Common WiFi Attacks And How To Detect Them
http://ift.tt/2fyaxkq
Submitted September 20, 2017 at 02:47AM by lennartkoopmann
via reddit http://ift.tt/2xdpUZS
http://ift.tt/2fyaxkq
Submitted September 20, 2017 at 02:47AM by lennartkoopmann
via reddit http://ift.tt/2xdpUZS
wtf.horse
Common WiFi attacks and how to detect them
I'm talking about DFIR (Digital Forensics and Incident Response) for WiFi networks at DerbyCon 2017 and will be releasing nzyme (an open source tool to record and forward 802.11 management frames into Graylog for WiFi security monitoring and incident response)…
An (un)documented Word feature abused by attackers
http://ift.tt/2x7yk51
Submitted September 19, 2017 at 01:37AM by majorllama
via reddit http://ift.tt/2fyR17C
http://ift.tt/2x7yk51
Submitted September 19, 2017 at 01:37AM by majorllama
via reddit http://ift.tt/2fyR17C
Securelist - Information about Viruses, Hackers and Spam
An (un)documented Word feature abused by attackers
A little while back we were investigating the malicious activities of the Freakyshelly targeted attack and came across spear phishing emails that had some interesting documents attached to them. They were in OLE2 format and contained no macros, exploits or…
Found this older but still accurate graph of pen testing...
http://ift.tt/2ypnCEK
Submitted September 20, 2017 at 02:52AM by weev1
via reddit http://ift.tt/2wuwFqp
http://ift.tt/2ypnCEK
Submitted September 20, 2017 at 02:52AM by weev1
via reddit http://ift.tt/2wuwFqp
Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malicious sample and automatically generates a list of mutexes that could be used to as “vaccines” against the sample.
http://ift.tt/2ynPSHV
Submitted September 20, 2017 at 03:41AM by GelosSnake
via reddit http://ift.tt/2heSuUr
http://ift.tt/2ynPSHV
Submitted September 20, 2017 at 03:41AM by GelosSnake
via reddit http://ift.tt/2heSuUr
GitHub
MinervaLabsResearch/Mystique
Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malicious sample and automatically generates a list of mutexes tha...
Security
How to deal with acts of terrorism on large scale and also how to deal with a helicopter pilot and gunman on a chopper?
Submitted September 20, 2017 at 05:47AM by twistedslut
via reddit http://ift.tt/2hgESUV
How to deal with acts of terrorism on large scale and also how to deal with a helicopter pilot and gunman on a chopper?
Submitted September 20, 2017 at 05:47AM by twistedslut
via reddit http://ift.tt/2hgESUV
reddit
Security • r/security
How to deal with acts of terrorism on large scale and also how to deal with a helicopter pilot and gunman on a chopper?
Malware Uses Security Cameras With Infrared Capabilities to Steal Data
http://ift.tt/2xkzB7W
Submitted September 20, 2017 at 06:55AM by majorllama
via reddit http://ift.tt/2xPSdOy
http://ift.tt/2xkzB7W
Submitted September 20, 2017 at 06:55AM by majorllama
via reddit http://ift.tt/2xPSdOy
BleepingComputer
Malware Uses Security Cameras With Infrared Capabilities to Steal Data
Proof-of-concept malware created by a team of Israeli researchers uses the infrared capabilities of modern security cameras as a channel for data exfiltration, but also to receive new commands from its operators.
Network Attacks Containing Cryptocurrency CPU Mining Tools Grow Sixfold
http://ift.tt/2w4uhTb
Submitted September 20, 2017 at 06:15AM by cybertrust
via reddit http://ift.tt/2w5NwM9
http://ift.tt/2w4uhTb
Submitted September 20, 2017 at 06:15AM by cybertrust
via reddit http://ift.tt/2w5NwM9
Security Intelligence
Network Attacks Containing Cryptocurrency CPU Mining Tools Grow Sixfold
IBM Managed Security Services (MSS) detected a sixfold increase in attacks involving embedded CPU mining tools between January and August 2017.
Smartphone protection from Juice Jacking attacks
https://youtu.be/aTnTppAW91I
Submitted September 20, 2017 at 07:07AM by montaelkins
via reddit http://ift.tt/2xluLHx
https://youtu.be/aTnTppAW91I
Submitted September 20, 2017 at 07:07AM by montaelkins
via reddit http://ift.tt/2xluLHx
YouTube
Smartphone Protection
How to protect your Smartphone from an attack known as Juice Jacking.
