The Security Daily

Technology

T9000 backdoor, a sophisticated malware that spies on Skype users

securityaffairs.co - A new threat is targeting Skype users, it is a backdoor trojan dubbed T9000 that is able to infect a victim’s machine to steal files, take screengrabs, and record conversations. The T9000 backdoor ...

enddo/awesome-windows-exploitation

Shared by Binni Shah

github.com - Awesome Windows Exploitation A curated list of awesome Windows Exploitation resources, and shiny things. Table of Contents windows stack overflows windows heap overflows kernel based Windows overfl...

Clever bank hack allowed crooks to make unlimited ATM withdrawals

Shared by Graham Cluley

arstechnica.com - To appreciate how malware targeting banks and other financial institutions is adopting sophisticated techniques once reserved for so-called advanced persistent threats used by state-sponsored spies...

Hacker says he's breached DHS and FBI, leaks claimed staff data

Shared by S.J. Moore

nakedsecurity.sophos.com - The big breach news of the day is that an unidentified hacker threatened to expose a large stash of employee data allegedly stolen from the US public service… …and then followed up with a “proof of...

Rise in Cyberattacks on Professional Services Firms

natlawreview.com - We has seen an alarming uptick in cyber-criminal activity targeted at professional services firms, particularly accounting firms. As described in more detail below, the criminal activity follows a ...

Auckland a key location for NZ's burgeoning tech sector

Shared by ITBrief

itbrief.co.nz - Innovation in the Auckland technology sector is driving IT job growth and making the city a prime location for start-ups and IT professionals, according to Absolute IT. With tech successes like Xer...

Adwind Malware-as-a-Service Platform Hit 400,000 Victims Globally

infosecurity-magazine.com - The Adwind RAT, a cross-platform, multifunctional malware program that is distributed through a single malware-as-a-service platform, appears to have been used in attacks against at least 443,000 p...

TF1 claims copyright over junk - demands takedown - ITsecurity

itsecurity.co.uk - You couldn’t make it up if you tried. MalwareMustDie posts and shares malware/junk samples for other security researchers on MediaFire. But MediaFire has taken down one sample because it allegedly ...

Arachni Framework v1.4 & WebUI v0.5.10 release

arachni-scanner.com - There’s a new version out and you definitely don’t want to miss this one. A lot of effort has been put into this release and the improvements in performance, coverage, integration and portability (...

Clean house to keep WordPress infection from coming back again and again

Shared by SCMagazine

scmagazine.com - A security researcher has discovered a malvertising campaign that injects malware code into WordPress websites. Denis Sinegubko, a senior malware researcher at Sucuri Security, said in a blog post ...

Did a hacker really pwn the FBI, US Homeland Security and the DoJ?

theregister.co.uk - Water cooler My Twitter feed's blowing up! My dad's calling about it because even the New York Times is writing about it. The FBI, the US Dept of Homeland Security and the Dept of Justice all got h...

Massive Brute-Force Attack on Alibaba Affects Millions

infosecurity-magazine.com - Up to 21 million accounts on Alibaba e-commerce site TaoBao may have been compromised thanks to a massive brute-force attack. According to China's Ministry of Public Security, TaoBao, a commerce si...

CVE-2016-0603 – Oracle Issues out-of-box Java emergency patch for Windows

securityaffairs.co - Oracle issued an out-of-box emergency patch for Java software running on Windows systems that fixes a critical vulnerability coded as CVE-2016-0603. The vulnerability could be exploited by an attac...

Sign web content using PGP · Sajal Kayan

Shared by TEAM CYMRU

sajalkayan.com - A lot of web-content these days passes thru untrusted intermediaries, especially plain text traffic which is often intercepted by ISP proxies for caching (and other purposes ;) ). A compromise at t...

SQL Server Auditing and Recovery With ApexSQL Log 2016

Shared by UpSearch

blog.sqlauthority.com - ApexSQL Log is a powerful SQL Server transaction reader for forensic auditing and rollback of malicious and/or unintended changes for Microsoft SQL Server. It is an ideal cost solution for recovery...

Robin Who Dridex botnet replaced with antivirus software

Shared by SCMagazine

scmagazine.com - A mysterious Good Samaritan has replaced the code on certain parts of the villanous Dridex botnet with Avira Anti-virus installers. A white hatted mystery man has shanghaied a part of the sprawling...

Melbourne Docker User Group

Shared by Docker

meetup.com - This month we have  Zendesk generously hosting us again in their awesome conference space after such a successful turn-up last year in their new shiny facilities.  We are glad that they have offere...

