
via reddit https://ift.tt/2GZ1sQF
https://ift.tt/2JqQxOk
Submitted April 06, 2018 at 04:44PM by hightechbridge
via reddit https://ift.tt/2GZ1sQF
Htbridge
CryptoJacking Threat to Universities Grows
New report finds that education sector being hit hardest by cryptojacking malware, meanwhile one million sites face Drupal flaw...
Delta Airlines infected with malware; customer data stolen
https://ift.tt/2Jq3cB8
Submitted April 06, 2018 at 06:50PM by moonjeff
via reddit https://ift.tt/2GGnvYY
https://ift.tt/2Jq3cB8
Submitted April 06, 2018 at 06:50PM by moonjeff
via reddit https://ift.tt/2GGnvYY
THE DARK SIDE OF THE MOON
BREACH ALERT: Delta Air Lines Customer Credit Card Data Compromised
Delta sent a notice to all of their customers that their customer service system had been compromised between 9/26/2017 and 10/12/2017. The company states that a specific malware (virus) was activ…
Security In 5: Episode 211 - Tools, Tips and Tricks - HTTPS Everywhere
https://ift.tt/2Jph7av
Submitted April 06, 2018 at 06:39PM by BinaryBlog
via reddit https://ift.tt/2EqeK3h
https://ift.tt/2Jph7av
Submitted April 06, 2018 at 06:39PM by BinaryBlog
via reddit https://ift.tt/2EqeK3h
Libsyn
Security In Five Podcast: Episode 211 - Tools, Tips and Tricks - HTTPS Everywhere
If you browse the Internet you should always use HTTPS when visiting websites, especially those that support it. It can be a manual effort and every website doesn't apply HTTPS equally all the time. That's where the browser plugin HTTPS Everywhere comes in. …
CMS Detection and Exploit Kit based on Whatcms.org API
https://ift.tt/2q9M2iX
Submitted April 06, 2018 at 06:23PM by BISH4
via reddit https://ift.tt/2HitGUs
https://ift.tt/2q9M2iX
Submitted April 06, 2018 at 06:23PM by BISH4
via reddit https://ift.tt/2HitGUs
GitHub
HA71/WhatCMS
WhatCMS - CMS Detection and Exploit Kit based on Whatcms.org API
DCShadow - Minimal permissions, Active Directory Deception, Shadowception and more
https://ift.tt/2qaTLwp
Submitted April 06, 2018 at 07:26PM by SamratAsh0k
via reddit https://ift.tt/2H4RRbn
https://ift.tt/2qaTLwp
Submitted April 06, 2018 at 07:26PM by SamratAsh0k
via reddit https://ift.tt/2H4RRbn
Labofapenetrationtester
DCShadow - Minimal permissions, Active Directory Deception, Shadowception and more
Home of Nikhil SamratAshok Mittal. Posts about Red Teaming, Offensive PowerShell, Active Directory and Pen Testing.
Azure passwords are still at risk; Infection Monkey can help
https://ift.tt/2EpybJM
Submitted April 06, 2018 at 07:11PM by ofriziv
via reddit https://ift.tt/2GIDGF9
https://ift.tt/2EpybJM
Submitted April 06, 2018 at 07:11PM by ofriziv
via reddit https://ift.tt/2GIDGF9
GuardiCore - Data Center and Cloud Security
Azure passwords are still at risk; Infection Monkey can help | GuardiCore
The Infection Monkey can notify about any machine that stores recoverable plaintext credentials on its Azure VM disk and expose bad credentials hygiene.
Domain Recon : A tool to get the details about all the subdomains and screenshots of them.
https://ift.tt/2Hd8U8r
Submitted April 06, 2018 at 07:04PM by Oxf0xtr0t
via reddit https://ift.tt/2qb52Nc
https://ift.tt/2Hd8U8r
Submitted April 06, 2018 at 07:04PM by Oxf0xtr0t
via reddit https://ift.tt/2qb52Nc
GitHub
x73x61x6ex6ax61x79/DomainRecon
Contribute to DomainRecon development by creating an account on GitHub.
