CCleanup: A Vast Number of Machines at Risk
http://ift.tt/2x8g2AA
Submitted September 18, 2017 at 01:47PM by moviuro
via reddit http://ift.tt/2xaojRX
http://ift.tt/2x8g2AA
Submitted September 18, 2017 at 01:47PM by moviuro
via reddit http://ift.tt/2xaojRX
Talosintelligence
CCleanup: A Vast Number of Machines at Risk
A blog from the world class Intelligence Group, Talos, Cisco's Intelligence Group
Legitimate Pizza Hacking
http://ift.tt/2eSRCkf
Submitted September 18, 2017 at 12:52PM by CountDew
via reddit http://ift.tt/2jCitFY
http://ift.tt/2eSRCkf
Submitted September 18, 2017 at 12:52PM by CountDew
via reddit http://ift.tt/2jCitFY
Netcat tutorial
http://ift.tt/168a77s
Submitted September 18, 2017 at 01:47PM by liranbh
via reddit http://ift.tt/2wAkbJb
http://ift.tt/168a77s
Submitted September 18, 2017 at 01:47PM by liranbh
via reddit http://ift.tt/2wAkbJb
BinaryTides
Netcat tutorial – command examples on linux
Netcat is a commandline utility like telnet but with much more features. Learn to use netcat with these simple commands examples.
Chrome will label Resources delivered via FTP as “Not Secure”
http://ift.tt/2wmodtk
Submitted September 18, 2017 at 03:31PM by MicheeLengronne
via reddit http://ift.tt/2wpfDdB
http://ift.tt/2wmodtk
Submitted September 18, 2017 at 03:31PM by MicheeLengronne
via reddit http://ift.tt/2wpfDdB
Security Affairs
Chrome will label Resources delivered via FTP as "Not Secure"
Google continues the ongoing effort to communicate the transport security status of a given page labeling resources delivered via FTP as "Not secure",
welcome to our security service for you PC
http://ift.tt/2xKfm4S
Submitted September 18, 2017 at 04:04PM by flicmedia
via reddit http://ift.tt/2jCkZMl
http://ift.tt/2xKfm4S
Submitted September 18, 2017 at 04:04PM by flicmedia
via reddit http://ift.tt/2jCkZMl
www.flicmedia.co.uk
McAfee Customer Support Number 0800-368-9229
If you are facing any issue related to McAfee antivirus, then you can feel free to contact Live McAfee Antivirus technical support team and obtain the Live McAfee antivirus customer service by their technical expert. Our technicians will sorts of Live McAfee…
Want to add, modify or remove the spam filters from yahoo email?
http://ift.tt/2yj4yId
Submitted September 18, 2017 at 04:33PM by smithsgone
via reddit http://ift.tt/2wplzmC
http://ift.tt/2yj4yId
Submitted September 18, 2017 at 04:33PM by smithsgone
via reddit http://ift.tt/2wplzmC
Behance
Yahoo Support Number
Heap Exploitation ~ Fastbin Attack
http://ift.tt/2xfOmJo
Submitted September 18, 2017 at 06:01PM by Evil1337
via reddit http://ift.tt/2xsvkQu
http://ift.tt/2xfOmJo
Submitted September 18, 2017 at 06:01PM by Evil1337
via reddit http://ift.tt/2xsvkQu
what are the levels of security?
So I had another thread about wanting to be secure but apparently I wasn't specific enough of how secure I want to be. So what are the levels of security when it comes to being secure on my laptop?I want to be fully secure in the sense that hackers wouldn't be able to send me any viruses/keyloggers etc.. and I also want to have anonymity whilst browsing the web. I know tor is an option but tor isn't full anonymity (I believe I can also simply do that with trusted VPN services that don't hold logs)Thanks for any help. I did get some decent answers on the other thread but since some said I wasn't specific enough, I want to understand the levels so I can be more specific next time.
Submitted September 18, 2017 at 06:49PM by Spiritual-Abyss
via reddit http://ift.tt/2wqDw4w
So I had another thread about wanting to be secure but apparently I wasn't specific enough of how secure I want to be. So what are the levels of security when it comes to being secure on my laptop?I want to be fully secure in the sense that hackers wouldn't be able to send me any viruses/keyloggers etc.. and I also want to have anonymity whilst browsing the web. I know tor is an option but tor isn't full anonymity (I believe I can also simply do that with trusted VPN services that don't hold logs)Thanks for any help. I did get some decent answers on the other thread but since some said I wasn't specific enough, I want to understand the levels so I can be more specific next time.