How to add photos in iMovie for iOS

Shared by CNET

cnet.com - iMovie for iOS makes it easy to add photos to your movie project, complete with the Ken Burns effects of slowly panning across and zooming in and out of photos. To add a photo to your project, tap ...

Enabling Docker Remote API on Docker Machine on Mac OS X

Shared by Docker

blog.couchbase.com - Docker daemon provides a Remote REST API. This API is used by the Client to communicate with the engine. This API can be also be invoked by by other tools, such as curl or Chrome Postman REST Clien...

Ampy review: Don't waste your money on this charge-while-you-walk external battery

Shared by CNET

cnet.com - Wouldn't life be wonderful if the Ampy worked? You could just stick this little flask-shaped gadget on your hip, or throw it in your bag, and let it automatically generate power from your motions. ...

How to make your headphones sound better than ever

Shared by CNET

cnet.com - I know it might seem pretty straightforward -- put on headphones, play music - and that's all there is to it. Sure, that works, but with a decent set of headphones you can hear deep inside the musi...

High-tech toys want to give you a makeover

Shared by CNET

cnet.com - Beauty and tech are both wildly popular things we spend our money on, so it was only a matter of time before the two worlds collided. In fact, this year's CES threw its first ever Beauty Summit to ...

Page-Leve Tutorial Part 2 - Finding the Best Keywords for Your Site

seoroadmap.org - Please take a moment to read Part 1 of 3 of this tutorial if you haven’t already, as we covered several critical usability and behavioral targeting techniques that could make or break your SEO stra...

Can the Toyota Prius actually be sexy?

Shared by CNET

cnet.com - Technically Incorrect offers a slightly twisted take on the tech that's taken over our lives. I was driving on the freeway on Friday when there was a sudden slowdown. Near my house, the freeway ris...

Samsung's Gear S2 3G does not clear up if phones should be on your wrist

Shared by CNET

cnet.com - One of the biggest complaints of smartwatches is that they're really just dependent accessories to your phone. They need a phone to work. Not all of them, though. The Samsung Gear S2 3G is a smartw...

By 2020, more people will own a phone than have electricity

Shared by CNET

cnet.com - Everywhere you turn, someone's glued to the screen of a phone, e-mailing, posting status updates or playing a mobile game. But that's largely in developed countries like the US or those in Western ...

Tim Cook's blurry Super Bowl photo stuns world

Shared by CNET

cnet.com - Technically Incorrect offers a slightly twisted take on the tech that's taken over our lives. Apple recently launched a new phase of its "Shot on iPhone" campaign to feature photos taken by normal ...

Detectando Webshells o Backdoors en Servidores Web

dragonjar.org - Enviado por Mr.Pack en Jun 2, 2013 | 5 Comentarios Es muy común ya ver cientos de páginas web “Defaceadas” o “hackeadas” una y otra vez, en ocasiones vemos que los grupos que se dedican a esta labo...

All Courses - Full Listing

Shared by Security Tube

pentesteracademy.com - This course will teach you Python scripting and its application to problems in computer and network security. This course is ideal for penetration testers, security enthusiasts and network administ...

A Case of Mistaken Identity? The Role of BlackEnergy in Ukrainian Power Grid Disruption - McAfee

Shared by McAfee Labs

blogs.mcafee.com - Coauthored by Raj Samani, Chief Technology Officer of Intel Security’s Europe, Middle East, and Africa division Recent reports of electricity outages across the Ukraine has led to significant specu...

US officials downplay impact of Department of Justice hacking

Shared by Graham Cluley

theguardian.com - US officials have downplayed the impact of the latest hack of government data, this one containing employee information from 29,000 Departments of Justice (DoJ) and Homeland Security (DHS) staff. H...

5 ways to protect your company data from internal attacks

Shared by Dejan Kosutic

net-security.org - 5 ways to protect your company data from internal attacks by Paul Kraus - CEO of Eastwind Breach Detection - Monday, 8 February 2016. While Hollywood may love the image of the hacker lurking in the...

Gate To Nuclear EK Uses Fake CloudFlare DDoS Check

Shared by Graham Cluley

blog.malwarebytes.org - There has been a lot of talk about Nuclear EK recently, following Sucuri’s discovery about a large number of WordPress sites getting compromised to redirect to the exploit infrastructure. Here is a...