Tips on What to Do After Home Break-in
http://ift.tt/2xdBKTR
Submitted September 20, 2017 at 11:22AM by OneTecSecurity
via reddit http://ift.tt/2fySZ7V
http://ift.tt/2xdBKTR
Submitted September 20, 2017 at 11:22AM by OneTecSecurity
via reddit http://ift.tt/2fySZ7V
iTerm2 Leaks Everything You Hover in Your Terminal via DNS Requests
http://ift.tt/2xPpg5n
Submitted September 20, 2017 at 02:01PM by baggyzed
via reddit http://ift.tt/2xg9I7N
http://ift.tt/2xPpg5n
Submitted September 20, 2017 at 02:01PM by baggyzed
via reddit http://ift.tt/2xg9I7N
BleepingComputer
iTerm2 Leaks Everything You Hover in Your Terminal via DNS Requests
iTerm2, a popular Mac application that comes as a replacement for Apple's official Terminal app, just received a security fix minutes ago for a severe security issue that leaked terminal content via DNS requests.
iTerm2 Leaks Everything You Hover in Your Terminal via DNS Requests
http://ift.tt/2xPpg5n
Submitted September 20, 2017 at 02:01PM by baggyzed
via reddit http://ift.tt/2xg9I7N
http://ift.tt/2xPpg5n
Submitted September 20, 2017 at 02:01PM by baggyzed
via reddit http://ift.tt/2xg9I7N
BleepingComputer
iTerm2 Leaks Everything You Hover in Your Terminal via DNS Requests
iTerm2, a popular Mac application that comes as a replacement for Apple's official Terminal app, just received a security fix minutes ago for a severe security issue that leaked terminal content via DNS requests.
iTerm2 Leaks Everything You Hover in Your Terminal via DNS Requests
http://ift.tt/2xPpg5n
Submitted September 20, 2017 at 02:01PM by baggyzed
via reddit http://ift.tt/2xg9I7N
http://ift.tt/2xPpg5n
Submitted September 20, 2017 at 02:01PM by baggyzed
via reddit http://ift.tt/2xg9I7N
BleepingComputer
iTerm2 Leaks Everything You Hover in Your Terminal via DNS Requests
iTerm2, a popular Mac application that comes as a replacement for Apple's official Terminal app, just received a security fix minutes ago for a severe security issue that leaked terminal content via DNS requests.
Manchester police still using Windows XP
http://ift.tt/2xPIIzd
Submitted September 20, 2017 at 01:35PM by Benjaminsen
via reddit http://ift.tt/2jHdzYa
http://ift.tt/2xPIIzd
Submitted September 20, 2017 at 01:35PM by Benjaminsen
via reddit http://ift.tt/2jHdzYa
BBC News
Manchester police still relies on Windows XP
More than 20% of Greater Manchester Police's PCs run on the operating system, posing a hack risk.
Is there a community review site of pentesters?
I've been dealing with a couple of high-profile security outfits (well indirectly, the actual pen testing was further outsourced to them by the IT outsourcers actually managing the whole thing) and we've found the level of hole-spotting pretty inadequate.I let them loose on a test setup that we created by cloning a part of our existing infrastructure along with a few tweaks both obvious and not so obvious, and among other really pretty basic issues they e.g. missed "changeme" on an Internet-facing appliance (though I was amazed that wasn't owned by someone else in seconds).I went in to the results presentation as the techidiot senior management, requested it be told to me in a form I can understand because I can barely use my iPad ha, and I got the full force of the sales pitch. What was really egregious was that "problems" which aren't exploitable problems in the state they are that they did find were skewed to be major security holes.If we're shelling out the bucks for the regular testing and reporting I'd rather we got in someone who is actually good at this, instead of an extensively accredited outfit with excellent documentation suited for box-ticking who's actually pretty shite.I have zero personal contacts in the netsec field, and neither do my IT. So I'm faced with how do I go hunting for potential pentesters. What are good resources? Thanks
Submitted September 20, 2017 at 04:05PM by durabledildo
via reddit http://ift.tt/2hgpEPy
I've been dealing with a couple of high-profile security outfits (well indirectly, the actual pen testing was further outsourced to them by the IT outsourcers actually managing the whole thing) and we've found the level of hole-spotting pretty inadequate.I let them loose on a test setup that we created by cloning a part of our existing infrastructure along with a few tweaks both obvious and not so obvious, and among other really pretty basic issues they e.g. missed "changeme" on an Internet-facing appliance (though I was amazed that wasn't owned by someone else in seconds).I went in to the results presentation as the techidiot senior management, requested it be told to me in a form I can understand because I can barely use my iPad ha, and I got the full force of the sales pitch. What was really egregious was that "problems" which aren't exploitable problems in the state they are that they did find were skewed to be major security holes.If we're shelling out the bucks for the regular testing and reporting I'd rather we got in someone who is actually good at this, instead of an extensively accredited outfit with excellent documentation suited for box-ticking who's actually pretty shite.I have zero personal contacts in the netsec field, and neither do my IT. So I'm faced with how do I go hunting for potential pentesters. What are good resources? Thanks
Submitted September 20, 2017 at 04:05PM by durabledildo
via reddit http://ift.tt/2hgpEPy
reddit
Is there a community review site of pentesters? • r/security
I've been dealing with a couple of high-profile security outfits (well indirectly, the actual pen testing was further outsourced to them by the IT...
