Netsec – Telegram
Netsec
7.38K subscribers
22.3K links
This channel posts the feed from r/netsec.
For any suggestions dm @streaak
Donate to keep the bot running https://www.paypal.me/akhilgv
Download Telegram
what is recent trends in IoT Security Industry ?
A robust IoT solution approach should focus not only securing the infrastructure and devices, which forms the base of IoT system, but also should develop the accurate level of data privacy and building trust with regulators and customers. The most successful and trusted IoT tech companies and solutions provider would be those that equally focuses on protecting privacy, improving security, and building trust. Privacy of user’s identity, payment details and other documents of high importance is at stake with the connection of everyday essential objects with the internet. Thus, IoT security plays the most critical role in implementation of IoT and gaining the customer’s trust. The above mentioned reasons are going to drive the market of IoT security along with the implementation of IoT.IoT creates immense opportunities to benefit the multiple business segments and society, with rise in the use of network-connected devices, systems, and services. Nevertheless, IoT security has not grown with the same pace of revolution and deployment, thus creating extensive economic and safety risks. As there is increase in integrated network connections into critical infrastructure, important processes that are performed digitally are becoming more vulnerable to cyber threats. Increasing dependence on network-connected technologies has grown faster than the means to secure it. http://ift.tt/2xeAmQ0

Submitted September 18, 2017 at 10:36AM by mily_D
via reddit http://ift.tt/2wA83I4
Legitimate Pizza Hacking
http://ift.tt/2eSRCkf

Submitted September 18, 2017 at 12:52PM by CountDew
via reddit http://ift.tt/2jCitFY
Want to add, modify or remove the spam filters from yahoo email?
http://ift.tt/2yj4yId

Submitted September 18, 2017 at 04:33PM by smithsgone
via reddit http://ift.tt/2wplzmC
Heap Exploitation ~ Fastbin Attack
http://ift.tt/2xfOmJo

Submitted September 18, 2017 at 06:01PM by Evil1337
via reddit http://ift.tt/2xsvkQu
what are the levels of security?
So I had another thread about wanting to be secure but apparently I wasn't specific enough of how secure I want to be. So what are the levels of security when it comes to being secure on my laptop?I want to be fully secure in the sense that hackers wouldn't be able to send me any viruses/keyloggers etc.. and I also want to have anonymity whilst browsing the web. I know tor is an option but tor isn't full anonymity (I believe I can also simply do that with trusted VPN services that don't hold logs)Thanks for any help. I did get some decent answers on the other thread but since some said I wasn't specific enough, I want to understand the levels so I can be more specific next time.

Submitted September 18, 2017 at 06:49PM by Spiritual-Abyss
via reddit http://ift.tt/2wqDw4w
Optionsbleed - HTTP OPTIONS method can leak Apache's server memory
http://ift.tt/2xbidAO

Submitted September 18, 2017 at 06:38PM by oherrala
via reddit http://ift.tt/2h9Q0X7
CCleaner 5.33 Backdoor: A Vast Number of Machines at Risk
http://ift.tt/2x8g2AA

Submitted September 18, 2017 at 07:41PM by SergeyGor
via reddit http://ift.tt/2f57tf1
How TrickBot tricks its victims with web injects
http://ift.tt/2x9eu9y

Submitted September 18, 2017 at 09:53PM by _toti
via reddit http://ift.tt/2wBsgNW
Have I been pwned list at 99.34% on Hashes.org by community effort.
http://ift.tt/1oe1K30

Submitted September 18, 2017 at 10:38PM by s3inlc
via reddit http://ift.tt/2xcSuIj
Anyone Familiar With Cybersecurity Framework? How do you document your implementation? [x-post from /r/cybersecurity]
We're taking a look at implementing NIST's cybersecurity framework and we've downloaded the papers and Core template, but have no idea how to document the implementation. Is there a checklist or implementation template you can fill out? Or better yet, is there a tool out there that can be used that might show your progress? How did you document your implementation?

Submitted September 19, 2017 at 12:31AM by alaskaline
via reddit http://ift.tt/2wqI3DZ