NuCypher KMS (decentralized key management system) - development roadmap
http://ift.tt/2xKSstn
Submitted September 28, 2017 at 02:41AM by michwill
via reddit http://ift.tt/2y8oYqo
http://ift.tt/2xKSstn
Submitted September 28, 2017 at 02:41AM by michwill
via reddit http://ift.tt/2y8oYqo
Medium
NuCypher KMS development roadmap
We’re happy to announce the development roadmap for the NuCypher KMS platform. This is a living, evolving document — milestones won’t…
Research suggests 7% of all S3 buckets have unrestricted public access... suggests no end in sight to slew of exposed data headlines
http://ift.tt/2fSBQXa
Submitted September 28, 2017 at 06:36AM by endtoendencrypt
via reddit http://ift.tt/2xGLPIc
http://ift.tt/2fSBQXa
Submitted September 28, 2017 at 06:36AM by endtoendencrypt
via reddit http://ift.tt/2xGLPIc
BleepingComputer
7% of All Amazon S3 Servers Are Exposed, Explaining Recent Surge of Data Leaks
During the past year, there has been a surge in data breach reporting regarding Amazon S3 servers left accessible online, and which were exposing private information from all sorts of companies and their customers.
Malware Investigation Leads To Sophisticated Mideast Threat Network
http://ift.tt/2xGKkd3
Submitted September 28, 2017 at 07:05AM by majorllama
via reddit http://ift.tt/2yawilz
http://ift.tt/2xGKkd3
Submitted September 28, 2017 at 07:05AM by majorllama
via reddit http://ift.tt/2yawilz
Dark Reading
Malware Investigation Leads To Sophisticated Mideast Threat Network
The infrastructure behind a web shell used in an attack earlier this year suggests methodical and purposeful threat actors, Palo Alto Networks says.
Electronic Shelf Label Market to hit $1.25bn by 2024
http://ift.tt/2wWfP3X
Submitted September 28, 2017 at 12:16PM by Barkarjosh
via reddit http://ift.tt/2fs2qWp
http://ift.tt/2wWfP3X
Submitted September 28, 2017 at 12:16PM by Barkarjosh
via reddit http://ift.tt/2fs2qWp
GlobeNewswire News Room
Electronic Shelf Label Market to hit $1.25bn by 2024: Global Market Insights Inc.
“The electronic shelf label market is seeing additional feature integration such as NFC, geo-mapping, smart flash, wireless communication systems and inventory management, which is likely to contribute to ESL profitability over the forecast timeframe”
Technology that Keeps you Safe
http://ift.tt/2xHD6Wt
Submitted September 28, 2017 at 11:20AM by OneTecSecurity
via reddit http://ift.tt/2fslKTd
http://ift.tt/2xHD6Wt
Submitted September 28, 2017 at 11:20AM by OneTecSecurity
via reddit http://ift.tt/2fslKTd
Different Google email bodies. Hackers?
http://ift.tt/2fSA0pc
Submitted September 28, 2017 at 09:08AM by snowy_safari
via reddit http://ift.tt/2wmeK0Y
http://ift.tt/2fSA0pc
Submitted September 28, 2017 at 09:08AM by snowy_safari
via reddit http://ift.tt/2wmeK0Y
Introducing BLEAH. "smart" devices hacking based on the bluepy library
http://ift.tt/2xZRRFg
Submitted September 28, 2017 at 12:36PM by giomke
via reddit http://ift.tt/2xys6LH
http://ift.tt/2xZRRFg
Submitted September 28, 2017 at 12:36PM by giomke
via reddit http://ift.tt/2xys6LH
evilsocket / Simone
This Is Not a Post About BLE, Introducing BLEAH
This is not a post about BLE, but rather on how to hack it … well, to be honest, BLE devices are usually very easy to hack, so it’s just a quick intro to it, I’ll also take the chance to open source o
An Australian company is offering a bug bounty for helping match InfoSec people with jobs
http://ift.tt/2k2Jqmg
Submitted September 28, 2017 at 12:34PM by hp777us
via reddit http://ift.tt/2xykxEK
http://ift.tt/2k2Jqmg
Submitted September 28, 2017 at 12:34PM by hp777us
via reddit http://ift.tt/2xykxEK
Cyber Security recruitment | CyberSec People
Cyber Security recruitment | CyberSec People
Bounty Program | CyberSec People
Read on the Web: Vulnerability vs. risk: Knowing the difference improves security
http://ift.tt/2xHkDZW
Submitted September 28, 2017 at 02:52PM by MicheeLengronne
via reddit http://ift.tt/2wYGNTR
http://ift.tt/2xHkDZW
Submitted September 28, 2017 at 02:52PM by MicheeLengronne
via reddit http://ift.tt/2wYGNTR
Limawi
Read on the Web: Vulnerability vs. risk: Knowing the difference improves security
Read on the Web: The future leaders of cybersecurity will be fluent in languages other than technology and will stop using fear to conflate the message of vulnerability versus risk.