Shoplifting: Defeating Theft Detection and Prevention Technology
http://ift.tt/2wxL9Gj
Submitted September 20, 2017 at 04:40PM by MicheeLengronne
via reddit http://ift.tt/2jJDNcG
http://ift.tt/2wxL9Gj
Submitted September 20, 2017 at 04:40PM by MicheeLengronne
via reddit http://ift.tt/2jJDNcG
IT SECURITY GURU
Shoplifting: Defeating Theft Detection and Prevention Technology - IT SECURITY GURU
Typically considered one of the most accessible and in many cases least-sophisticated types of crime, shoplifting persists as an undeniably damaging affliction across the retail sector. In fact, the National Retail Security Survey reported that loss of inventory…
Concept: Malware Uses Security Cameras With Infrared Capabilities to Steal Data
http://ift.tt/2xkzB7W
Submitted September 20, 2017 at 04:32PM by Hamm3rH3ad
via reddit http://ift.tt/2xn5xIZ
http://ift.tt/2xkzB7W
Submitted September 20, 2017 at 04:32PM by Hamm3rH3ad
via reddit http://ift.tt/2xn5xIZ
BleepingComputer
Malware Uses Security Cameras With Infrared Capabilities to Steal Data
Proof-of-concept malware created by a team of Israeli researchers uses the infrared capabilities of modern security cameras as a channel for data exfiltration, but also to receive new commands from its operators.
How to contact yahoo experts by Phone!
http://ift.tt/2wGhs0Z
Submitted September 20, 2017 at 05:20PM by smithsgone
via reddit http://ift.tt/2xmIpud
http://ift.tt/2wGhs0Z
Submitted September 20, 2017 at 05:20PM by smithsgone
via reddit http://ift.tt/2xmIpud
contact-yahoo-phone
How To Contact Yahoo Experts By Phone? | contact-yahoo-phone
Yahoo email services are now being used by millions of users, cutting across geographical locations and language barriers. What makes Yahoo popular among the us...
Top SECURITY SERVICES IN Noida-NCR -Security A1 .Com
http://ift.tt/2xgxnow
Submitted September 20, 2017 at 05:41PM by ayeonemanagement
via reddit http://ift.tt/2ydnffp
http://ift.tt/2xgxnow
Submitted September 20, 2017 at 05:41PM by ayeonemanagement
via reddit http://ift.tt/2ydnffp
Security-A1
Security Services in Noida-NCR | Best Security Services in Noida - Aye One Management
Security Services in Noida - Aye One Management is leading Security Service Providers in Noida, provid Security Services in Noida-NCR. We offer Best Security Services in Delhi/Gurgaon/Noida/NCR.
Read on the Web: Google Chrome Will Mark FTP Resources As “Not Secure”
http://ift.tt/2xgo6wD
Submitted September 20, 2017 at 05:09PM by MicheeLengronne
via reddit http://ift.tt/2wG51lR
http://ift.tt/2xgo6wD
Submitted September 20, 2017 at 05:09PM by MicheeLengronne
via reddit http://ift.tt/2wG51lR
Limawi
Read on the Web: Google Chrome Will Mark FTP Resources As “Not Secure”
Read on the Web: It seems like Google is making some serious changes in its products, especially Chrome browser to provide users a smooth experience and better security.
The Once and Future Onion | Paul Syverson
http://ift.tt/2xixwba
Submitted September 20, 2017 at 05:06PM by IntroductionPoints
via reddit http://ift.tt/2yoNe4p
http://ift.tt/2xixwba
Submitted September 20, 2017 at 05:06PM by IntroductionPoints
via reddit http://ift.tt/2yoNe4p
Breaking out of restricted windows environment
http://ift.tt/2hgzXDx
Submitted September 20, 2017 at 04:53PM by kapilajain23
via reddit http://ift.tt/2ydlPl1
http://ift.tt/2hgzXDx
Submitted September 20, 2017 at 04:53PM by kapilajain23
via reddit http://ift.tt/2ydlPl1