Draytek router hacked
https://ift.tt/2rPqBEK
Submitted May 18, 2018 at 04:04PM by leegee333
via reddit https://ift.tt/2Gv9GMa
https://ift.tt/2rPqBEK
Submitted May 18, 2018 at 04:04PM by leegee333
via reddit https://ift.tt/2Gv9GMa
reddit
Draytek router hacked • r/networking
Where would be the best place to post about a possible flaw in the security of Draytek Routers so fellow Redditors are aware ?
Week 20 in Information Security, 2018
https://ift.tt/2Iu1f9S
Submitted May 18, 2018 at 03:58PM by undercomm
via reddit https://ift.tt/2LdZrzA
https://ift.tt/2Iu1f9S
Submitted May 18, 2018 at 03:58PM by undercomm
via reddit https://ift.tt/2LdZrzA
Malgregator
InfoSec Week 20, 2018
Major (probably not only) US cell carriers are selling access to the real-time phone location data. Because, you know the Electronic...
Latin American “Bineros” Ramping Up Fraudulent Activity
https://ift.tt/2k3k3y6
Submitted May 18, 2018 at 05:02PM by iliketechnews
via reddit https://ift.tt/2rSUhAa
https://ift.tt/2k3k3y6
Submitted May 18, 2018 at 05:02PM by iliketechnews
via reddit https://ift.tt/2rSUhAa
Flashpoint
Flashpoint - Latin American “Bineros” Ramping Up Fraudulent Activity
Fraudulent activity among Latin American cybercriminals, known as bineros, continues to plague online streaming services and retailers operating in the region.
Security In 5: Episode 241 - Maltego CE
https://ift.tt/2KzYVKR
Submitted May 18, 2018 at 06:38PM by BinaryBlog
via reddit https://ift.tt/2IrawiV
https://ift.tt/2KzYVKR
Submitted May 18, 2018 at 06:38PM by BinaryBlog
via reddit https://ift.tt/2IrawiV
Libsyn
Security In Five Podcast: Episode 241 - Maltego CE
This week's Tools, Tips and Tricks episode goes over a social engineering recon tool. Maltego CE, Community Edition, is the tool of choice for information gathering on websites, companies, people and more. The first step to a penetration test is recon, information…
Misconfigured Reverse Proxy Servers Spill Credentials | Threatpost
https://ift.tt/2wSd1pf
Submitted May 18, 2018 at 06:25PM by LindseyOD123
via reddit https://ift.tt/2IvmaJP
https://ift.tt/2wSd1pf
Submitted May 18, 2018 at 06:25PM by LindseyOD123
via reddit https://ift.tt/2IvmaJP
Threatpost | The first stop for security news
Misconfigured Reverse Proxy Servers Spill Credentials
Researchers have created a proof-of-concept attack that allows unauthenticated adversaries to extract user credentials from misconfigured reverse proxy servers in order to delete, manipulate or extrac
Is DBAN safe ?
Thanks :)
Submitted May 18, 2018 at 07:41PM by aymanbt
via reddit https://ift.tt/2rTiXbA
Thanks :)
Submitted May 18, 2018 at 07:41PM by aymanbt
via reddit https://ift.tt/2rTiXbA
reddit
r/security - Is DBAN safe ?
1 votes and 0 so far on reddit
Your smartphone apps are 'secretly colluding' to spy on you in terrifying detail, researchers warn
https://ift.tt/2pVihTz
Submitted May 18, 2018 at 08:12PM by dengorilla1
via reddit https://ift.tt/2rSxHs1
https://ift.tt/2pVihTz
Submitted May 18, 2018 at 08:12PM by dengorilla1
via reddit https://ift.tt/2rSxHs1
The Sun
Your smartphone apps are 'secretly colluding' to spy on you in terrifying detail, researchers warn
THE apps on your phone are secretly working together to spy on your life in minute detail, researchers have warned. Experts from Virginia Tech University analysed more than 100,000 pieces of Androi…
Maliciously Changing Someone's Address
https://ift.tt/2KzdcYh
Submitted May 18, 2018 at 08:10PM by volci
via reddit https://ift.tt/2GtVxPw
https://ift.tt/2KzdcYh
Submitted May 18, 2018 at 08:10PM by volci
via reddit https://ift.tt/2GtVxPw
reddit
r/security - Maliciously Changing Someone's Address
1 votes and 0 so far on reddit
Google’s creepy data video describes how your data may be used to engineer your decisions
https://ift.tt/2KwUUak
Submitted May 18, 2018 at 10:17PM by javoss88
via reddit https://ift.tt/2Lab3Dw
https://ift.tt/2KwUUak
Submitted May 18, 2018 at 10:17PM by javoss88
via reddit https://ift.tt/2Lab3Dw
Business Insider
A leaked internal Google video shows a creepy vision of how data could be used to direct human decision-making
The 'Selfish Ledger' video was made in 2016 by Nick Foster, the head of design at Google's ambitious research-and-development division, X. Google said it was designed to be provocative and does not relate to any products in development.
