The Security Daily

Technology

Windows 10 Free Upgrade Available in 190 Countries Today

Shared by Microsoft

blogs.windows.com - When we first unveiled Windows 10 in September, we outlined our plans for a new era of Windows. We wanted to create a Windows that empowered people and organizations to do great things. Our vision ...

Bug hunter reveals Apple iTunes, Mac app store receipt deceit

Shared by Kimberly

theregister.co.uk - Vulnerability Lab founder Benjamin Kunz Mejri says he's found a security bug in Apple's Mac and iOS app stores that could be exploited to inject malicious JavaScript code into victims' web browsers...

Doh! Teens sold iPhones that were Play-Doh bricks, police say - CNET

Shared by CNET

cnet.com - Technically Incorrect offers a slightly twisted take on the tech that's taken over our lives. The legend of making something else look like an Apple product will last until eternity. Everyone from ...

Malware on Linux - When Penguins Attack

nakedsecurity.sophos.com - Regular Naked Security readers will know that some security topics cause more friction that others. Lately, artificial intelligence has provoked its fair share of excitement. Surveillance and priva...

Malvertising campaign hits 10 MEELLION users in 10 days

Shared by Kimberly

theregister.co.uk - Cyphort researcher Nick Bilogorskiy says 10 million users may have been infected in as many days, thanks to a deadly malvertising and exploit kit campaign. The cybercrime investigator says the popu...

Experts discovered a new Google Drive phishing campaign

securityaffairs.co - Once again phishers exploited Google’s reputation running a phishing campaign aimed to steal user Google credentials and access to the multitude services offered by the company. The new phishing ca...

Black Vine: Anthem hackers share zero-days with rival cyberattackers | ZDNet

Shared by Kimberly

zdnet.com - Security researchers believe the group behind the Anthem hack is part of a network which distributes zero-day exploits for use against high-profile industries. Earlier this year, US healthcare prov...

Lutter contre Dridex

Shared by McAfee Labs

blogs.mcafee.com - Limiter et protéger votre entreprise contre les attaques de type Dridex peut se faire à différents niveaux d’interception : Fichiers, Registre, URL et IP, et celà à travers plusieurs technologies d...

21st century malware found in Jane Austen's 19th century prose

theregister.co.uk - Cisco's 2015 Midyear Security Report has revealed that at least one group of malware-spreading scum has a literary bent. The report found one group of criminals who were hosting a webpage designed ...

Top of the app charts Shuabang automated malware made in China

Shared by SCMagazine

scmagazine.com - Shuabang companies in China sell installs and user ratings to app developers to help boost their profile, which is leading to new forms of malware, says Chema Alonso. Have you ever wondered how som...

Hacking Team RCSAndroid Spying Tool Listens to Calls; Roots Devices to Get In

Shared by TrendLabs

blog.trendmicro.com - Following news that iOS devices are at risk of spyware related to the Hacking Team, the saga continues into the Android sphere. We found that among the leaked files is the code for Hacking Team’s o...

LinkedIn users rebel after personal data siphon crimped

theregister.co.uk - LinkedIn has reversed a recent decision to make it harder for members to download information about those who've decided to connect with them on the business-centric social network. The company's o...

Episode 15 - Ashley Madison, Car 0-days, Iowa Lottery, Chrome Update, OpenSSH - TrustedSec - Information Security

trustedsec.com - TrustedSec Security Podcast Episode 15 for July 23, 2015.  This podcast is hosted by Rick Hayes, Scott White, Martin Bos and Justin Elze. Visit the show notes page to download the Podcast or check ...

Pwnie Awards

pwnies.com - The Pwnie Awards will accept nominations for bugs disclosed over the last year, from July 1, 2014 to June 30, 2015. Nominations will be accepted until June 30. The top five nominees in each categor...

iTunes and AppStore remote exploit fixed by Apple

nakedsecurity.sophos.com - A serious remote vulnerability has been uncovered in Apple's AppStore and iTunes web applications that posed "a significant risk to buyers, sellers or Apple website managers/developers". A security...

How I disabled your Chrome security extensions

Shared by BeEF

labs.detectify.com - During the last few weeks I’ve been looking at the security of some popular security extensions and one of the extensions that I checked out (which I also use myself) was HTTPS Everywhere. After so...

Official "Back to School" special discounts

Shared by Norton

us.norton.com - Auto scan of apps on Google Play supported on Android 4.0 or later except for Samsung devices. Samsung devices running Android 4.2 or later are supported. For earlier versions of Android, the Googl...

