Why I can't defend Equifax’s CISO
http://ift.tt/2xrpe2R
Submitted September 18, 2017 at 03:07AM by alekseykorzun
via reddit http://ift.tt/2xdTvl0
http://ift.tt/2xrpe2R
Submitted September 18, 2017 at 03:07AM by alekseykorzun
via reddit http://ift.tt/2xdTvl0
Medium
Why I can’t defend Equifax’s CISO
The Equifax breach that impacted over 143 million of Americans prompted a witch-hunt that targeted Equifax employees that were responsible…
Alaska Voter Database Exposed Online
http://ift.tt/2fqRnNn
Submitted September 18, 2017 at 04:38AM by weev1
via reddit http://ift.tt/2xrbFA8
http://ift.tt/2fqRnNn
Submitted September 18, 2017 at 04:38AM by weev1
via reddit http://ift.tt/2xrbFA8
HackRead
Alaska Voter Database Exposed Online
IT security researchers at Kromtech Security Center discovered an unprotected database exposed online due to misconfiguration of CouchDB containing nearly
Enumerating process, thread, and image load notification callback routines in Windows
http://ift.tt/2y800n7
Submitted September 18, 2017 at 05:19AM by 0xNemi
via reddit http://ift.tt/2yjXM58
http://ift.tt/2y800n7
Submitted September 18, 2017 at 05:19AM by 0xNemi
via reddit http://ift.tt/2yjXM58
www.triplefault.io
Enumerating process, thread, and image load notification callback routines in Windows
A blog about general reverse engineering, security research, poking around Windows internals, and messing with the Intel x86/AMD64 architecture.
PyDHE - A fully python Diffie-Hellman API
http://ift.tt/2wArP6o
Submitted September 18, 2017 at 06:20AM by sirKareon
via reddit http://ift.tt/2y8nSaf
http://ift.tt/2wArP6o
Submitted September 18, 2017 at 06:20AM by sirKareon
via reddit http://ift.tt/2y8nSaf
GitHub
deadPix3l/pyDHE
pyDHE - a fully python Diffie-Hellman Library
This is a walkthrough of Kioptrix Level 1.2 from vulnhub.com where I exploit LotusCMS and escalate privileges using a misconfiguration. If you know of other ways to solve this VM please post below.
http://ift.tt/2xdZ6rr
Submitted September 18, 2017 at 07:28AM by InfoSecJim
via reddit http://ift.tt/2wzL14e
http://ift.tt/2xdZ6rr
Submitted September 18, 2017 at 07:28AM by InfoSecJim
via reddit http://ift.tt/2wzL14e
Jim Wilbur's Blog
Kioptrix: Level 1.2 Walkthrough – Vulnhub - Jim Wilbur's Blog
This is a walkthrough of Kioptrix Level 1.2 from vulnhub.com where I exploit LotusCMS and escalate privileges using a misconfiguration.
Struts S2-052 Vulnerable Bootable ISO
http://ift.tt/2wo8oCv
Submitted September 18, 2017 at 11:57AM by Gallus
via reddit http://ift.tt/2fe7EbA
http://ift.tt/2wo8oCv
Submitted September 18, 2017 at 11:57AM by Gallus
via reddit http://ift.tt/2fe7EbA
Pentesterlab
[PentesterLab] S2-052
How I Snatched 153,037 ETH After A Bad Tinder Date
http://ift.tt/2jlZ5ge
Submitted September 18, 2017 at 11:29AM by purplexxx
via reddit http://ift.tt/2woRMdW
http://ift.tt/2jlZ5ge
Submitted September 18, 2017 at 11:29AM by purplexxx
via reddit http://ift.tt/2woRMdW
Medium
How I Snatched 153,037 ETH After A Bad Tinder Date
Over the weekend, I did a lot of swiping right. I’ve never had a Tinder go this fast from match to agreeing on a date time this fast before…
Cyber Hacking News - Cyware
http://ift.tt/2w38paU
Submitted September 18, 2017 at 11:53AM by cywarelabs
via reddit http://ift.tt/2f3OIsC
http://ift.tt/2w38paU
Submitted September 18, 2017 at 11:53AM by cywarelabs
via reddit http://ift.tt/2f3OIsC
Cyware
Cyber Hacking News | Internet Hacking, Social Media Hackers News | Cyware
Get latest news about top cyber hacking, Social Media hackers, security trends and Internet Hacking. Cyware bring you the world’s most up-to-date and relevant news articles.
what is recent trends in IoT Security Industry ?
