The Security Daily

Technology

How to fill out a PDF form without software - CNET

Shared by
CNET

cnet.com - Not long ago, my wife called from work. "I have to get this form turned in before 5, but the printer's broken. It's a PDF. I can open it, but there's no way to fill it out. What do I do?" Been ther...

Windows Update drivers bricking USB serial chips beloved of hardware hackers

Shared by
Dan Kaminsky

arstechnica.com - Hardware hackers building interactive gadgets based on the Arduino microcontrollers are finding that a recent driver update that Microsoft deployed over Windows Update has bricked some of their har...

More smart device makers sign up to work with Nest - CNET

Shared by
CNET

cnet.com - Nest Labs made its first big partner announcement back in June when it kicked off its Works with Nest developer program with the likes of Mercedes Benz, Whirlpool, and Logitech. Today brings Nest's...

Four tips for Safari on OS X Yosemite - CNET

Shared by
CNET

cnet.com - CNET's Dan Graziano shows you how to get the most out of Apple's updated Safari Web browser.

This Week's Most Popular Posts: October 17th to 24th

Shared by
Lifehacker

lifehacker.com - This week we uncovered the secret features of OS X Yosemite, flexed our evil muscles, discovered some strange laws, and learned the basics of photography. Here's a look back. Yosemite is here with ...

China Hires As Many As 300,000 Internet Trolls To Make The Communist Party Look Good

Shared by
عبدالله العلي

businessinsider.in - After reading "Blocked on Weibo" by Chinese researcher Jason Q. Ng, we recently learned China's version of Twitter, Sina Weibo, banned the phrase "50 cents." It references China's "50 Cent Party," ...

Business Pulse Poll: CEO Faceoff Finals: It's down to Musk and Chambers - Silicon Valley Business Journal

Shared by
Cisco Security

bizjournals.com - After three rounds of CEO-to-CEO showdowns, Cisco CEO John Chambers faces Tesla CEO Elon Musk in the Silicon Valley Business Journal's CEO Faceoff.

Spam in September 2014 - Securelist

Shared by
Fabio Assolini

securelist.com - In September, "Nigerian" scammers sent out stories relating to the breaking news of the Ebola epidemic. There was festive spam, focusing on both the US Labor Day celebration and the upcoming winter...

Penetration Testing Doesn't Have to Feel Like Rabbit Farming

Shared by
Veracode

veracode.com - About half of all business Web apps developed in the last 15 years are Java-based. This makes Java an obvious target for hackers since it contains so many potential targets, and penetration testing...

Reasons why Apple Pay will fail - CNET

Shared by
CNET

cnet.com - Apple may have figured out a way to bring mobile payments to the masses, but probably not.

The Best Apps That Take Advantage of Yosemite's New Features

Shared by
Lifehacker

lifehacker.com - Yosemite's been out for a week now and that means apps are getting updated to support some of its new features. From Notification Center tweaks to Continuity features, here are some of the best app...

x86/64 Assembly and Shellcoding on Linux « SecurityTube Trainings

Shared by
Security Tube

securitytube-training.com - The SecurityTube Linux Assembly64 Expert (SLAE64) aims to teach the basics of x86_64 assembly language on the Linux platform from a security perspective and its application to writing shellcode, en...

Vysk EP1 review: 'The anti-NSA' iPhone case delivers more privacy questions than answers

Shared by
CNET

zdnet.com - "Privacy-mode" rear and front-facing camera shutter to prevent remote viewing Rugged, durable, rubberized design and feel, making it easy to hold Case does not add considerable weight to the iPhone...

​Create a USB Password Stealer to See How Secure Your Info Really Is

Shared by
Lifehacker

lifehacker.com - Slacking on password security can have horrific consequences. Even so, it's easy to lose track of how many are vulnerable. With just a couple of files, you can steal passwords from nearly everywher...

