From 1 click a minute to 100: Click-fraud Android Trojans repurposed to perform DDoS attacks
http://ift.tt/2wmZK2b
Submitted September 16, 2017 at 04:39AM by jeffthechimp
via reddit http://ift.tt/2x9bvNw
http://ift.tt/2wmZK2b
Submitted September 16, 2017 at 04:39AM by jeffthechimp
via reddit http://ift.tt/2x9bvNw
McAfee Blogs
Android Click-Fraud App Repurposed as DDoS Botnet
The McAfee Mobile Research Team tracks the behavior of Android click-fraud apps. We have detected multiple implementations.
High-Level Approaches for Finding Vulnerabilities
http://ift.tt/2x2Eljt
Submitted September 16, 2017 at 04:56AM by xVIoct
via reddit http://ift.tt/2x2Xku4
http://ift.tt/2x2Eljt
Submitted September 16, 2017 at 04:56AM by xVIoct
via reddit http://ift.tt/2x2Xku4
How to honey pot?
Hello netsec peeps,Need your help. I have a friend kinda being cyber stalked. She has a stalker who keeps emailing her job, and all her friends businesses posing as her saying some CRAZY stuff.I want to setup a site/honey pot and have her tweet about it to see if I can get the person to email me.Hopefully he's not using a VPN, but if he is, what do I need to look into to get this fucker? Anything I can use to force him to use his camera, real IP address ect. I'm pretty savy with security stuff but haven't really ever delved into this type of stuff.Advise will be awesome. Thanks
Submitted September 16, 2017 at 09:32AM by rabbithunter555
via reddit http://ift.tt/2foqdGX
Hello netsec peeps,Need your help. I have a friend kinda being cyber stalked. She has a stalker who keeps emailing her job, and all her friends businesses posing as her saying some CRAZY stuff.I want to setup a site/honey pot and have her tweet about it to see if I can get the person to email me.Hopefully he's not using a VPN, but if he is, what do I need to look into to get this fucker? Anything I can use to force him to use his camera, real IP address ect. I'm pretty savy with security stuff but haven't really ever delved into this type of stuff.Advise will be awesome. Thanks
Submitted September 16, 2017 at 09:32AM by rabbithunter555
via reddit http://ift.tt/2foqdGX
reddit
How to honey pot? • r/security
Hello netsec peeps, Need your help. I have a friend kinda being cyber stalked. She has a stalker who keeps emailing her job, and all her friends...
Getting the Human Touch Back into Infosec Sales
For a while now, I've wanted to post an article I hoped would help salespeople in the security industry better understand their clients' goals and needs. Maybe just as much to show security practitioners that we're not all just finance tech bros going into security to chase money.I realized that the human touch is fading in our industry between clients and vendors. Clients are jaded and vendors are becoming brands instead of people. So, I decided to try to do something to re-establish the human connection in the security sales process. Hope you enjoy it.
Submitted September 16, 2017 at 09:29AM by BryanSolari
via reddit http://ift.tt/2x6iEwp
For a while now, I've wanted to post an article I hoped would help salespeople in the security industry better understand their clients' goals and needs. Maybe just as much to show security practitioners that we're not all just finance tech bros going into security to chase money.I realized that the human touch is fading in our industry between clients and vendors. Clients are jaded and vendors are becoming brands instead of people. So, I decided to try to do something to re-establish the human connection in the security sales process. Hope you enjoy it.
Submitted September 16, 2017 at 09:29AM by BryanSolari
via reddit http://ift.tt/2x6iEwp
reddit
Getting the Human Touch Back into Infosec Sales • r/security
For a while now, I've wanted to post an article I hoped would help salespeople in the security industry better understand their clients' goals...