Dell SupportAssist Driver - Local Privilege Escalation Reversing and Analysis
https://ift.tt/2rTZ306
Submitted May 18, 2018 at 11:05PM by overflowingInt
via reddit https://ift.tt/2KxIpLx
https://ift.tt/2rTZ306
Submitted May 18, 2018 at 11:05PM by overflowingInt
via reddit https://ift.tt/2KxIpLx
[How-To/Release] CobaltSplunk - Splunk application to collect Attack Infrastructure logs and perform analysis
https://ift.tt/2k6QjQQ
Submitted May 18, 2018 at 10:58PM by vysec
via reddit https://ift.tt/2k6IUkv
https://ift.tt/2k6QjQQ
Submitted May 18, 2018 at 10:58PM by vysec
via reddit https://ift.tt/2k6IUkv
Vincent Yiu
CobaltSplunk
TLDR; use Splunk as a central log database and analysis system for offensive infrastructure logs. In many engagements, you will want accurate logging across multiple RAT systems, phishing web servers, mail systems, and more. Currently only supports Cobalt…
DLL Hijacking via URL files
https://ift.tt/2GsWcRa
Submitted May 18, 2018 at 08:19PM by albinowax
via reddit https://ift.tt/2KzA9KT
https://ift.tt/2GsWcRa
Submitted May 18, 2018 at 08:19PM by albinowax
via reddit https://ift.tt/2KzA9KT
insert-noscript.blogspot.co.uk
DLL Hijacking via URL files
This blogpost describes how I got annoyed by vulnerabilities in 3rd party Windows applications, which allowed to execute local files but wi...
Dennis Kucinich: I'm no fan of Trump's but he's got a point about wiretapping
https://ift.tt/2n6pvng
Submitted May 19, 2018 at 01:30AM by dengorilla1
via reddit https://ift.tt/2rPOooc
https://ift.tt/2n6pvng
Submitted May 19, 2018 at 01:30AM by dengorilla1
via reddit https://ift.tt/2rPOooc
Fox News
Dennis Kucinich: I'm no fan of Trump's but he's got a point about wiretapping
President Trump’s assertion that his phones at Trump Tower were tapped in 2016 has been treated as hilarious in some circles. But I can vouch for the fact that extracurricular surveillance does occur.
System Management Mode Speculative Execution Attacks
https://ift.tt/2k4tGMT
Submitted May 19, 2018 at 02:13AM by campuscodi
via reddit https://ift.tt/2IseOqh
https://ift.tt/2k4tGMT
Submitted May 19, 2018 at 02:13AM by campuscodi
via reddit https://ift.tt/2IseOqh
Eclypsium Blog
System Management Mode Speculative Execution Attacks
Eclypsium researchers have discovered a new application of speculative execution attacks, bypassing hardware-based memory protections.
Making security appliance a Certificate Authority
There's a category of firewall device which does deep packet inspection on all traffic. In order to work, it requires that all computers internally add a certificate authority for the firewall so that it can generate fake certificates and do deep packet inspection between client machines and the Internet. Are these widely known? Are there any good analysis of this particular approach and the risks/benefits it poses (as compared to evals of individual products)?I'd like to know more about the security community's take on this.