Submitted September 18, 2017 at 06:49PM by Spiritual-Abyss
via reddit http://ift.tt/2wqDw4w
reddit
what are the levels of security? • r/security
So I had another thread about wanting to be secure but apparently I wasn't specific enough of how secure I want to be. So what are the levels of...
Read on the Web: Social engineering and ransomware
http://ift.tt/2f0UwGE
Submitted September 18, 2017 at 05:48PM by MicheeLengronne
via reddit http://ift.tt/2jCEHYv
http://ift.tt/2f0UwGE
Submitted September 18, 2017 at 05:48PM by MicheeLengronne
via reddit http://ift.tt/2jCEHYv
Limawi
Read on the Web: Social engineering and ransomware
Read on the Web: Of course, social engineering may play a vital part in persuading a victim to open a malicious executable or website that allows ransomware to get a foothold on the vi...
The Pirate Bay Website Runs a Cryptocurrency Miner (Updated)
http://ift.tt/2wwHe7C
Submitted September 18, 2017 at 07:11PM by d33pblu3g3n3
via reddit http://ift.tt/2fvgyi9
http://ift.tt/2wwHe7C
Submitted September 18, 2017 at 07:11PM by d33pblu3g3n3
via reddit http://ift.tt/2fvgyi9
TorrentFreak
The Pirate Bay Website Runs a Cryptocurrency Miner - TorrentFreak
A few hours ago a cryptocurrency miner appeared on The Pirate Bay website, using the computer resources of visitors to mine Monero coins. The operators of The Pirate Bay haven't commented on the issue so it remains unclear why the miner was added or by whom…
Optionsbleed - HTTP OPTIONS method can leak Apache's server memory
http://ift.tt/2xbidAO
Submitted September 18, 2017 at 06:38PM by oherrala
via reddit http://ift.tt/2h9Q0X7
http://ift.tt/2xbidAO
Submitted September 18, 2017 at 06:38PM by oherrala
via reddit http://ift.tt/2h9Q0X7
reddit
Optionsbleed - HTTP OPTIONS method can leak Apache's... • r/netsec
1 points and 0 comments so far on reddit
Security In 5: Episode 70 - Why The Equifax Breach Is So Dangerous For Everyone
http://ift.tt/2f4IMjb
Submitted September 18, 2017 at 07:28PM by BinaryBlog
via reddit http://ift.tt/2w2ZQMZ
http://ift.tt/2f4IMjb
Submitted September 18, 2017 at 07:28PM by BinaryBlog
via reddit http://ift.tt/2w2ZQMZ
Libsyn
Security In Five Podcast: Episode 70 - Why The Equifax Breach Is So Dangerous For Everyone
The Equifax breach is one of the largest thus far. Unlike other breaches this one could be far more damaging for people who had their data stolen. It comes down to the type of data that was lost. This episode covers why this could be dangerous for everyone…
CCleaner 5.33 Backdoor: A Vast Number of Machines at Risk
http://ift.tt/2x8g2AA
Submitted September 18, 2017 at 07:41PM by SergeyGor
via reddit http://ift.tt/2f57tf1
http://ift.tt/2x8g2AA
Submitted September 18, 2017 at 07:41PM by SergeyGor
via reddit http://ift.tt/2f57tf1
Talosintelligence
CCleanup: A Vast Number of Machines at Risk
A blog from the world class Intelligence Group, Talos, Cisco's Intelligence Group
Week in review: major security incidents in September 11-17
http://ift.tt/2yl0do3
Submitted September 18, 2017 at 08:03PM by CybersecurityHelp
via reddit http://ift.tt/2wpC564
http://ift.tt/2yl0do3
Submitted September 18, 2017 at 08:03PM by CybersecurityHelp
via reddit http://ift.tt/2wpC564
www.cybersecurity-help.cz
Week in review: major security incidents in September 11-17
The article contains a brief report of cybersecurity incidents for the past week.