How safe is voice-recognition authentication used in telephone customer service?
I may be late on this topic, but I've noticed the trend of call-center customer service departments now offering the new security measure where your voice will be used to authenticate you. Some questions:Should one accept to be authenticated with this technology?How easily can this technology be defeated?If someone gains access to a high-quality recording of your voice, can they use it to defeat the system? Scammers could call people and record the phone-conversation to gain access to such a recording. Couldn't they then use software to identify the voice signature and then use some other clever way to "translate" their own voice into the voice signature?
Submitted April 06, 2018 at 08:28PM by dlebauche
via reddit https://ift.tt/2JmrKuu
I may be late on this topic, but I've noticed the trend of call-center customer service departments now offering the new security measure where your voice will be used to authenticate you. Some questions:Should one accept to be authenticated with this technology?How easily can this technology be defeated?If someone gains access to a high-quality recording of your voice, can they use it to defeat the system? Scammers could call people and record the phone-conversation to gain access to such a recording. Couldn't they then use software to identify the voice signature and then use some other clever way to "translate" their own voice into the voice signature?
Submitted April 06, 2018 at 08:28PM by dlebauche
via reddit https://ift.tt/2JmrKuu
reddit
How safe is voice-recognition authentication used in... • r/security
I may be late on this topic, but I've noticed the trend of call-center customer service departments now offering the new security measure where...
Seriously, I love this new tool - Do you know what types of files your mail servers are blocking?
https://ift.tt/2JokYEC
Submitted April 06, 2018 at 09:15PM by MadSecuritySquirrel
via reddit https://ift.tt/2Eqh3Du
https://ift.tt/2JokYEC
Submitted April 06, 2018 at 09:15PM by MadSecuritySquirrel
via reddit https://ift.tt/2Eqh3Du
The Mad Squ1rrel
Do you know what types of files your mail servers are blocking? Here's a free tool to help | | The Mad Squ1rrel
I'll start by saying that I don't think I have ever written a blog post about one of our free tools here at KnowBe4. It's not that I don't like the other tools or think that they lack usefulness (quite the opposite actually), it's just that this new one really…
Because when you get hit with ransomware, you really do want to read poetry o_O
https://ift.tt/2EsUzC8
Submitted April 06, 2018 at 09:12PM by MadSecuritySquirrel
via reddit https://ift.tt/2Jp5Wyk
https://ift.tt/2EsUzC8
Submitted April 06, 2018 at 09:12PM by MadSecuritySquirrel
via reddit https://ift.tt/2Jp5Wyk
TechRepublic
WhiteRose ransomware attack sends bizarre poetry in ransom note to victims
The attack is similar to the Black Ruby, Zenis, and HiddenTear / InfiniteTear ransomware variants and seems to utilize unsecured Remote Desktop services.
Shout out to Malwarebytes for this: LockCrypt Ransomware Cracked Due to Bad Crypto
https://ift.tt/2GAKZCN
Submitted April 06, 2018 at 09:11PM by MadSecuritySquirrel
via reddit https://ift.tt/2Eqh4Y4
https://ift.tt/2GAKZCN
Submitted April 06, 2018 at 09:11PM by MadSecuritySquirrel
via reddit https://ift.tt/2Eqh4Y4
BleepingComputer
LockCrypt Ransomware Cracked Due to Bad Crypto
The team at Malwarebytes has identified a weakness in the encryption scheme utilized by the LockCrypt ransomware that they can exploit to recover a victim's data.
Compromising ShareFile on-premise via 7 chained vulnerabilities
https://ift.tt/2GUY49J
Submitted April 06, 2018 at 09:44PM by dirkjanm
via reddit https://ift.tt/2EpUsqS
https://ift.tt/2GUY49J
Submitted April 06, 2018 at 09:44PM by dirkjanm
via reddit https://ift.tt/2EpUsqS
Fox-IT International blog
Compromising ShareFile on-premise via 7 chained vulnerabilities
A while ago we investigated a setup of Citrix ShareFile with an on-premise StorageZone controller. ShareFile is a file sync and sharing solution aimed at enterprises. While there are versions of Sh…