Cool inventions that make 'Star Wars' seem real (pictures) - CNET

Shared by
CNET

cnet.com - As it turns out, a tiny Princess Leia created through movie special effects in "Star Wars" isn’t our only hope for super-cool 3D holograms. Two Scottish artists demonstrated a similar technology wi...

Kris Freedain - My little hacker picked out @kevinmitnick’s book...

Shared by
Kevin Mitnick

krisfreedain.tumblr.com - My little hacker picked out @kevinmitnick’s book at the bookstore. Should be an interesting read! me books hacker October 23, 2014

Amazon Kindle Voyage review - CNET

Shared by
CNET

cnet.com - In recent years, Amazon's mantra for its tablets and e-readers has been to build "premium products at nonpremium prices." So it surprised some people when the company went ahead and built a premium...

joxeankoret/nightmare · GitHub

Shared by
Tomasz Miklas

github.com - A distributed fuzzing testing suite with web administration. It was released during the conference T2 (Finland) around October 23 (2014). Please refer to README.txt for some more details and to all...

Nintendo New 3DS review - CNET

Shared by
CNET

cnet.com - The Nintendo 3DS was unveiled in 2010, riding the wave of 3D hysteria that was supposed to see us all scrambling to buy new 3D TVs, fancy 3D smartphones and even 3D cameras. Of course, that trend n...

Technology alone isn't going to secure IoT connected devices - SC Magazine

Shared by
SCMagazine

scmagazine.com - A recent study from Hewlett-Packard found that 70 percent of Internet of Things (IoT) devices contain serious vulnerabilities. Recent events prove that these vulnerabilities are being exploited on ...

TaoSecurity: Bejtlich Teaching at Black Hat Trainings 8-9 Dec 2014

Shared by
Richard Bejtlich

taosecurity.blogspot.com - I'm pleased to announce that I will be teaching one class at Black Hat Trainings 2014 in Potomac, MD, near DC, on 8-9 December 2014. The class is Network Security Monitoring 101. I taught this clas...

Hackers podrían controlar una ciudad

Shared by
Jaime Andrés R.

indicepr.com - El argentino César Cerrudo, un " hacker bueno" que trabaja en la empresa IOActive, quiso averiguar si realmente se podía hacer y llegó a la conclusión de que en varias ciudades de EE.UU. -entre ell...

Adobe exploit used to spread Dyre credential stealer - SC Magazine

Shared by
Sergio Hernando

scmagazine.com - Attackers using credential-stealing malware, called Dyre, are targeting login data entered at bitcoin wallet sites. Researchers at two firms, Trend Micro and ThreatTrack Security, observed the malw...

Forum Systems Sentry API Gateway product review

Shared by
SCMagazine

scmagazine.com - The Forum Systems Sentry API Gateway is a comprehensive application security appliance that allows users to set up robust security over a variety of different protocols and data formats. It is the ...

Protecting DNS: Securing Your Internet Address Book - SANS Institute

Shared by
SANS Institute

sans.org - This webcast was recorded using Elluminate and is no longer supported. The recording is no longer available. The Domain Name System (DNS) is a critical protocol in internet communications and it is...

Assembly Language and Shellcoding on Linux « SecurityTube Trainings

Shared by
Security Tube

securitytube-training.com - The SecurityTube Linux Assembly Expert (SLAE) aims to teach the basics of assembly language on the Linux platform from a security perspective and its application to writing shellcode, encoders, dec...

iPad Mini 3 teardown's biggest surprise? The glue, iFixit finds - CNET

Shared by
CNET

cnet.com - Apple's iPad Mini 3, which hit store shelves this week, is so close in design and internal components to its predecessor that not much has changed in the eyes of gadget-repair site iFixit. Apple an...

ISSA launches professional development framework

Shared by
Help Net Security

net-security.org - ISSA launched an industry-wide program to solve the global cybersecurity workforce gap. The ISSA Cybersecurity Career Lifecycle (CSCL) is a professional development framework that maps all five sta...

