My computer was used in sleep mode
(I hoping this is the correct subreddit for this, if not I do apologize, and I'd like to know where I should ask this instead.)I left my laptop (a Surface Pro 4, if that helps) in sleep mode all last night and this morning, leaving only Microsoft Edge and Krita (drawing program) open. I only had Reddit and a YouTube video open on Edge, and a quick sketch open on Krita. When I pulled up my laptop just now, I had three YouTube videos and a page to download an ebook open on Edge and my drawing had been tampered with. The YouTube videos and ebook were from an MLM scheme, and the canvas was zoomed into another part of the image and the line tool and selection tools had been used (and I never use the line tool myself).I checked the browser history and the tabs were opened last night between 11:30pm and midnight, when my husband and I were watching a movie and the laptop was in sleep mode in the other room (and we are the only people that live in our residence). Has anyone heard of this happening? As far as I can tell, none of my accounts were tampered with and nothing was downloaded, but is there any way I can be sure? I have the laptop off for the time being.Thank you in advance for your help!
Submitted April 08, 2018 at 04:36AM by racecarart
via reddit https://ift.tt/2qgvnJJ
(I hoping this is the correct subreddit for this, if not I do apologize, and I'd like to know where I should ask this instead.)I left my laptop (a Surface Pro 4, if that helps) in sleep mode all last night and this morning, leaving only Microsoft Edge and Krita (drawing program) open. I only had Reddit and a YouTube video open on Edge, and a quick sketch open on Krita. When I pulled up my laptop just now, I had three YouTube videos and a page to download an ebook open on Edge and my drawing had been tampered with. The YouTube videos and ebook were from an MLM scheme, and the canvas was zoomed into another part of the image and the line tool and selection tools had been used (and I never use the line tool myself).I checked the browser history and the tabs were opened last night between 11:30pm and midnight, when my husband and I were watching a movie and the laptop was in sleep mode in the other room (and we are the only people that live in our residence). Has anyone heard of this happening? As far as I can tell, none of my accounts were tampered with and nothing was downloaded, but is there any way I can be sure? I have the laptop off for the time being.Thank you in advance for your help!
Submitted April 08, 2018 at 04:36AM by racecarart
via reddit https://ift.tt/2qgvnJJ
reddit
My computer was used in sleep mode • r/security
(I hoping this is the correct subreddit for this, if not I do apologize, and I'd like to know where I should ask this instead.) I left my laptop...
Did I just fuck up?
trying to pirate a windows iso, got lead to,http://windowsiso.net/windows-7-iso/windows-7-download/ultimate-iso-7/which let me select which service pack THEN re-directed me tohttps://login.microsoftonline.com/common/oauth2/authorize?client_id=499b84ac-1321-427f-aa17-267ca6975798&site_id=501446&response_mode=form_post&response_type=code+id_token&redirect_uri=https%3A%2F%2Fapp.vssps.visualstudio.com%2F_signedin&nonce=85a3a5f0-bfc6-4c42-b89d-723ece8b422d&state=realm%3Dapp.vssps.visualstudio.com%26allow_passthrough%3DTrue%26reply_to%3Dhttps%253A%252F%252Fmy.visualstudio.com%253A443%252F%253Fwt.mc_id%253Do%25257emsft%25257emsdn%25257eoldPortal%2526utm_source%253DMSDNPortal%2526auth_redirect%253Dtrue%26nonce%3D85a3a5f0-bfc6-4c42-b89d-723ece8b422d&resource=https%3A%2F%2Fmanagement.core.windows.net%2F&cid=85a3a5f0-bfc6-4c42-b89d-723ece8b422d&wsucxt=1&prompt=select_account#FileId=46948AND I TRIED SIGNING IN....WHAT DO I DO FROM HERE?, THINKING I JUST GOT PHISHED.
