FacexWorm Targets Cryptocurrency Trading Platforms, Abuses Facebook Messenger for Propagation
https://ift.tt/2vVPIKI
Submitted April 30, 2018 at 11:38PM by EvanConover
via reddit https://ift.tt/2KsyIyS
https://ift.tt/2vVPIKI
Submitted April 30, 2018 at 11:38PM by EvanConover
via reddit https://ift.tt/2KsyIyS
Trendmicro
FacexWorm Targets Cryptocurrency Trading Platforms, Abuses Facebook Messenger for Propagation - TrendLabs Security Intelligence…
Our Cyber Safety Solutions team identified a malicious Chrome extension we named FacexWorm, which uses a miscellany of techniques to target cryptocurrency trading platforms accessed on an affected browser and propagates via Facebook Messenger.
FacexWorm Targets Cryptocurrency Trading Platforms, Abuses Facebook Messenger for Propagation
https://ift.tt/2vVPIKI
Submitted April 30, 2018 at 11:38PM by EvanConover
via reddit https://ift.tt/2KsyIyS
https://ift.tt/2vVPIKI
Submitted April 30, 2018 at 11:38PM by EvanConover
via reddit https://ift.tt/2KsyIyS
Trendmicro
FacexWorm Targets Cryptocurrency Trading Platforms, Abuses Facebook Messenger for Propagation - TrendLabs Security Intelligence…
Our Cyber Safety Solutions team identified a malicious Chrome extension we named FacexWorm, which uses a miscellany of techniques to target cryptocurrency trading platforms accessed on an affected browser and propagates via Facebook Messenger.
The Digital Vigilantes Who Hack Back: American companies that fall victim to data breaches want to retaliate against the culprits. But can they do so without breaking the law?
https://ift.tt/2jiEpTH
Submitted May 01, 2018 at 01:15AM by SuccessfulOperation
via reddit https://ift.tt/2HCxROc
https://ift.tt/2jiEpTH
Submitted May 01, 2018 at 01:15AM by SuccessfulOperation
via reddit https://ift.tt/2HCxROc
The New Yorker
The Digital Vigilantes Who Hack Back
American companies that fall victim to data breaches want to retaliate against the culprits. But can they do so without breaking the law?
‘I broke The Pentagon’s secure messaging system – and won an award for it!’
https://www.theregister.co.uk/2018/04/30/who_me/
Submitted May 01, 2018 at 01:05AM by xtraswift
via reddit https://ift.tt/2r9Hwkn
https://www.theregister.co.uk/2018/04/30/who_me/
Submitted May 01, 2018 at 01:05AM by xtraswift
via reddit https://ift.tt/2r9Hwkn
www.theregister.co.uk
‘I broke The Pentagon’s secure messaging system – and won an award for it!’
That’s not a test machine? Well it was before I went on holidays
SecuriTeam Secure Disclosure Advisory – Linux AF_LLC Double Free
https://ift.tt/2KrRaHU
Submitted May 01, 2018 at 01:29AM by TheUglyStranger
via reddit https://ift.tt/2r8gIlm
https://ift.tt/2KrRaHU
Submitted May 01, 2018 at 01:29AM by TheUglyStranger
via reddit https://ift.tt/2r8gIlm
reddit
SecuriTeam Secure Disclosure Advisory – Linux AF_LLC... • r/netsec
2 points and 0 comments so far on reddit
What If I Lose My 2FA: Be prepared for the day you lose your phone
https://ift.tt/2HILqre
Submitted May 01, 2018 at 07:30AM by johnnobro
via reddit https://ift.tt/2I6J2y3
https://ift.tt/2HILqre
Submitted May 01, 2018 at 07:30AM by johnnobro
via reddit https://ift.tt/2I6J2y3
Whatifilosemy2Fa
What If I Lose My 2FA: Be prepared for the day you lose your phone
2FA is great until you lose your phone and you're locked out of your accounts. Find those services below and find out what data you need to keep to recover your accounts in case disaster strikes.