A robust IoT solution approach should focus not only securing the infrastructure and devices, which forms the base of IoT system, but also should develop the accurate level of data privacy and building trust with regulators and customers. The most successful and trusted IoT tech companies and solutions provider would be those that equally focuses on protecting privacy, improving security, and building trust. Privacy of user’s identity, payment details and other documents of high importance is at stake with the connection of everyday essential objects with the internet. Thus, IoT security plays the most critical role in implementation of IoT and gaining the customer’s trust. The above mentioned reasons are going to drive the market of IoT security along with the implementation of IoT.IoT creates immense opportunities to benefit the multiple business segments and society, with rise in the use of network-connected devices, systems, and services. Nevertheless, IoT security has not grown with the same pace of revolution and deployment, thus creating extensive economic and safety risks. As there is increase in integrated network connections into critical infrastructure, important processes that are performed digitally are becoming more vulnerable to cyber threats. Increasing dependence on network-connected technologies has grown faster than the means to secure it. http://ift.tt/2xeAmQ0
Submitted September 18, 2017 at 10:36AM by mily_D
via reddit http://ift.tt/2wA83I4
A robust IoT solution approach should focus not only securing the infrastructure and devices, which forms the base of IoT system, but also should develop the accurate level of data privacy and building trust with regulators and customers. The most successful and trusted IoT tech companies and solutions provider would be those that equally focuses on protecting privacy, improving security, and building trust. Privacy of user’s identity, payment details and other documents of high importance is at stake with the connection of everyday essential objects with the internet. Thus, IoT security plays the most critical role in implementation of IoT and gaining the customer’s trust. The above mentioned reasons are going to drive the market of IoT security along with the implementation of IoT.IoT creates immense opportunities to benefit the multiple business segments and society, with rise in the use of network-connected devices, systems, and services. Nevertheless, IoT security has not grown with the same pace of revolution and deployment, thus creating extensive economic and safety risks. As there is increase in integrated network connections into critical infrastructure, important processes that are performed digitally are becoming more vulnerable to cyber threats. Increasing dependence on network-connected technologies has grown faster than the means to secure it. http://ift.tt/2xeAmQ0
Submitted September 18, 2017 at 10:36AM by mily_D
via reddit http://ift.tt/2wA83I4
Theinsightpartners
IoT Security Market by Type, Solution and Application | The Insight Partners
[150 Pages Report] IoT Security Market by Type, Solution and Application
CCleanup: A Vast Number of Machines at Risk
http://ift.tt/2x8g2AA
Submitted September 18, 2017 at 01:47PM by moviuro
via reddit http://ift.tt/2xaojRX
http://ift.tt/2x8g2AA
Submitted September 18, 2017 at 01:47PM by moviuro
via reddit http://ift.tt/2xaojRX
Talosintelligence
CCleanup: A Vast Number of Machines at Risk
A blog from the world class Intelligence Group, Talos, Cisco's Intelligence Group
Legitimate Pizza Hacking
http://ift.tt/2eSRCkf
Submitted September 18, 2017 at 12:52PM by CountDew
via reddit http://ift.tt/2jCitFY
http://ift.tt/2eSRCkf
Submitted September 18, 2017 at 12:52PM by CountDew
via reddit http://ift.tt/2jCitFY
Netcat tutorial
http://ift.tt/168a77s
Submitted September 18, 2017 at 01:47PM by liranbh
via reddit http://ift.tt/2wAkbJb
http://ift.tt/168a77s
Submitted September 18, 2017 at 01:47PM by liranbh
via reddit http://ift.tt/2wAkbJb
BinaryTides
Netcat tutorial – command examples on linux
Netcat is a commandline utility like telnet but with much more features. Learn to use netcat with these simple commands examples.
Chrome will label Resources delivered via FTP as “Not Secure”
http://ift.tt/2wmodtk
Submitted September 18, 2017 at 03:31PM by MicheeLengronne
via reddit http://ift.tt/2wpfDdB
http://ift.tt/2wmodtk
Submitted September 18, 2017 at 03:31PM by MicheeLengronne
via reddit http://ift.tt/2wpfDdB
Security Affairs
Chrome will label Resources delivered via FTP as "Not Secure"
Google continues the ongoing effort to communicate the transport security status of a given page labeling resources delivered via FTP as "Not secure",
welcome to our security service for you PC
http://ift.tt/2xKfm4S
Submitted September 18, 2017 at 04:04PM by flicmedia
via reddit http://ift.tt/2jCkZMl
http://ift.tt/2xKfm4S
Submitted September 18, 2017 at 04:04PM by flicmedia
via reddit http://ift.tt/2jCkZMl
www.flicmedia.co.uk
McAfee Customer Support Number 0800-368-9229
If you are facing any issue related to McAfee antivirus, then you can feel free to contact Live McAfee Antivirus technical support team and obtain the Live McAfee antivirus customer service by their technical expert. Our technicians will sorts of Live McAfee…
Want to add, modify or remove the spam filters from yahoo email?
http://ift.tt/2yj4yId
Submitted September 18, 2017 at 04:33PM by smithsgone
via reddit http://ift.tt/2wplzmC
http://ift.tt/2yj4yId
Submitted September 18, 2017 at 04:33PM by smithsgone
via reddit http://ift.tt/2wplzmC
Behance
Yahoo Support Number
Heap Exploitation ~ Fastbin Attack
http://ift.tt/2xfOmJo
Submitted September 18, 2017 at 06:01PM by Evil1337
via reddit http://ift.tt/2xsvkQu
http://ift.tt/2xfOmJo
Submitted September 18, 2017 at 06:01PM by Evil1337
via reddit http://ift.tt/2xsvkQu
what are the levels of security?