Twitch exploits a buffer overflow
http://ift.tt/2xGwloR
Submitted September 16, 2017 at 11:05AM by tnekent
via reddit http://ift.tt/2whRfu1
http://ift.tt/2xGwloR
Submitted September 16, 2017 at 11:05AM by tnekent
via reddit http://ift.tt/2whRfu1
Wandering through the Shady Corners of VMware Workstation/Fusion
http://ift.tt/2jxCT2P
Submitted September 16, 2017 at 12:25PM by 0xdea
via reddit http://ift.tt/2wwmPzw
http://ift.tt/2jxCT2P
Submitted September 16, 2017 at 12:25PM by 0xdea
via reddit http://ift.tt/2wwmPzw
what's the best way to secure my laptop as well as keep me anonymous?
I decided to wipe out my hard drive to start fresh. Before I do anything with it, I want to first make sure I'm fully secured from any type of virus. I am willing to use a paid service if that's the best option.I also would like to learn the best way I can keep myself anonymous from the entire web, for example does it only depend on VPN services? Is that the only thing I should research to stay anonymous?Thank you for any tips. I never really cared much about security and always used free software like Avast. But I want to be fully secure since I use the internet very often and the internet is where the future is which also means more potential for criminals and shitty parts of the law that mess with our rights.
Submitted September 16, 2017 at 03:28PM by Spiritual-Abyss
via reddit http://ift.tt/2xpUbUP
I decided to wipe out my hard drive to start fresh. Before I do anything with it, I want to first make sure I'm fully secured from any type of virus. I am willing to use a paid service if that's the best option.I also would like to learn the best way I can keep myself anonymous from the entire web, for example does it only depend on VPN services? Is that the only thing I should research to stay anonymous?Thank you for any tips. I never really cared much about security and always used free software like Avast. But I want to be fully secure since I use the internet very often and the internet is where the future is which also means more potential for criminals and shitty parts of the law that mess with our rights.
Submitted September 16, 2017 at 03:28PM by Spiritual-Abyss
via reddit http://ift.tt/2xpUbUP
reddit
what's the best way to secure my laptop as well as... • r/security
I decided to wipe out my hard drive to start fresh. Before I do anything with it, I want to first make sure I'm fully secured from any type of...
how to secure content on the cloud
I have a CMS installed on the web host where I purchased space. A few helpers will access, and edit the content entirely on the cloud.No download/upload/copy/email of content is allowed . How do I achieve this?What kind of hardware/PC setupWhat kind of security measures/policiesThanks.
Submitted September 16, 2017 at 04:14PM by TreeOfWealth
via reddit http://ift.tt/2h8odCJ
I have a CMS installed on the web host where I purchased space. A few helpers will access, and edit the content entirely on the cloud.No download/upload/copy/email of content is allowed . How do I achieve this?What kind of hardware/PC setupWhat kind of security measures/policiesThanks.
Submitted September 16, 2017 at 04:14PM by TreeOfWealth
via reddit http://ift.tt/2h8odCJ
reddit
how to secure content on the cloud • r/security
I have a CMS installed on the web host where I purchased space. A few helpers will access, and edit the content entirely on the cloud.No...
Secret documents reveal: German foreign spy agency BND attacks the anonymity network Tor and advises not to use it
http://ift.tt/2vYcj4z
Submitted September 16, 2017 at 04:20PM by 1618b
via reddit http://ift.tt/2jz0uQy
http://ift.tt/2vYcj4z
Submitted September 16, 2017 at 04:20PM by 1618b
via reddit http://ift.tt/2jz0uQy
netzpolitik.org
Secret documents reveal: German foreign spy agency BND attacks the anonymity network Tor and advises not to use it
The German spy agency BND developed a system to monitor the Tor network and warned federal agencies that its anonymity is "ineffective". This is what emerges from a series of secret documents that we are publishing. The spies handed a prototype of this technology…
Samsung CCTV Dubai
http://systecnic.com/
Submitted September 16, 2017 at 06:00PM by i_theresa
via reddit http://ift.tt/2w0Pkpx
http://systecnic.com/
Submitted September 16, 2017 at 06:00PM by i_theresa
via reddit http://ift.tt/2w0Pkpx
CAWAN4D
CAWAN4D, Situs Game Online
CAWAN4D merupakan daftar website game online resmi terpercaya, cawan 4d telah banyak dimainkan oleh para peminat game online di Indonesia karena proses qris yang cepat.