Submitted April 08, 2018 at 07:27AM by Hence4thtranscends
via reddit https://ift.tt/2JuOOHs
trying to pirate a windows iso, got lead to,http://windowsiso.net/windows-7-iso/windows-7-download/ultimate-iso-7/which let me select which service pack THEN re-directed me tohttps://login.microsoftonline.com/common/oauth2/authorize?client_id=499b84ac-1321-427f-aa17-267ca6975798&site_id=501446&response_mode=form_post&response_type=code+id_token&redirect_uri=https%3A%2F%2Fapp.vssps.visualstudio.com%2F_signedin&nonce=85a3a5f0-bfc6-4c42-b89d-723ece8b422d&state=realm%3Dapp.vssps.visualstudio.com%26allow_passthrough%3DTrue%26reply_to%3Dhttps%253A%252F%252Fmy.visualstudio.com%253A443%252F%253Fwt.mc_id%253Do%25257emsft%25257emsdn%25257eoldPortal%2526utm_source%253DMSDNPortal%2526auth_redirect%253Dtrue%26nonce%3D85a3a5f0-bfc6-4c42-b89d-723ece8b422d&resource=https%3A%2F%2Fmanagement.core.windows.net%2F&cid=85a3a5f0-bfc6-4c42-b89d-723ece8b422d&wsucxt=1&prompt=select_account#FileId=46948AND I TRIED SIGNING IN....WHAT DO I DO FROM HERE?, THINKING I JUST GOT PHISHED.
Submitted April 08, 2018 at 07:27AM by Hence4thtranscends
via reddit https://ift.tt/2JuOOHs
YNAB Direct Import provider has trouble with | ~ < > in passwords?
I've been considering using Mint or YNAB (You Need a Budget). Financial software that synchronizes my account transactions would be really nice. But the fact that they need to store your online banking credentials makes me really nervous.So I was looking into YNAB's Direct Import provider and found this: https://docs.youneedabudget.com/article/142-direct-import-troubleshootingRight now, our Direct Import partners are unable to support passwords that contain a pipe “|”, tilde “~”, or angle bracket "< or >". If you update your password to remove those characters, you should be able to connect.This seems like a huge red flag. Sounds like the password string is being interpreted in some way, which I can't see any reason for.Can anyone think of a legitimate reason for the restriction?
Submitted April 08, 2018 at 07:19AM by RestlessNeurons
via reddit https://ift.tt/2IBXOcV
I've been considering using Mint or YNAB (You Need a Budget). Financial software that synchronizes my account transactions would be really nice. But the fact that they need to store your online banking credentials makes me really nervous.So I was looking into YNAB's Direct Import provider and found this: https://docs.youneedabudget.com/article/142-direct-import-troubleshootingRight now, our Direct Import partners are unable to support passwords that contain a pipe “|”, tilde “~”, or angle bracket "< or >". If you update your password to remove those characters, you should be able to connect.This seems like a huge red flag. Sounds like the password string is being interpreted in some way, which I can't see any reason for.Can anyone think of a legitimate reason for the restriction?
Submitted April 08, 2018 at 07:19AM by RestlessNeurons
via reddit https://ift.tt/2IBXOcV
Youneedabudget
Direct Import Troubleshooting - YNAB Help
Direct Import is amazing. But there are quite a few moving parts, and sometimes they need an adjustment.
In This Article
<
In This Article
<
Project Insecurity - New Infosec/Hacking/Bugbounty Forum Board and Security Research team.
https://ift.tt/2qgm2Sm
Submitted April 08, 2018 at 10:27AM by _MLT_
via reddit https://ift.tt/2HgZklc
https://ift.tt/2qgm2Sm
Submitted April 08, 2018 at 10:27AM by _MLT_
via reddit https://ift.tt/2HgZklc
forum.insecurity.sh
Project Insecurity
Project Insecurity - Security is an illusion
OPCDE 2018 Cyber Security Conference Material [PDF] - (See Comment for Content list)
https://ift.tt/2qg2nC6
Submitted April 08, 2018 at 11:45AM by TechLord2
via reddit https://ift.tt/2uT8jGL
https://ift.tt/2qg2nC6
Submitted April 08, 2018 at 11:45AM by TechLord2
via reddit https://ift.tt/2uT8jGL
GitHub
comaeio/OPCDE
OPCDE DXB 2017 + 2018 Materials
Windows Microsoft Office 2007 Security Question
I've been using Office 2007 for 10 years and am just fine with it. However, now that Microsoft is no longer supporting it, I am wondering if I am secure by merely using Malwarebytes and Bitdefender as there obviously will be no more security patches for Office 2007. Most important is protection for any crypto asset tasks that I need to do. I usually use Trezor or Ledger Nano S, but I'll have to register EOS soon and later probably Bytom, thus potentially exposing my private keys. I hate to stop using Office 2007 and fork out the money for the newest version, but protecting my precious crypto is the most important issue concerning my PC.