Videos of all USENIX Security '17 presentations
https://www.youtube.com/playlist?list=PLbRoZ5Rrl5leSmnr5gJpvedQ3oj2ostRR
Submitted September 18, 2017 at 11:24AM by campuscodi
via reddit http://ift.tt/2y974Qc
https://www.youtube.com/playlist?list=PLbRoZ5Rrl5leSmnr5gJpvedQ3oj2ostRR
Submitted September 18, 2017 at 11:24AM by campuscodi
via reddit http://ift.tt/2y974Qc
reddit
Videos of all USENIX Security '17 presentations • r/netsec
5 points and 0 comments so far on reddit
How TrickBot tricks its victims with web injects
http://ift.tt/2x9eu9y
Submitted September 18, 2017 at 09:53PM by _toti
via reddit http://ift.tt/2wBsgNW
http://ift.tt/2x9eu9y
Submitted September 18, 2017 at 09:53PM by _toti
via reddit http://ift.tt/2wBsgNW
AWS Extender - A burp plugin for assessing cloud based web apps
http://ift.tt/2yjTOtb
Submitted September 18, 2017 at 10:49PM by virtue-elliott
via reddit http://ift.tt/2fvh0wQ
http://ift.tt/2yjTOtb
Submitted September 18, 2017 at 10:49PM by virtue-elliott
via reddit http://ift.tt/2fvh0wQ
Virtue Security
AWS Penetration Testing Part 1 - S3 Buckets - Virtue Security
Penetration Testing AWS Services AWS Penetration Testing Part 1. S3 Buckets Amazon Web Services (AWS) provides some of the most powerful and robust infrastructure for modern web applications. As with all new functionality on the web, new security considerations…
Have I been pwned list at 99.34% on Hashes.org by community effort.
http://ift.tt/1oe1K30
Submitted September 18, 2017 at 10:38PM by s3inlc
via reddit http://ift.tt/2xcSuIj
http://ift.tt/1oe1K30
Submitted September 18, 2017 at 10:38PM by s3inlc
via reddit http://ift.tt/2xcSuIj
hashes.org
Hashes.org - Leaked Lists
Hashes.org is a community recovering password from submitted hashes.
Just because Docker images are official doesn't mean they have the same update strategy.
http://ift.tt/2ffCZLh
Submitted September 18, 2017 at 10:31PM by weighanchore
via reddit http://ift.tt/2xcNUcW
http://ift.tt/2ffCZLh
Submitted September 18, 2017 at 10:31PM by weighanchore
via reddit http://ift.tt/2xcNUcW
Anchore
A Look at How Often Docker Images are Updated
In our last blog, we reported on operating systems usage on DockerHub, focusing on official base images. Most users do not build their container image from scratch they built on top of these base images, for example extending an image such as library/alpine:latest…
Anyone Familiar With Cybersecurity Framework? How do you document your implementation? [x-post from /r/cybersecurity]
We're taking a look at implementing NIST's cybersecurity framework and we've downloaded the papers and Core template, but have no idea how to document the implementation. Is there a checklist or implementation template you can fill out? Or better yet, is there a tool out there that can be used that might show your progress? How did you document your implementation?
Submitted September 19, 2017 at 12:31AM by alaskaline
via reddit http://ift.tt/2wqI3DZ
We're taking a look at implementing NIST's cybersecurity framework and we've downloaded the papers and Core template, but have no idea how to document the implementation. Is there a checklist or implementation template you can fill out? Or better yet, is there a tool out there that can be used that might show your progress? How did you document your implementation?
Submitted September 19, 2017 at 12:31AM by alaskaline
via reddit http://ift.tt/2wqI3DZ
reddit
Anyone Familiar With Cybersecurity Framework? How do... • r/security
We're taking a look at implementing NIST's cybersecurity framework and we've downloaded the papers and Core template, but have no idea how to...
Researchers Discover New Android Banking Trojan
http://ift.tt/2xKIw4d
Submitted September 19, 2017 at 01:37AM by majorllama
via reddit http://ift.tt/2fvWsEq
http://ift.tt/2xKIw4d
Submitted September 19, 2017 at 01:37AM by majorllama
via reddit http://ift.tt/2fvWsEq
BleepingComputer
Researchers Discover New Android Banking Trojan
Security researchers have detected a new Android banking trojan by the name of Red Alert 2.0 that was developed during the past few months and has been recently rolled out into distribution.