Black Vine group breached Anthem, leveraged zeroday bugs in various campaigns

Shared by SCMagazine

scmagazine.com - Symantec said on Monday that it believes a threat group known as Black Vine – operating since at least 2012 and possibly tied to China – is responsible for the Anthem breach, as well as a number of...

Hacking Team and Boeing Built Cyber Weaponized Drones to Spy on Targets

thehackernews.com - The leaked internal emails from the Italian surveillance software company Hacking Team have revealed that the spyware company developed a robotic aircraft designed to attack computers and smartphon...

Why Cybersecurity Is So Difficult to Get Right

Shared by Norton

hbr.org - It seems like hardly a week goes by without news of a data breach at yet another company. And it seems more and more common for breaches to break records in the amount of information stolen. If you...

x86/64 Assembly and Shellcoding on Linux « SecurityTube Trainings

Shared by Security Tube

securitytube-training.com - The SecurityTube Linux Assembly64 Expert (SLAE64) aims to teach the basics of x86_64 assembly language on the Linux platform from a security perspective and its application to writing shellcode, en...

Apps Permissions - Read before accepting

pandasecurity.com - A smartphone is nothing without its apps. Looking around the apps store is something we do quite frequently, either by necessity or to see what’s new or which game is most popular. And probably, wh...

Google Debuts 'Bring Your Own Encryption'

Shared by Eric Mathieu

infosecurity-magazine.com - Google has announced a new beta capability: support for customer-supplied encryption keys. The feature lets users create and hold the keys, determine when data is active or "at rest," and prevent a...

Active Directory in the Cloud (Part 1)

Shared by Deb Shinder

windowsecurity.com - If you would like to be notified when Deb Shinder releases the next part in this article series please sign up to our WindowSecurity.com Real Time Article Update newsletter. In my previous 3-part a...

Information Security Awareness Training | Cybersecurity Awareness | Newsletter

securingthehuman.org - "Wow! This is the first security awareness document that our users really like! Thank you, SANS" That note came from the CISO of an 8,000 employee organization. OUCH! is the world's leading, free s...

Windows 10 officially drops in NZ

Shared by ITBrief

itbrief.co.nz - Windows 10 is officially available in New Zealand as a free upgrade, as of today. The new operating system is available to eligible devices, or with new PCs and tablets. While Microsoft is describi...

62% of Android Infections Steal Sensitive Info

Shared by Eric Mathieu

infosecurity-magazine.com - Privacy-stealing malware is rampant in the Android world, with a full 62% of infected devices being used as conduits for data exfiltration. "It is widely, but wrongly, believed that malware causes ...

Saying Goodbye to On-Premises Exchange (Part 1)

Shared by Deb Shinder

cloudcomputingadmin.com - If you would like to read the other parts in this article series please go to: For many of us, our Exchange server is like a long-time friend with whom we have a bit of a love/hate relationship. Yo...

Review: Windows 10 is the best version yet—once the bugs get fixed

Shared by Tero Alhonen

arstechnica.com - I'm more conflicted about Windows 10 than I have been about any previous version of Windows. In some ways, the operating system is extremely ambitious; in others, it represents a great loss of ambi...

MozillaSecurity/funfuzz

Shared by Black

github.com - This repository contains two JavaScript-based fuzzers. jsfunfuzz tests JavaScript engines and can run in a JavaScript shell. DOMFuzz tests layout and other parts of browser engines through DOM API ...

Security Research Shows That Exec’s Are Comfortably Numb

Shared by Jeff Snyder

ncxgroup.com - A recent Ponemon Institute survey reveals a gap in perceived security preparedness between the board of directors and IT executives. The issue with the divide on what constitutes IT risk preparedne...

GSec Paper Voting

Shared by HITBSecConf

gsec.hitb.org - User: Pass: Don't have an account? Register! Title Author(s) Votes Root Hundreds of Thousands of Android Devices with One Generic Exploit Wen Xu (KEEN Team) 8 SAP Afaria. One SMS to Hack a Company ...

Learn Pentesting Online

Shared by Security Tube

pentesteracademy.com - This course will teach you Python scripting and its application to problems in computer and network security. This course is ideal for penetration testers, security enthusiasts and network administ...

Scammers Are Using Google Drive to Steal Your Logins – Here’s How to Stay Safe

Shared by Chris Duque

yahoo.com - Billions of people trust Google to find information, manage their email, and store their documents. This makes Gmail and Google Drive the perfect tools for scammers who can abuse that trust to stea...