Submitted April 08, 2018 at 04:28PM by PunkIsBunk
via reddit https://ift.tt/2uSrtMY
I've been using Office 2007 for 10 years and am just fine with it. However, now that Microsoft is no longer supporting it, I am wondering if I am secure by merely using Malwarebytes and Bitdefender as there obviously will be no more security patches for Office 2007. Most important is protection for any crypto asset tasks that I need to do. I usually use Trezor or Ledger Nano S, but I'll have to register EOS soon and later probably Bytom, thus potentially exposing my private keys. I hate to stop using Office 2007 and fork out the money for the newest version, but protecting my precious crypto is the most important issue concerning my PC.
Submitted April 08, 2018 at 04:28PM by PunkIsBunk
via reddit https://ift.tt/2uSrtMY
reddit
Windows Microsoft Office 2007 Security Question • r/security
I've been using Office 2007 for 10 years and am just fine with it. However, now that Microsoft is no longer supporting it, I am wondering if I am...
INTERIOR INCIDENT RESPONSE PROGRAM CALLS FOR IMPROVEMENT
https://ift.tt/2EuE5ZT
Submitted April 08, 2018 at 06:09PM by Mufassa810
via reddit https://ift.tt/2IADKY7
https://ift.tt/2EuE5ZT
Submitted April 08, 2018 at 06:09PM by Mufassa810
via reddit https://ift.tt/2IADKY7
DomLink - Automating Associated Domain Discovery
https://ift.tt/2GHMUBE
Submitted April 08, 2018 at 07:05PM by vysec
via reddit https://ift.tt/2GLIycG
https://ift.tt/2GHMUBE
Submitted April 08, 2018 at 07:05PM by vysec
via reddit https://ift.tt/2GLIycG
Medium
DomLink — Automating domain discovery
TLDR: Give DomLink a domain, it’ll go and find associated organization and e-mail registered then use this information to perform reverse…
Free Web Application Security Training. 5 Hours of Workshops Covering OWASP TOP 10 In Polish
https://ift.tt/2qhfgfb
Submitted April 08, 2018 at 07:43PM by dbalut
via reddit https://ift.tt/2GFZfdL
https://ift.tt/2qhfgfb
Submitted April 08, 2018 at 07:43PM by dbalut
via reddit https://ift.tt/2GFZfdL
Peerlyst
Free Web Application Security Training. 5 Hours of WorkShops Covering OWASP TOP 10 In Polish
I've created a 5h 17m long online training for polish software engineers, testers and pretty much anyone that wants to learn web application security.There are practical examples and I've tried to explain everything in such a way that anyone working
Snort Rule to Detect Slow Loris Attack
Hi All,Looking for a bit of help here...As part of my uni course I need to select an attack then develop a Snort rule to detect it and show it in action. I found a Python implementation of the Slowloris attack, which I ran and analyzed. I found a common theme of the attack is the partial GET headers always contained the text 'X-a:' followed by four random digits. I wrote the following rule utilizing regular expressions (I believed this would cut down on false positives):alert tcp any any -> any 80 (msg:"Possible Slowloris Attack Detected"; \ flow:to_server,established; pcre:"/X-a|3a| \d{4}../"; sid:10000005;)which detects the attack successfully with minimal false positives.My question is how I could improve upon the rule, or even if there is a better rule altogether. I understand it's not the best method of detecting the attack, as the 'X-a' in the Python noscript could easily be changed to something altogether (I think).Thanks in advance for any advice.
Submitted April 08, 2018 at 08:42PM by dinosaurdave88
via reddit https://ift.tt/2GLpYS4
Hi All,Looking for a bit of help here...As part of my uni course I need to select an attack then develop a Snort rule to detect it and show it in action. I found a Python implementation of the Slowloris attack, which I ran and analyzed. I found a common theme of the attack is the partial GET headers always contained the text 'X-a:' followed by four random digits. I wrote the following rule utilizing regular expressions (I believed this would cut down on false positives):alert tcp any any -> any 80 (msg:"Possible Slowloris Attack Detected"; \ flow:to_server,established; pcre:"/X-a|3a| \d{4}../"; sid:10000005;)which detects the attack successfully with minimal false positives.My question is how I could improve upon the rule, or even if there is a better rule altogether. I understand it's not the best method of detecting the attack, as the 'X-a' in the Python noscript could easily be changed to something altogether (I think).Thanks in advance for any advice.
Submitted April 08, 2018 at 08:42PM by dinosaurdave88
via reddit https://ift.tt/2GLpYS4
reddit
Snort Rule to Detect Slow Loris Attack • r/security
Hi All, Looking for a bit of help here... As part of my uni course I need to select an attack then develop a Snort rule to detect it and show it...
