Any way to get a phone number by using social accounts?
I've been trying to contact my sister for 4 weeks and now I am worried about her. She lives in another town and apparently she changed her number. The only contacts that I've got are her Facebook and Instagram accounts, but she wasn't online this month either. Can I somehow get her new number by using social accounts? I would like to know some free and fast services or websites for this, if it's possible.
Submitted May 14, 2018 at 03:03PM by Nicholas_Tudeski
via reddit https://ift.tt/2rHL65p
I've been trying to contact my sister for 4 weeks and now I am worried about her. She lives in another town and apparently she changed her number. The only contacts that I've got are her Facebook and Instagram accounts, but she wasn't online this month either. Can I somehow get her new number by using social accounts? I would like to know some free and fast services or websites for this, if it's possible.
Submitted May 14, 2018 at 03:03PM by Nicholas_Tudeski
via reddit https://ift.tt/2rHL65p
reddit
Any way to get a phone number by using social accounts? • r/security
I've been trying to contact my sister for 4 weeks and now I am worried about her. She lives in another town and apparently she changed her number....
Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels [Paper and Blog Article]
https://ift.tt/2IjxoNh
Submitted May 14, 2018 at 03:52PM by Prav123
via reddit https://ift.tt/2jSFQZ0
https://ift.tt/2IjxoNh
Submitted May 14, 2018 at 03:52PM by Prav123
via reddit https://ift.tt/2jSFQZ0
Arbitrary Code Execution at Ring 0 using CVE-2018-8897
https://ift.tt/2IjUGTg
Submitted May 14, 2018 at 05:15PM by 6793746895F62C0E447A
via reddit https://ift.tt/2rFUd6I
https://ift.tt/2IjUGTg
Submitted May 14, 2018 at 05:15PM by 6793746895F62C0E447A
via reddit https://ift.tt/2rFUd6I
IBM bans all removable storage, for all staff, everywhere
https://ift.tt/2jJSYQb
Submitted May 14, 2018 at 05:35PM by speckz
via reddit https://ift.tt/2GcYnba
https://ift.tt/2jJSYQb
Submitted May 14, 2018 at 05:35PM by speckz
via reddit https://ift.tt/2GcYnba
www.theregister.co.uk
IBM bans all removable storage, for all staff, everywhere
Risk of ‘financial and reputational damage’ is too high, says CISO
EFAIL: vulnerability in email encryption
https://efail.de/
Submitted May 14, 2018 at 05:03PM by cym13
via reddit https://ift.tt/2KXVCyp
https://efail.de/
Submitted May 14, 2018 at 05:03PM by cym13
via reddit https://ift.tt/2KXVCyp
reddit
r/security - EFAIL: vulnerability in email encryption
5 votes and 3 so far on reddit
File level encryption and full disc encryption?
I'm thinking about employing some encryption on a set of some files. I already have a HDD that is full disc encrypted, a virtual drive encryption on another HDD, and utilized zip files ability to encrypt at file level.I've read this postTowards the end, someone suggested doing both file level and full disc encryption. Is this a little OTT? And if not, why would someone use both?
Submitted May 14, 2018 at 04:31PM by reddit_user33
via reddit https://ift.tt/2jZrJl3
I'm thinking about employing some encryption on a set of some files. I already have a HDD that is full disc encrypted, a virtual drive encryption on another HDD, and utilized zip files ability to encrypt at file level.I've read this postTowards the end, someone suggested doing both file level and full disc encryption. Is this a little OTT? And if not, why would someone use both?
Submitted May 14, 2018 at 04:31PM by reddit_user33
via reddit https://ift.tt/2jZrJl3
The Spiceworks Community
encrypt folders on Windows file server?
Our biggest client is now requiring that we ensure that their data is encrypted while stored. Currently the data is stored in a shared folder on Windows 2008 R2 file server.This...