Warning: If you are using this Kodi repository, you could be in danger
http://ift.tt/2xFnvI1
Submitted September 16, 2017 at 09:04PM by CornCobBobby
via reddit http://ift.tt/2xaZqYf
http://ift.tt/2xFnvI1
Submitted September 16, 2017 at 09:04PM by CornCobBobby
via reddit http://ift.tt/2xaZqYf
BetaNews
Warning: If you are using this Kodi repository, you could be in danger
Kodi is quite possibly the best media center software of all time. If you are looking to watch videos or listen to music, the open source solution provides an excellent overall experience. Thanks t…
Interesting Article about pragmatic security after biometric login becoming Apple's new security strategy
http://ift.tt/2xaTMFy
Submitted September 16, 2017 at 08:56PM by cosmiccovey
via reddit http://ift.tt/2xaz08F
http://ift.tt/2xaTMFy
Submitted September 16, 2017 at 08:56PM by cosmiccovey
via reddit http://ift.tt/2xaz08F
Troy Hunt
Face ID, Touch ID, No ID, PINs and Pragmatic Security
I was wondering recently after poring through yet another data breach how many people actually use multi-step verification. I mean here we have a construct where even if the attacker has the victim's credentials, they're rendered useless once challenged for…
RouteX malware: Russian hacker infects Netgear routers to mount attacks against Fortune 500 firms
http://ift.tt/2fnDDDj
Submitted September 16, 2017 at 09:54PM by majorllama
via reddit http://ift.tt/2fqVA3Y
http://ift.tt/2fnDDDj
Submitted September 16, 2017 at 09:54PM by majorllama
via reddit http://ift.tt/2fqVA3Y
International Business Times UK
RouteX malware: Russian hacker infects Netgear routers to mount attacks against Fortune 500 firms
The malware hijacks routers and turns them into proxies, allowing the hacker to launch credential stuffing attacks.
Cops and their favorite phone hacking contractors have found a way to completely bypass the Samsung S7's lockscreen
http://ift.tt/2f1PeY6
Submitted September 16, 2017 at 09:47PM by KnifeLover34
via reddit http://ift.tt/2f2Be04
http://ift.tt/2f1PeY6
Submitted September 16, 2017 at 09:47PM by KnifeLover34
via reddit http://ift.tt/2f2Be04
Forbes
Pedophile Probe Reveals Feds Can Easily Break Android Security
Cops crack Samsung S7 and HTC passcodes, as Cellebrite quietly updates its cellphone hacking tool.
Open wifi security
I'm going to a hackathon and with my team and we aren't going to have the option of a Hotspot so that means we have to use open wifi. What do you guys recommend to stay safe.Ps. I was think of using my raspberry pi as a kind of wifi condom concept
Submitted September 17, 2017 at 12:10AM by cancerous_176
via reddit http://ift.tt/2h9sNEC
I'm going to a hackathon and with my team and we aren't going to have the option of a Hotspot so that means we have to use open wifi. What do you guys recommend to stay safe.Ps. I was think of using my raspberry pi as a kind of wifi condom concept
Submitted September 17, 2017 at 12:10AM by cancerous_176
via reddit http://ift.tt/2h9sNEC
reddit
Open wifi security • r/security
I'm going to a hackathon and with my team and we aren't going to have the option of a Hotspot so that means we have to use open wifi. What do you...
Why is a string of dictionary words a more secure password than a string of garbage/gibberish?