So I had another thread about wanting to be secure but apparently I wasn't specific enough of how secure I want to be. So what are the levels of security when it comes to being secure on my laptop?I want to be fully secure in the sense that hackers wouldn't be able to send me any viruses/keyloggers etc.. and I also want to have anonymity whilst browsing the web. I know tor is an option but tor isn't full anonymity (I believe I can also simply do that with trusted VPN services that don't hold logs)Thanks for any help. I did get some decent answers on the other thread but since some said I wasn't specific enough, I want to understand the levels so I can be more specific next time.
Submitted September 18, 2017 at 06:49PM by Spiritual-Abyss
via reddit http://ift.tt/2wqDw4w
So I had another thread about wanting to be secure but apparently I wasn't specific enough of how secure I want to be. So what are the levels of security when it comes to being secure on my laptop?I want to be fully secure in the sense that hackers wouldn't be able to send me any viruses/keyloggers etc.. and I also want to have anonymity whilst browsing the web. I know tor is an option but tor isn't full anonymity (I believe I can also simply do that with trusted VPN services that don't hold logs)Thanks for any help. I did get some decent answers on the other thread but since some said I wasn't specific enough, I want to understand the levels so I can be more specific next time.
Submitted September 18, 2017 at 06:49PM by Spiritual-Abyss
via reddit http://ift.tt/2wqDw4w
reddit
what are the levels of security? • r/security
So I had another thread about wanting to be secure but apparently I wasn't specific enough of how secure I want to be. So what are the levels of...
Read on the Web: Social engineering and ransomware
http://ift.tt/2f0UwGE
Submitted September 18, 2017 at 05:48PM by MicheeLengronne
via reddit http://ift.tt/2jCEHYv
http://ift.tt/2f0UwGE
Submitted September 18, 2017 at 05:48PM by MicheeLengronne
via reddit http://ift.tt/2jCEHYv
Limawi
Read on the Web: Social engineering and ransomware
Read on the Web: Of course, social engineering may play a vital part in persuading a victim to open a malicious executable or website that allows ransomware to get a foothold on the vi...
The Pirate Bay Website Runs a Cryptocurrency Miner (Updated)
http://ift.tt/2wwHe7C
Submitted September 18, 2017 at 07:11PM by d33pblu3g3n3
via reddit http://ift.tt/2fvgyi9
http://ift.tt/2wwHe7C
Submitted September 18, 2017 at 07:11PM by d33pblu3g3n3
via reddit http://ift.tt/2fvgyi9
TorrentFreak
The Pirate Bay Website Runs a Cryptocurrency Miner - TorrentFreak
A few hours ago a cryptocurrency miner appeared on The Pirate Bay website, using the computer resources of visitors to mine Monero coins. The operators of The Pirate Bay haven't commented on the issue so it remains unclear why the miner was added or by whom…
Optionsbleed - HTTP OPTIONS method can leak Apache's server memory
http://ift.tt/2xbidAO
Submitted September 18, 2017 at 06:38PM by oherrala
via reddit http://ift.tt/2h9Q0X7
http://ift.tt/2xbidAO
Submitted September 18, 2017 at 06:38PM by oherrala
via reddit http://ift.tt/2h9Q0X7
reddit
Optionsbleed - HTTP OPTIONS method can leak Apache's... • r/netsec
1 points and 0 comments so far on reddit
Security In 5: Episode 70 - Why The Equifax Breach Is So Dangerous For Everyone
http://ift.tt/2f4IMjb
Submitted September 18, 2017 at 07:28PM by BinaryBlog
via reddit http://ift.tt/2w2ZQMZ
http://ift.tt/2f4IMjb
Submitted September 18, 2017 at 07:28PM by BinaryBlog
via reddit http://ift.tt/2w2ZQMZ
Libsyn
Security In Five Podcast: Episode 70 - Why The Equifax Breach Is So Dangerous For Everyone
The Equifax breach is one of the largest thus far. Unlike other breaches this one could be far more damaging for people who had their data stolen. It comes down to the type of data that was lost. This episode covers why this could be dangerous for everyone…