Help: Weird Spamming/Phishing Pattern
This morning I saw a flood of email in my gmail inbox that looked like spam. It was all addressed to Sheila in the email body. Most was health insurance related. However, one like was to a Rewardbee account that was setup using my email. Rewardbee looks legit, and I requested a password change. I then entered a new password, but one I’ve never used anywhere.After logging in, it looked like whoever it was did some surveys for discounts on magazines. On another health insurance email, I clicked unsubscribe like a dummy and was sent to some fake unsubscribe page. I closed the window and rebooted my Mac.I’ve run MalwareBytes and BitDefender. Both find nothing.However after a steady stream of spam/phishing emails to Sheila, they have now all stopped. That seems suspicious to me.Any idea what’s going on? Did I totally screw up by clicking the unsubscribe link?
Submitted April 08, 2018 at 09:42PM by Omgwtf1001
via reddit https://ift.tt/2HifVoH
This morning I saw a flood of email in my gmail inbox that looked like spam. It was all addressed to Sheila in the email body. Most was health insurance related. However, one like was to a Rewardbee account that was setup using my email. Rewardbee looks legit, and I requested a password change. I then entered a new password, but one I’ve never used anywhere.After logging in, it looked like whoever it was did some surveys for discounts on magazines. On another health insurance email, I clicked unsubscribe like a dummy and was sent to some fake unsubscribe page. I closed the window and rebooted my Mac.I’ve run MalwareBytes and BitDefender. Both find nothing.However after a steady stream of spam/phishing emails to Sheila, they have now all stopped. That seems suspicious to me.Any idea what’s going on? Did I totally screw up by clicking the unsubscribe link?
Submitted April 08, 2018 at 09:42PM by Omgwtf1001
via reddit https://ift.tt/2HifVoH
reddit
Help: Weird Spamming/Phishing Pattern • r/security
This morning I saw a flood of email in my gmail inbox that looked like spam. It was all addressed to Sheila in the email body. Most was health...
Weird Spamming Pattern
This morning I saw a flood of email in my inbox that looked like spam. It was all addressed to Sheila in the email body. Most was health insurance related. However, one like was to a Rewardbee account that was setup using my email. Rewardbee looks legit, and I requested a password change. I then entered a new password, but one I’ve never used anywhere.After logging in, it looked like whoever it was did some surveys for discounts on magazines. On another health insurance email, I clicked unsubscribe like a dummy and was sent to some fake unsubscribe page. I closed the window and rebooted my Mac.I’ve run MalwareBytes and BitDefender. Both find nothing.However after a steady stream of spam/phishing emails to Sheila, they have now all stopped. That seems suspicious to me.Any idea what’s going on? Did I totally screw up by clicking the unsubscribe link?
Submitted April 08, 2018 at 09:32PM by Omgwtf1001
via reddit https://ift.tt/2uRmID2
This morning I saw a flood of email in my inbox that looked like spam. It was all addressed to Sheila in the email body. Most was health insurance related. However, one like was to a Rewardbee account that was setup using my email. Rewardbee looks legit, and I requested a password change. I then entered a new password, but one I’ve never used anywhere.After logging in, it looked like whoever it was did some surveys for discounts on magazines. On another health insurance email, I clicked unsubscribe like a dummy and was sent to some fake unsubscribe page. I closed the window and rebooted my Mac.I’ve run MalwareBytes and BitDefender. Both find nothing.However after a steady stream of spam/phishing emails to Sheila, they have now all stopped. That seems suspicious to me.Any idea what’s going on? Did I totally screw up by clicking the unsubscribe link?
Submitted April 08, 2018 at 09:32PM by Omgwtf1001
via reddit https://ift.tt/2uRmID2
reddit
Weird Spamming Pattern • r/security
This morning I saw a flood of email in my inbox that looked like spam. It was all addressed to Sheila in the email body. Most was health insurance...