T9000 backdoor steals documents, records Skype conversations, victims' actions

net-security.org - T9000 backdoor steals documents, records Skype conversations, victims' actions A new backdoor Trojan with spyware capabilities is being used in targeted attacks against organizations based in the U...

Why Malvertising Is Cybercriminals’ Latest Sweet Spot

Shared by GFI Software

wired.com - Of all the cyber threats driving headlines, malvertising – seeding malicious code in online advertisements to infect unsuspecting users – might be the most jarring and difficult for many Web surfer...

Google to pump free gigabit Fiber into homes of hard-up families

Shared by GFI Software

theregister.co.uk - People living in public housing in Kansas City, Missouri, will soon be getting free gigabit internet connections. Google said that it would be rolling out its fiber service to nine public housing f...

Exclusive: Top cybercrime ring disrupted as authorities raid Moscow offices - sources

Shared by TEAM CYMRU

ca.news.yahoo.com - WASHINGTON (Reuters) - Russian authorities in November raided offices associated with a Moscow film distribution and production company as part of a crackdown on one of the world’s most notorious f...

How WIRED Is Going to Handle Ad Blocking

wired.com - Over the past several years, there’s been a significant increase in the number of people using ad-blocking software in their web browser. We have certainly seen a growth in those numbers here at WI...

Containers: Security Minefield — or Channel Goldmine?

channelpartnersonline.com - No enterprise likes its workloads to be boxed in anymore, which is one of the reasons why containers are so hot. When IT needs to move an app from a physical server to a cloud, or from a developer’...

E’ emergenza: in rapido aumento i casi di infezione da ransomware Teslacrypt 3.0 | Tech Economy

techeconomy.it - La scorsa settimana è stato registrato un picco nel numero di infezioni di ransomware nel nostro Paese, in particolare è aumentato in numero significativo il numero di utenti che sono stati infetta...

Privacy and Information Sharing

pewinternet.org - Most Americans see privacy issues in commercial settings as contingent and context-dependent. A new Pew Research Center study based on a survey of 461 U.S. adults and nine online focus groups of 80...

Quick Wins: Why You Must Get Defensive About Application Security

veracode.com - Application security differs from other forms of security in the number of people it affects. Unlike installing a firewall or anti-virus software, an application security program will affect the ev...

Why Does No One Talk about BYOD Anymore? - InfoSec Resources

resources.infosecinstitute.com - The emergence of BYOD has been a revolution in the work world. For the first time, employees were able to use their own preferred, personal piece of equipment (e.g., smartphones, tablets, and lapto...

Preuve : courriers électroniques provenant de la messagerie personnelle du salarié - Contrat de travail

dalloz-actualite.fr - Cet arrêt rendu le 26 janvier 2016 se prononce sur la licéité de la preuve consistant en l’échange de messages électroniques par un salarié. La question de la licéité de la preuve est importante ca...

Reuse of login credentials put more than 20M Alibaba accounts at risk

securityaffairs.co - According to the state media reports, hackers have targeted over 20 million active accounts on Alibaba Group’s Taobao e-commerce website using Alibaba’s own cloud computing service. The Chinese Gia...

The state of privacy in America: What we learned

pewresearch.org - After the June 2013 leaks by government contractor Edward Snowden about National Security Agency surveillance of Americans’ online and phone communications, Pew Research Center began an in-depth ex...

PGP co-founder: Ad companies are the biggest privacy problem today, not governments | ZDNet

zdnet.com - NEW YORK -- Ask one of the foremost cryptographers of the modern generation what the biggest privacy issue is today and you might expect something like backdoored encryption or government spying. J...

Apple Bye Bye

boingboing.net - I was clumsy, and I spilled some beer on the keyboard of my Mac Air laptop, bought July 9, 2014. I immediately started drying my precious computer, overturning it, and my greedy Mac didn't gulp all...

Hacker fulfills threat to dump data on 20K FBI agents

Shared by Rafał Łoś

thehill.com - An anonymous hacker on Monday made good on his threat to post the details of 20,000 FBI employees online, less than 24 hours after he dumped the data for 10,000 Department of Homeland Security (DHS...

Libraries at the Crossroads

pewinternet.org - American libraries are buffeted by cross currents. Citizens believe that libraries are important community institutions and profess interest in libraries offering a range of new program possibiliti...

This site uses cookies for an optimal experience. We also allow third party cookies by trusted partners. By continuing to browse the site you are agreeing to our use of cookies. To learn more and disable some specific cookies, check our Privacy policy →