Cracking Java’s RNG for CSRF: Javax Faces and Why CSRF Token Randomness Matters
https://ift.tt/2rIDZtp
Submitted May 14, 2018 at 06:49PM by rramgattie
via reddit https://ift.tt/2L2Skto
https://ift.tt/2rIDZtp
Submitted May 14, 2018 at 06:49PM by rramgattie
via reddit https://ift.tt/2L2Skto
Independent Security Evaluators
Cracking Java’s RNG for CSRF – Independent Security Evaluators
Javax Faces and Why CSRF Token Randomness Matters
Facebook has funds frozen in Brazil in another WhatsApp encrypted data dispute
https://ift.tt/29lb2LM
Submitted May 14, 2018 at 07:12PM by dengorilla1
via reddit https://ift.tt/2rG0bW3
https://ift.tt/29lb2LM
Submitted May 14, 2018 at 07:12PM by dengorilla1
via reddit https://ift.tt/2rG0bW3
TechCrunch
Facebook has funds frozen in Brazil in another WhatsApp encrypted data dispute
Around $6 million in Facebook’s Brazilian bank account has been frozen on court order in another dispute about encrypted data involving local police authorities and Facebook-owned messaging a…
Security In 5: Episode 237 - The Challenges Of PCI Compliance
https://ift.tt/2wEslFN
Submitted May 14, 2018 at 06:55PM by BinaryBlog
via reddit https://ift.tt/2KY7lwV
https://ift.tt/2wEslFN
Submitted May 14, 2018 at 06:55PM by BinaryBlog
via reddit https://ift.tt/2KY7lwV
Libsyn
Security In Five Podcast: Episode 237 - The Challenges Of PCI Compliance
The PCI regulation is one of the more security demanding regulations and it is also carries the heaviest penalties. This episode goes into the high level challenges that you need to do to prepare and maintain your environment to comply to PCI. Be aware…
Write-up by the researcher who discovered XSS in WordPress 4.8
https://ift.tt/2KYyEa4
Submitted May 14, 2018 at 08:07PM by ded1cated
via reddit https://ift.tt/2Ggbf0i
https://ift.tt/2KYyEa4
Submitted May 14, 2018 at 08:07PM by ded1cated
via reddit https://ift.tt/2Ggbf0i
WebARX
Cross-Site Scripting (XSS) in Wordpress 4.8
During our security researchers, Luka research on latest WordPress he found a vulnerability in Wordpress. Read more from WebARX blog to find out.
New Phishing Scam uses AES Encryption and Goes After Apple IDs
https://ift.tt/2rA5rtf
Submitted May 14, 2018 at 09:20PM by EvanConover
via reddit https://ift.tt/2IkioPd
https://ift.tt/2rA5rtf
Submitted May 14, 2018 at 09:20PM by EvanConover
via reddit https://ift.tt/2IkioPd
Trendmicro
New Phishing Scam uses AES Encryption and Goes After Apple IDs - TrendLabs Security Intelligence Blog
by Jindrich Karasek Recent data breaches and privacy scares, along with the upcoming General Data Protection Regulation (GDPR) from the European Union, have triggered a change in the way companies handle their users’ data. As a result, many of them have been…
Malicious Traffic in Port 7001 Surges as Cryptominers Target Patched 2017 Oracle WebLogic Vulnerability
https://ift.tt/2G5tmGk
Submitted May 14, 2018 at 09:19PM by EvanConover
via reddit https://ift.tt/2jTuRyK
https://ift.tt/2G5tmGk
Submitted May 14, 2018 at 09:19PM by EvanConover
via reddit https://ift.tt/2jTuRyK
Trendmicro
Malicious Traffic in Port 7001 Surges as Cryptominers Target Patched 2017 Oracle WebLogic Vulnerability - TrendLabs Security Intelligence…
We observed a large spike in the number of devices scanning the internet for port 7001/TCP since April 27, 2018. Our analysis found that it's increased activity was caused by cybercriminals engaging in cryptomining via exploiting CVE-2017-10271. The flaw…
efail: Official response from GnuPG
https://ift.tt/2KYLXHy
Submitted May 14, 2018 at 09:42PM by albinowax
via reddit https://ift.tt/2IgHcLZ
https://ift.tt/2KYLXHy
Submitted May 14, 2018 at 09:42PM by albinowax
via reddit https://ift.tt/2IgHcLZ
reddit
r/security - efail: Official response from GnuPG
1 votes and 0 so far on reddit
EFAIL explained.
https://twitter.com/oliverdunk_/status/996058634613338112
Submitted May 14, 2018 at 09:39PM by oliverdunk
via reddit https://ift.tt/2rHWKwZ
https://twitter.com/oliverdunk_/status/996058634613338112
Submitted May 14, 2018 at 09:39PM by oliverdunk
via reddit https://ift.tt/2rHWKwZ
Twitter
Oliver Dunk
EFAIL explained.