the good reverse lookup virtuosos
http://ift.tt/2fsuzMQ
Submitted September 28, 2017 at 03:51PM by mobilenumbr
via reddit http://ift.tt/2hzcRvF
http://ift.tt/2fsuzMQ
Submitted September 28, 2017 at 03:51PM by mobilenumbr
via reddit http://ift.tt/2hzcRvF
Mac OS X Local Javanoscript Quarantine Bypass
http://ift.tt/2xNiKLD
Submitted September 28, 2017 at 01:23PM by filippo_cavallarin
via reddit http://ift.tt/2xE2Voy
http://ift.tt/2xNiKLD
Submitted September 28, 2017 at 01:23PM by filippo_cavallarin
via reddit http://ift.tt/2xE2Voy
Electron Chromium RCE
http://ift.tt/2fRMLQL
Submitted September 28, 2017 at 05:19PM by SladeyMcNuggets
via reddit http://ift.tt/2xIjOAf
http://ift.tt/2fRMLQL
Submitted September 28, 2017 at 05:19PM by SladeyMcNuggets
via reddit http://ift.tt/2xIjOAf
Electron
Chromium RCE Vulnerability Fix
A remote code execution vulnerability has been discovered in Google Chromium that affects all recent versions of Electron. Any Electron app that accesses remote content is vulnerable to this exploit, regardless of whether the sandbox option is enabled. We’ve…
Solar fencing
http://ift.tt/2tEVmeE
Submitted September 28, 2017 at 06:24PM by smartfence
via reddit http://ift.tt/2wYKDRS
http://ift.tt/2tEVmeE
Submitted September 28, 2017 at 06:24PM by smartfence
via reddit http://ift.tt/2wYKDRS
smart fence integrated security
Solar Fencing and Security Fencing Manufacturers & Suppliers
solar fencing and security fencing system allows you to secure the boundaries of home and industries.We are manufacturers and suppliers of solar fencing.
Recent NVR and CCTV Hack
I work at a security company. This week a lot of our clients' (including some of the employees who work here) CCTV systems have been hacked. When they view the cameras on the monitor, the device has been dimmed and the camera name has been changed to HACKED.Haven't seen anything on the news but this seems like it could be a problem nationwide
Submitted September 28, 2017 at 06:05PM by bGriffLocksmith
via reddit http://ift.tt/2fsLwqs
I work at a security company. This week a lot of our clients' (including some of the employees who work here) CCTV systems have been hacked. When they view the cameras on the monitor, the device has been dimmed and the camera name has been changed to HACKED.Haven't seen anything on the news but this seems like it could be a problem nationwide
Submitted September 28, 2017 at 06:05PM by bGriffLocksmith
via reddit http://ift.tt/2fsLwqs
reddit
Recent NVR and CCTV Hack • r/security
I work at a security company. This week a lot of our clients' (including some of the employees who work here) CCTV systems have been hacked. When...