Rediscovery, analysis and exploitation of a CIA zero-day MikroTik Vulnerability
https://ift.tt/2r3rFVd
Submitted May 01, 2018 at 08:31AM by jayheidecker
via reddit https://ift.tt/2rfQ7SG
https://ift.tt/2r3rFVd
Submitted May 01, 2018 at 08:31AM by jayheidecker
via reddit https://ift.tt/2rfQ7SG
reddit
Rediscovery, analysis and exploitation of a CIA... • r/netsec
1 points and 0 comments so far on reddit
A Collection of Python Scripts for UAC Bypass,Privilege Escalation, Dll Hijack and Many More Techniques (See Comment)
https://ift.tt/2HEr72t
Submitted May 01, 2018 at 08:29AM by TechLord2
via reddit https://ift.tt/2rfQgWe
https://ift.tt/2HEr72t
Submitted May 01, 2018 at 08:29AM by TechLord2
via reddit https://ift.tt/2rfQgWe
GitHub
rootm0s/WinPwnage
UAC bypass, Elevate, Persistence methods. Contribute to rootm0s/WinPwnage development by creating an account on GitHub.
Windows Kernel Exploitation Tutorial Part 8: Use After Free - Arbitrary Code Execution through a Callback Function
https://ift.tt/2rahdem
Submitted May 01, 2018 at 09:37AM by TechLord2
via reddit https://ift.tt/2jlKnDl
https://ift.tt/2rahdem
Submitted May 01, 2018 at 09:37AM by TechLord2
via reddit https://ift.tt/2jlKnDl
rootkit
Windows Kernel Exploitation Tutorial Part 8: Use After Free - rootkit
Overview In our previous post, we discussed about Uninitialized Heap Variable. This post will focus on another vulnerability, Use After Free. As the name might suggest, we’d be exploiting a stale pointer, that should’ve been freed, but due to a flaw, the…
KRACK Vulnerability Puts Medical Devices At Risk
https://ift.tt/2FtkhXF
Submitted May 01, 2018 at 09:49AM by volci
via reddit https://ift.tt/2w0S1My
https://ift.tt/2FtkhXF
Submitted May 01, 2018 at 09:49AM by volci
via reddit https://ift.tt/2w0S1My
Threatpost | The first stop for security news
KRACK Vulnerability Puts Medical Devices At Risk
A slew of devices from medical technology company Becton, Dickinson and Company (BD) are vulnerable to the infamous KRACK key-reinstallation attack, potentially enabling hackers to change and exfiltr
Most Dangerous Hacking Techniques the Cybercriminals Use to Harm You
https://ift.tt/2I2TTcl
Submitted May 01, 2018 at 09:28AM by jasmineana
via reddit https://ift.tt/2w2KD3f
https://ift.tt/2I2TTcl
Submitted May 01, 2018 at 09:28AM by jasmineana
via reddit https://ift.tt/2w2KD3f
In2PcFix
Most Dangerous Hacking Techniques the Cybercriminals Use to Harm You - In2PcFix
Hacking is one of the dangerous attempts made by hackers to access and exploit your computer. It is an unauthorized activity where the cybercriminals take control of PC for some illegal doings. The hacks can allow the online attackers to steal your personal…
'We're on our knees': Inside the totally avoidable TSB crisis
https://ift.tt/2rcyFyZ
Submitted May 01, 2018 at 02:10PM by wlscr
via reddit https://ift.tt/2JJvB47
https://ift.tt/2rcyFyZ
Submitted May 01, 2018 at 02:10PM by wlscr
via reddit https://ift.tt/2JJvB47
WIRED UK
'We're on our knees': Inside the totally avoidable TSB crisis
As TSB's banking crisis enters its second week, chief executive Paul Pester has promised compensation and MPs are demanding answers. Will it be enough for the bank to save its reputation?