Anatomy of a Missed Opportunity to Stop a Cyber Threat Infographic
https://ift.tt/2jQysgJ
Submitted May 14, 2018 at 09:36PM by volci
via reddit https://ift.tt/2rNsX6r
https://ift.tt/2jQysgJ
Submitted May 14, 2018 at 09:36PM by volci
via reddit https://ift.tt/2rNsX6r
Secureworks
Anatomy of a Missed Opportunity to Stop a Cyber Threat Infographic
In this infographic, learn how visibility in your environment can stop threats sooner and improve incident response outcomes.
efail: Official press release of the GnuPG developers
https://ift.tt/2KYLXHy
Submitted May 14, 2018 at 09:26PM by the_gnarts
via reddit https://ift.tt/2IhV3BC
https://ift.tt/2KYLXHy
Submitted May 14, 2018 at 09:26PM by the_gnarts
via reddit https://ift.tt/2IhV3BC
reddit
r/netsec - efail: Official press release of the GnuPG developers
3 votes and 3 so far on reddit
A Deep Dive Into RIG Exploit Kit Delivering Grobios Trojan
https://ift.tt/2jXmpP2
Submitted May 14, 2018 at 09:22PM by EvanConover
via reddit https://ift.tt/2GertqI
https://ift.tt/2jXmpP2
Submitted May 14, 2018 at 09:22PM by EvanConover
via reddit https://ift.tt/2GertqI
reddit
r/netsec - A Deep Dive Into RIG Exploit Kit Delivering Grobios Trojan
1 votes and 0 so far on reddit
Concord: Student accused of hacking system to change grades is arrested
https://ift.tt/2KjxXar
Submitted May 15, 2018 at 12:20AM by EvanConover
via reddit https://ift.tt/2rFVL15
https://ift.tt/2KjxXar
Submitted May 15, 2018 at 12:20AM by EvanConover
via reddit https://ift.tt/2rFVL15
KTVU
Concord: Student accused of hacking system to change grades is arrested
Concord Police say a student at Ygnacio Valley High School targeted teachers with a phishing scam and hacked into the Mount Diablo Unified School District computer system in order to change his grades as well as those of other students.
What kind of PKI designs do browsers have?
I know they must have trust lists and also consist of hierarchical PKIs is this correct? Also, can you add more designs if any exist?
Submitted May 15, 2018 at 12:11AM by FearsomeHorror
via reddit https://ift.tt/2wDBb6B
I know they must have trust lists and also consist of hierarchical PKIs is this correct? Also, can you add more designs if any exist?
Submitted May 15, 2018 at 12:11AM by FearsomeHorror
via reddit https://ift.tt/2wDBb6B
reddit
What kind of PKI designs do browsers have? • r/security
I know they must have trust lists and also consist of hierarchical PKIs is this correct? Also, can you add more designs if any exist?
GDPR Phishing Scam Targets Apple Accounts, Financial Data | Threatpost
https://ift.tt/2IFD7Ag
Submitted May 15, 2018 at 01:08AM by LindseyOD123
via reddit https://ift.tt/2rGKQUc
https://ift.tt/2IFD7Ag
Submitted May 15, 2018 at 01:08AM by LindseyOD123
via reddit https://ift.tt/2rGKQUc
Threatpost | The first stop for security news
GDPR Phishing Scam Targets Apple Accounts, Financial Data
A phishing campaign targeting Apple users is attempting to trick victims into updating their profiles under the guise it's a part of proactive security hardening prepping for the introduction of Gene
dban for memory sticks?
I would like to use something like dban to wipe 2 memory sticks. dban itself does not work. errora occure and i cant wipe them. i would like to wipe them directly with a tool that does not need an operating system. any ideas?
Submitted May 15, 2018 at 02:44AM by Joetunn
via reddit https://ift.tt/2Kmu2tk
I would like to use something like dban to wipe 2 memory sticks. dban itself does not work. errora occure and i cant wipe them. i would like to wipe them directly with a tool that does not need an operating system. any ideas?
Submitted May 15, 2018 at 02:44AM by Joetunn
via reddit https://ift.tt/2Kmu2tk
reddit
r/security - dban for memory sticks?
1 votes and 1 so far on reddit