Submitted May 19, 2018 at 04:23AM by garrett_k
via reddit https://ift.tt/2k9TkQx
There's a category of firewall device which does deep packet inspection on all traffic. In order to work, it requires that all computers internally add a certificate authority for the firewall so that it can generate fake certificates and do deep packet inspection between client machines and the Internet. Are these widely known? Are there any good analysis of this particular approach and the risks/benefits it poses (as compared to evals of individual products)?I'd like to know more about the security community's take on this.
Submitted May 19, 2018 at 04:23AM by garrett_k
via reddit https://ift.tt/2k9TkQx
reddit
r/security - Making security appliance a Certificate Authority
1 votes and 1 so far on reddit
Budget Android phones are secretly sending users’ text messages to China
https://ift.tt/2fSOzqn
Submitted May 19, 2018 at 03:30AM by dengorilla1
via reddit https://ift.tt/2wVKhMc
https://ift.tt/2fSOzqn
Submitted May 19, 2018 at 03:30AM by dengorilla1
via reddit https://ift.tt/2wVKhMc
The Verge
Budget Android phones are secretly sending users’ text messages to China
Software installed on some Android phones secretly monitored users, and even sent keyword-searchable, full text message archives to a Chinese server every 72 hours, according to research from...
The Obama administration is getting ready to elevate the role of Cyber Command
https://ift.tt/2b1havP
Submitted May 19, 2018 at 05:12PM by dengorilla1
via reddit https://ift.tt/2KDrabK
https://ift.tt/2b1havP
Submitted May 19, 2018 at 05:12PM by dengorilla1
via reddit https://ift.tt/2KDrabK
The Verge
The Obama administration is getting ready to elevate the role of Cyber Command
The United States Cyber Command is sub-unified command in the US Department of Defense, responsible for cyberspace operations and protecting US military networks. According to Reuters, the Obama...
Evernote Employees Can Read Your Notes, and There's No Way to Opt-Out
https://ift.tt/2hm0pgJ
Submitted May 19, 2018 at 06:44PM by dengorilla1
via reddit https://ift.tt/2IAngzP
https://ift.tt/2hm0pgJ
Submitted May 19, 2018 at 06:44PM by dengorilla1
via reddit https://ift.tt/2IAngzP
Lifehacker
Evernote Employees Can Read Your Notes, and There's No Way to Opt-Out
Evernote just posted an update to its Privacy Policy that details how the company will make use of some new machine learning tools. In order for those tools to work, Evernote will need to allow a human review of your notes, and that’s not the only reason…
Fantastic Malware and Where to Find Them
https://ift.tt/2e8pdUi
Submitted May 19, 2018 at 08:12PM by dengorilla1
via reddit https://ift.tt/2KG1RWH
https://ift.tt/2e8pdUi
Submitted May 19, 2018 at 08:12PM by dengorilla1
via reddit https://ift.tt/2KG1RWH
Megabeets
Fantastic Malware and Where to Find Them – Megabeets
Megabeets collection of repositories, databases and lists that are containing malicious samples, domains and more.
Google Quietly Drops Privacy Policy that Kept Users’ Names Out of Massive Web-Tracking Database
https://ift.tt/2rWibeP
Submitted May 19, 2018 at 09:31PM by dengorilla1
via reddit https://ift.tt/2wUpNU3
https://ift.tt/2rWibeP
Submitted May 19, 2018 at 09:31PM by dengorilla1
via reddit https://ift.tt/2wUpNU3
AllGov
Google Quietly Drops Privacy Policy that Kept Users’ Names Out of Massive Web-Tracking Database
It means that Google can now build a complete portrait of a user by name, based on everything they write in email, every website they visit and the searches they conduct. The move is a sea change for Google and a further blow to the online ad industry’s longstanding…
IBM warns of instant breaking of encryption by quantum computers: 'Move your data today'
https://ift.tt/2GyMe0M
Submitted May 19, 2018 at 09:55PM by speckz
via reddit https://ift.tt/2kaUzyQ
https://ift.tt/2GyMe0M
Submitted May 19, 2018 at 09:55PM by speckz
via reddit https://ift.tt/2kaUzyQ
ZDNet
IBM warns of instant breaking of encryption by quantum computers: 'Move your data today'
Welcome to the future transparency of today as quantum computers reveal all currently encrypted secrets -- a viable scenario within just a few years.