Escape from the Zuckerborg: WhatsApp founder legs it
https://ift.tt/2jjt5Xp
Submitted May 01, 2018 at 02:08PM by wlscr
via reddit https://ift.tt/2JHTwB8
https://ift.tt/2jjt5Xp
Submitted May 01, 2018 at 02:08PM by wlscr
via reddit https://ift.tt/2JHTwB8
www.theregister.co.uk
Escape from the Zuckerborg: WhatsApp founder legs it
User privacy rows rage on as Koum leaves to play Ultimate Frisbee, collect rare Porsches
The Catch 22 of Base64: Attacker Dilemma from a Defender Point of View
https://ift.tt/2HDUrGl
Submitted May 01, 2018 at 05:07PM by whitehattracker
via reddit https://ift.tt/2KqlHFS
https://ift.tt/2HDUrGl
Submitted May 01, 2018 at 05:07PM by whitehattracker
via reddit https://ift.tt/2KqlHFS
Blog | Imperva
The Catch 22 of Base64: Attacker Dilemma from a Defender Point of View – Blog | Imperva
To cover their tracks and increase their attack success rate, hackers often obfuscate attacks using different techniques.
The Catch 22 of Base64: Attacker Dilemma from a Defender Point of View
https://ift.tt/2relexT
Submitted May 01, 2018 at 05:12PM by whitehattracker
via reddit https://ift.tt/2HG7s1Q
https://ift.tt/2relexT
Submitted May 01, 2018 at 05:12PM by whitehattracker
via reddit https://ift.tt/2HG7s1Q
Blog | Imperva
The Catch 22 of Base64: Attacker Dilemma from a Defender Point of View – Blog | Imperva
To cover their tracks and increase their attack success rate, hackers often obfuscate attacks using different techniques.
Data Breach Report: April 2018
https://ift.tt/2rc0J4N
Submitted May 01, 2018 at 04:45PM by Uminekoshi
via reddit https://ift.tt/2HHsOw9
https://ift.tt/2rc0J4N
Submitted May 01, 2018 at 04:45PM by Uminekoshi
via reddit https://ift.tt/2HHsOw9
Nehemiah Security
Data Breach Report: April 2018 - Nehemiah Security
Review some of the biggest data breaches that occurred in April 2018. Read the full report here.
Tabidus Technology Announces Redundant Antivirus Protection
Austria security company joins global antivirus vendor in the fight against cyber threats. The approach: Flexible activation of technologies, instead of installing individual security products.After a six-year development phase, Tabidus Technology is introducing a new security approach. With the help of Austrian scientists and renowned antivirus vendors from all over the world, a protection with diverse redundancy against malware emerged. Thus it is now possible to activate anti-malware technologies at the touch of a button without having to install individual security solutions. Instead, the different technologies from independent manufacturers can act together in a universal system. This not only enhances the detection of threats, but also avoids false alarms at the same time.In this approach, Tabidus is following a new strategy for dealing with the increasing number of cyber threats: The company is focusing on the combined strengths of the IT security industry. The flexible activation of technologies also provides a new way of dealing with IT security in companies. Instead of the elaborate implementation of multiple security solutions, vendors can be put into operation in just a few easy steps. However, they can also be quickly changed and individually adapted to each area of application. This in turn opens up new possibilities for security concepts: from permanent interplay between multiple manufacturers to occasional checks of computer systems and targeted responses to emergencies.Initially, this approach for protecting Windows clients and servers will be available with the United Endpoint Protector. All interested parties can already sign-up to test the pre-release before the product is launched in 2019.