best private messenger
So the noscript speaks for itself. Looking for a company with strict policies to not give info even to the police
Submitted April 08, 2018 at 10:00PM by safity
via reddit https://ift.tt/2uWgsdf
So the noscript speaks for itself. Looking for a company with strict policies to not give info even to the police
Submitted April 08, 2018 at 10:00PM by safity
via reddit https://ift.tt/2uWgsdf
reddit
best private messenger • r/security
So the noscript speaks for itself. Looking for a company with strict policies to not give info even to the police
best private messenger
So the noscript speaks for itself. Looking for a company with strict policies to not give info even to the police
Submitted April 08, 2018 at 10:00PM by safity
via reddit https://ift.tt/2uWgsdf
So the noscript speaks for itself. Looking for a company with strict policies to not give info even to the police
Submitted April 08, 2018 at 10:00PM by safity
via reddit https://ift.tt/2uWgsdf
reddit
best private messenger • r/security
So the noscript speaks for itself. Looking for a company with strict policies to not give info even to the police
Berkeley Offers Its Data Science Course Online For Free
https://ift.tt/2qhUWdB
Submitted April 09, 2018 at 01:05AM by Horus_Sirius
via reddit https://ift.tt/2GLG6ak
https://ift.tt/2qhUWdB
Submitted April 09, 2018 at 01:05AM by Horus_Sirius
via reddit https://ift.tt/2GLG6ak
TSecurity Portal
Berkeley Offers Its Data Science Course Online For Free
NetSupport Manager RAT Spread via Fake Updates
https://ift.tt/2qlrxPR
Submitted April 09, 2018 at 01:02AM by Horus_Sirius
via reddit https://ift.tt/2GLG6XS
https://ift.tt/2qlrxPR
Submitted April 09, 2018 at 01:02AM by Horus_Sirius
via reddit https://ift.tt/2GLG6XS
TSecurity Portal
NetSupport Manager RAT Spread via Fake Updates
Accounts to Follow on Twitter
So following the whole T-Mobile plaintext controversy over on Twitter, I've been using it for the whole day and realised that my Timeline is lacking in security content. Therefore, who do you guys follow on twitter to get Security Content?
Submitted April 09, 2018 at 02:15AM by IAmKoalatyOVH
via reddit https://ift.tt/2IEBBKX
So following the whole T-Mobile plaintext controversy over on Twitter, I've been using it for the whole day and realised that my Timeline is lacking in security content. Therefore, who do you guys follow on twitter to get Security Content?
Submitted April 09, 2018 at 02:15AM by IAmKoalatyOVH
via reddit https://ift.tt/2IEBBKX
reddit
Accounts to Follow on Twitter • r/security
So following the whole T-Mobile plaintext controversy over on Twitter, I've been using it for the whole day and realised that my Timeline is...
Everything you need to know about log auditing
https://ift.tt/2qfnAg3
Submitted April 09, 2018 at 03:14AM by jakesyl
via reddit https://ift.tt/2qh3OA7
https://ift.tt/2qfnAg3
Submitted April 09, 2018 at 03:14AM by jakesyl
via reddit https://ift.tt/2qh3OA7
Medium
Event Log Auditing, Demystified
In my personal experience, the topic of reviewing event logs has received a fair amount grunts, groans, and questions such as “You…
How to keep your ISP’s nose out of your browser history with encrypted DNS
https://ift.tt/2GLg2fu
Submitted April 09, 2018 at 06:21AM by ColdRig
via reddit https://ift.tt/2HhDjm9
https://ift.tt/2GLg2fu
Submitted April 09, 2018 at 06:21AM by ColdRig
via reddit https://ift.tt/2HhDjm9
Ars Technica
How to keep your ISP’s nose out of your browser history with encrypted DNS
Using Cloudflare’s 1.1.1.1, other DNS services still requires some command-line know-how.
Crack hashes using online rainbow table attack services, right from your terminal.
https://ift.tt/2uTIcQ0
Submitted April 09, 2018 at 06:46AM by _k4m4_
via reddit https://ift.tt/2GHetyY
https://ift.tt/2uTIcQ0
Submitted April 09, 2018 at 06:46AM by _k4m4_
via reddit https://ift.tt/2GHetyY
GitHub
k4m4/dcipher-cli
dcipher-cli - Crack hashes using online rainbow table attack services, right from your terminal.
[Guide] Running Your Instance of Burp Collaborator Server w/ free wildcard SSL certs on a typical Debian VPS
https://ift.tt/2qie3Em
Submitted April 09, 2018 at 06:36AM by ShhmooPT
via reddit https://ift.tt/2GI6phw
https://ift.tt/2qie3Em
Submitted April 09, 2018 at 06:36AM by ShhmooPT
via reddit https://ift.tt/2GI6phw
Fabio Pires
Running Your Instance of Burp Collaborator Server - Fabio Pires
A step-by-step guide on how I configured Burp Collaborator Server on a typical Debian 9 VPS. The guide explains how to use Let's Encrypt wildcard SSL certificates and how to configure your own DNS server.