Security In 5: Episode 78 - Learning From Equifax - Application Security
http://ift.tt/2yvldaK
Submitted September 28, 2017 at 06:33PM by BinaryBlog
via reddit http://ift.tt/2ytSl2I
http://ift.tt/2yvldaK
Submitted September 28, 2017 at 06:33PM by BinaryBlog
via reddit http://ift.tt/2ytSl2I
Libsyn
Security In Five Podcast: Episode 78 - Learning From Equifax - Application Security
Next to social engineering the number one targets for hackers are the applications. Complex components, each with their own unique configurations and patches, all being poked for holes. Application's are the gateway to the data and yet as an industry application…
Playing with kernel TLS in Linux 4.13 and Go
http://ift.tt/2xPjBsY
Submitted September 28, 2017 at 07:15PM by pheedrus
via reddit http://ift.tt/2wmJCyK
http://ift.tt/2xPjBsY
Submitted September 28, 2017 at 07:15PM by pheedrus
via reddit http://ift.tt/2wmJCyK
Filippo.io
Playing with kernel TLS in Linux 4.13 and Go
Linux 4.13 introduces support for nothing less than... TLS! The 1600 LoC patch allows userspace to pass the kernel the encryption keys for an established connection, making encryption happen transparently inside the kernel. The only ciphersuite supported…
[Whitepaper] Subverting Trust in Windows - Bypass Windows digital signature
http://ift.tt/2yj4MOz
Submitted September 28, 2017 at 08:20PM by Palaksa
via reddit http://ift.tt/2fTDlUY
http://ift.tt/2yj4MOz
Submitted September 28, 2017 at 08:20PM by Palaksa
via reddit http://ift.tt/2fTDlUY
Knowledge Sharing: Folks who respond to client security inquiries (i.e. fill out questionnaires), what tools do you use? What tips and trick can you offer?
Part of my current role has me responding to security questionnaires from clients/customers. I currently use an Excel spreadsheet to catalog all of the questions and responses I encounter. Since questions are rarely worded the same way, it is tedious to find similar questions that have been answered previously, thus making the process incredibly cumbersome. Especially when questionnaires have hundreds of questions.So, for those of you in a similar role, what tools do you use? Do you have any tips or tricks that you can offer me and possibly anyone else reading this who does the same thing?
Submitted September 28, 2017 at 08:47PM by ghostmanure
via reddit http://ift.tt/2xDDy65
Part of my current role has me responding to security questionnaires from clients/customers. I currently use an Excel spreadsheet to catalog all of the questions and responses I encounter. Since questions are rarely worded the same way, it is tedious to find similar questions that have been answered previously, thus making the process incredibly cumbersome. Especially when questionnaires have hundreds of questions.So, for those of you in a similar role, what tools do you use? Do you have any tips or tricks that you can offer me and possibly anyone else reading this who does the same thing?
Submitted September 28, 2017 at 08:47PM by ghostmanure
via reddit http://ift.tt/2xDDy65
reddit
Knowledge Sharing: Folks who respond to client... • r/security
Part of my current role has me responding to security questionnaires from clients/customers. I currently use an Excel spreadsheet to catalog all...
DerbyCon 2017 CTF Write Up
http://ift.tt/2yISBMb
Submitted September 28, 2017 at 09:32PM by eth_
via reddit http://ift.tt/2wlYi0Q
http://ift.tt/2yISBMb
Submitted September 28, 2017 at 09:32PM by eth_
via reddit http://ift.tt/2wlYi0Q
Nettitude Labs
DerbyCon 2017 CTF Write Up
The excellent Derbycon 2017 has just come to an end and, just like last year, we competed in the Capture The Flag competition, which ran for 48 hours from noon Friday to Sunday. As always, our team…
Is your grammar software a security risk?
http://ift.tt/2fC1aUm
Submitted September 28, 2017 at 09:27PM by speckz
via reddit http://ift.tt/2xIYeeP
http://ift.tt/2fC1aUm
Submitted September 28, 2017 at 09:27PM by speckz
via reddit http://ift.tt/2xIYeeP
Write
Is your grammar software a security risk? - Write
Write analyses when grammar software can be a security risk, what the benefits are, and how to use grammar software thoughtfully.
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing (this is Bad)
http://ift.tt/2xDLFRM
Submitted September 28, 2017 at 10:22PM by Syonyk
via reddit http://ift.tt/2xIWFO0
http://ift.tt/2xDLFRM
Submitted September 28, 2017 at 10:22PM by Syonyk
via reddit http://ift.tt/2xIWFO0