Submitted May 01, 2018 at 04:20PM by tabidustechnology
via reddit https://ift.tt/2r7Osyi
Austria security company joins global antivirus vendor in the fight against cyber threats. The approach: Flexible activation of technologies, instead of installing individual security products.After a six-year development phase, Tabidus Technology is introducing a new security approach. With the help of Austrian scientists and renowned antivirus vendors from all over the world, a protection with diverse redundancy against malware emerged. Thus it is now possible to activate anti-malware technologies at the touch of a button without having to install individual security solutions. Instead, the different technologies from independent manufacturers can act together in a universal system. This not only enhances the detection of threats, but also avoids false alarms at the same time.In this approach, Tabidus is following a new strategy for dealing with the increasing number of cyber threats: The company is focusing on the combined strengths of the IT security industry. The flexible activation of technologies also provides a new way of dealing with IT security in companies. Instead of the elaborate implementation of multiple security solutions, vendors can be put into operation in just a few easy steps. However, they can also be quickly changed and individually adapted to each area of application. This in turn opens up new possibilities for security concepts: from permanent interplay between multiple manufacturers to occasional checks of computer systems and targeted responses to emergencies.Initially, this approach for protecting Windows clients and servers will be available with the United Endpoint Protector. All interested parties can already sign-up to test the pre-release before the product is launched in 2019.
Submitted May 01, 2018 at 04:20PM by tabidustechnology
via reddit https://ift.tt/2r7Osyi
reddit
r/security - Tabidus Technology Announces Redundant Antivirus Protection
1 votes and 0 so far on reddit
7-Zip: From Uninitialized Memory to Remote Code Execution
https://ift.tt/2I5khlW
Submitted May 01, 2018 at 05:33PM by landave
via reddit https://ift.tt/2JJY9KP
https://ift.tt/2I5khlW
Submitted May 01, 2018 at 05:33PM by landave
via reddit https://ift.tt/2JJY9KP
landave's blog
7-Zip: From Uninitialized Memory to Remote Code Execution
Blog about anti-virus software and its issues.
Free Mail Flow Monitor V2 for Email Security. It went down very well on /r/sysadmin, I thought it would be relevant for you guys.
https://ift.tt/2pyJFaZ
Submitted May 01, 2018 at 05:13PM by crispyducks
via reddit https://ift.tt/2HLvFA1
https://ift.tt/2pyJFaZ
Submitted May 01, 2018 at 05:13PM by crispyducks
via reddit https://ift.tt/2HLvFA1
Everycloudtech
Free Round-Trip Mail Flow Monitor | EveryCloud
Email monitoring using the free email server monitoring service from EveryCloud ensures the end-to-end delivery of emails and the monitoring of availability and performance of your email server or system
Weird Google Chrome experience
I was talking with my nephew 5 minutes ago and I asked him whether he tried playing xbox 360 games on xbox one, he said no so I went on google and the moment I typed "can" it auto suggested "can xbox one play". It freaked me the fuck out.
Submitted May 01, 2018 at 06:12PM by antiwhinningdude
via reddit https://ift.tt/2HFeAvJ
I was talking with my nephew 5 minutes ago and I asked him whether he tried playing xbox 360 games on xbox one, he said no so I went on google and the moment I typed "can" it auto suggested "can xbox one play". It freaked me the fuck out.
Submitted May 01, 2018 at 06:12PM by antiwhinningdude
via reddit https://ift.tt/2HFeAvJ
reddit
r/security - Weird Google Chrome experience
1 votes and 0 so far on reddit
Security In 5: Episode 228 - Survey Shows Most People Do Not Change Their WiFi Settings, You Need To
https://ift.tt/2HJZilc
Submitted May 01, 2018 at 06:32PM by BinaryBlog
via reddit https://ift.tt/2jkT8gY
https://ift.tt/2HJZilc
Submitted May 01, 2018 at 06:32PM by BinaryBlog
via reddit https://ift.tt/2jkT8gY
Libsyn
Security In Five Podcast: Episode 228 - Survey Shows Most People Do Not Change Their WiFi Settings, You Need To
Everyone has a Wifi router in their homes at this point. Unfortunately most do not change the settings or secure it properly when they take it out of the box from the store. This episode goes over a survey conducted and the results are expected but disappointing. …