Expert: Miami: The avast! Series

expertmiami.blogspot.com - The avast! Series I spent some time quite a while ago looking into avast! and, after about a year, I am going to post about the issues that were found, and fixed back then. The whole project was pr...

Ten things to do to get ready for Windows 10

Shared by GFI Software

gfi.com - Windows 10 will be released on July 29, and many have asked us to make a list of things to do to make sure their PC is ready for the big install day. From proactive maintenance, to backups, to rese...

2016 Victory Empulse TT First Ride Review

motorcycle.com - Remember the mega splash Harley-Davidson made last summer with its electric LiveWire? No one expected the usually stodgy Motor Company to veer so sharply into the future, and the stylish e-bike was...

8 Strategies To Improve Conversion Rates From Your Blog Posts | The ONTRAPORT Blog

Shared by Moblized

blog.ontraport.com - Have you ever written one of those blog posts which seem to get pretty decent traffic but don’t seem to be doing you any good? Many of us have. I know I have. My post on getting a big whiteboard on...

The Plan to Beam the Web to 3 Billion Unconnected Humans

wired.com - One of the best things about the web is that it’s interactive. You communicate with friends and family, publish your own site, and leave comments on other people’s work. But a huge part of what we ...

Darkode Resurfaces Just Two Weeks After Takedown

tripwire.com - Darkode, one of approximately 800 underground web forums, has resurfaced just two weeks after international law enforcement shut the site down. The takedown, known as “Operation Shrouded Horizon,” ...

Understanding the Threat Intelligence Lifecycle - Darkmatters

Shared by Norse

darkmatters.norsecorp.com - Everyone is interested in Threat Intelligence (TI). There is a race to the top of the mountain with regards to providing ‘Intelligence’ on the ‘latest threats’; but, what does that really mean for ...

Developers on Support (All Hands on Support #1)

Shared by Moblized

blog.freshdesk.com - In most startups, supporting customers is everybody’s job. Even if it’s the middle of the night, it’s not unusual to find the CEO or CTO troubleshooting customer issues. This helps them learn a lot...

Encryptor RaaS (Ransomware as a Service) - Webroot Threat Blog

webroot.com - A new ransomware has emerged and its very similar to tox as it is created for hackers to easily design encrypting ransomware payloads to distrube from their botnets. Since the creator of Tox was se...

The 8 most Important Steps to Boosting your Facebook Business Page

Shared by RingCentral

technology-in-business.net - Fact: Facebook has helped 52% of all marketers discover a customer on social media! So, if that doesn’t ring a bell, then I don’t know what will! If you haven’t yet decided to set up and manage Fac...

Planned Parenthood claims database, website hacked by anti-abortion ‘extremists’

Shared by PCI DSS Wiki

lifesitenews.com - July 28, 2015 (LifeSiteNews) - Planned Parenthood Federation of America says that its website had been hacked on Sunday by a group of “extremists” opposed to its agenda, who it said had enlisted so...

The Case For ‘Craft IT’

mbtmag.com - There is unnerving sense that IT is becoming impersonal and indifferent. Pressured to contain budgets, some CIOs are turning to mass produced IT services built on offshore labor, mediocre infrastru...

Analyzing VUPEN's CVE-2012-1856

blog.ropchain.com - Quite some time ago (more than a year before the HackingTeam leaks) I came across a number of interesting exploit samples that make use of CVE-2012-1856. With the recent HackingTeam leaks a number ...

Steam's account-stealing password reset bug fixed

Shared by Norse

nakedsecurity.sophos.com - Popular gaming platform Steam recently experienced a breach which reportedly allowed attackers to hijack a small number of accounts. With only the victim's username, an attacker could exploit what ...

Opening the Windows 10 Store for Developers

Shared by IAM Cloud

blogs.windows.com - Today we’re making Windows 10 available to customers in over 190 markets and providing developers the tools they need to submit Universal Windows Platform apps and games to a single unified Windows...

The Unglamorous Truth About My First Year of Business

Shared by Moblized

entrepreneur.com - There’s no question that running your own business is fulfilling. You’ve seen the glamorous Instagram photos of sandy feet and laptops by the ocean, and the Facebook posts exclaiming (literally exc...

This site uses cookies for an optimal experience. We also allow third party cookies by trusted partners. By continuing to browse the site you are agreeing to our use of cookies. To learn more and disable some specific cookies, check our Privacy policy →