I saw on the news recently that the latest research found that if you use a string of dictionary words with some special characters and numbers thrown in makes an even more secure password than mashing your keyboard and getting upper and lower case letters, numbers, symbols. This seems counter intuitive. Wouldn't the password with randomly chosen letters be more random than the password where the letters fit into words? Does anybody know which study this was? Maybe I am imagining things..? Haha I can't find other reports online saying anything similar.
Submitted September 17, 2017 at 01:44AM by ChampionDreamerMusic
via reddit http://ift.tt/2xGxnRN
I saw on the news recently that the latest research found that if you use a string of dictionary words with some special characters and numbers thrown in makes an even more secure password than mashing your keyboard and getting upper and lower case letters, numbers, symbols. This seems counter intuitive. Wouldn't the password with randomly chosen letters be more random than the password where the letters fit into words? Does anybody know which study this was? Maybe I am imagining things..? Haha I can't find other reports online saying anything similar.
Submitted September 17, 2017 at 01:44AM by ChampionDreamerMusic
via reddit http://ift.tt/2xGxnRN
reddit
Why is a string of dictionary words a more secure... • r/security
I saw on the news recently that the latest research found that if you use a string of dictionary words with some special characters and numbers...
The Loopix Anonymity System Wants to Be a More Secure Alternative to Tor
http://ift.tt/2jzKr50
Submitted September 17, 2017 at 02:10AM by majorllama
via reddit http://ift.tt/2wjupT4
http://ift.tt/2jzKr50
Submitted September 17, 2017 at 02:10AM by majorllama
via reddit http://ift.tt/2wjupT4
BleepingComputer
The Loopix Anonymity System Wants to Be a More Secure Alternative to Tor
Loopix is a new anonymity network developed by a group of researchers from University College London (UCL) that comes with all the good parts of previous systems and new additions to improve security.
How to Browse Anonymously Using the TOR Browser
https://youtu.be/HKyN5QMIjwQ
Submitted September 17, 2017 at 03:06AM by xFYD_
via reddit http://ift.tt/2x4zpdV
https://youtu.be/HKyN5QMIjwQ
Submitted September 17, 2017 at 03:06AM by xFYD_
via reddit http://ift.tt/2x4zpdV
YouTube
How to Browse Anonymously Using the TOR Browser
In this video Arm will show you how to browse the internet anonymously using the TOR browser. Links: https://www.torproject.org/
TippingPoint Threat Intelligence and Zero-Day Coverage – Week of September 11, 2017 -
http://ift.tt/2eZOqCQ
Submitted September 17, 2017 at 03:58AM by tech_jado
via reddit http://ift.tt/2jyEbup
http://ift.tt/2eZOqCQ
Submitted September 17, 2017 at 03:58AM by tech_jado
via reddit http://ift.tt/2jyEbup
Trendmicro
TippingPoint Threat Intelligence and Zero-Day Coverage – Week of September 11, 2017 -
In last week’s blog, I mentioned the Apache Struts vulnerability, which is still making headlines as estimates show that as many as 65 percent of Fortune 500 companies use it in some form. In addition, Equifax claims it has played a role in their breach affecting…
SE-Radio Episode 302: Haroon Meer on Network Security : Software Engineering Radio
http://ift.tt/2h8Cq6z
Submitted September 17, 2017 at 04:04AM by dmp1ce
via reddit http://ift.tt/2x4nywe
http://ift.tt/2h8Cq6z
Submitted September 17, 2017 at 04:04AM by dmp1ce
via reddit http://ift.tt/2x4nywe
Devs unknowingly use “malicious” modules snuck into official Python repository
http://ift.tt/2wxfRdC
Submitted September 17, 2017 at 04:30AM by NISMO1968
via reddit http://ift.tt/2h9G0tk
http://ift.tt/2wxfRdC
Submitted September 17, 2017 at 04:30AM by NISMO1968
via reddit http://ift.tt/2h9G0tk
Ars Technica
Devs unknowingly use “malicious” modules snuck into official Python repository
Code packages available in PyPI contained modified installation noscripts.