FOCUS 14 - Breakout Sessions

Shared by
McAfee Inc.

mcafeefocus.com - FOCUS 14 will feature a comprehensive agenda packed with targeted, highly technical breakouts. You’re guaranteed to gain valuable, tangible knowledge to help you maximize your security solutions an...

Learn Pentesting Online

Shared by
Security Tube

pentesteracademy.com - This course will teach you Python scripting and its application to problems in computer and network security. This course is ideal for penetration testers, security enthusiasts and network administ...

EMCTV - Enterprise Technology Video Portal - EMCTV

Shared by
RSA

emc.com - EMC REDEFINES: SOCIAL@EMC » LEARNING » POPULAR Share CONTACT feedback SITE MAP PRIVACY POLICY LEGAL NOTICES EMC builds information infrastructures and virtual infrastructures to help people and bus...

Malicious Ebola-Themed Emails Are on the Rise - NYTimes.com

Shared by
Trustwave

bits.blogs.nytimes.com - The Ebola epidemic has migrated online, where cybercriminals are using the virus to infect more people with malware. Last week, the United States Computer Readiness Team, a division of the Departme...

Windows 10: Security and Identity Protection for the Modern World

Shared by
Microsoft MMPC

blogs.windows.com - There’s been so much excitement and energy around the Windows 10 Technical Preview – including incredible momentum around the Windows Insider Program, where we recently hit 1 million total registra...

iMessage SPAM floods US mobile networks • The Register

Shared by
Malwarebytes

theregister.co.uk - Adaptable System Recovery (ASR) for Linux virtual machines China-based counterfeiters are spamvertising knock-off designer goods using Apple iMessage instead of using conventional email spam runs. ...

The New Security Features of iOS 8 and Android Lollipop - Security News - Trend Micro USA

Shared by
Trend Micro

trendmicro.com - The tail-end of the third quarter and the onset of the fourth quarter of 2014 saw the surfacing of news that sparked interest in the tech world. In a span of two months, two of the mobile market's ...

Here’s Why Public Wifi is a Public Health Hazard

Shared by
Graham Cluley

medium.com - In his backpack, Wouter Slotboom, 34, carries around a small black device, slightly larger than a pack of cigarettes, with an antenna on it. I meet Wouter by chance at a random cafe in the center o...

Malware strain attacks ATMs overseas - ABA Banking Journal

Shared by
Kaspersky Lab

bankingexchange.com - A forensic investigation into cybercriminal attacks targeting multiple ATMs around the world, performed by Kaspersky Lab, discovered malware dubbed “Tyupkin” that infects ATMs and allows attackers ...

Free mobile apps = compromises on user safety?

Shared by
McAfee Inc.

blogs.mcafee.com - Free mobile apps may introduce security risks that need to be addressed. While businesses need to find ways of monetizing when consumers are not ready to pay directly for using an app,  monetizatio...

Information Security: Federal Friday - 10.24.14...

Shared by
Rapid7

community.rapid7.com - Happy Friday, Federal friends! Can anyone else believe next week is Halloween? Feels like only yesterday I was talking about the start of the MLB season and now we're through 2 games of the World S...

Patching Poodles and Digging for Sandworms: Why Monitoring Matters - Speaking of Security - The RSA Blog and Podcast

Shared by
RSA

blogs.rsa.com - “Sitting in a bunker here behind my wall, waiting for the worms to come. In perfect isolation here behind my wall, waiting for the worms to come.” This week had a two-for-one special with the disco...

Ebola-Themed Malware Sweeping The Net

Shared by
Trustwave

techweekeurope.co.uk - Cybercriminals are playing on the public’s fears over the Ebola virus by sending out malware-ridden emails disguised as health tips. The criminals are sending out emails purporting to be from the W...

Disorderly conduct: localized malware impersonates the police - Microsoft Malware Protection Center - Site Home - TechNet Blogs

Shared by
Microsoft MMPC

blogs.technet.com - We have recently seen the emergence of several samples of a ransomware family localized into different languages. Malware that relies on localized social engineering tactics has been around for a f...

Children To Be Taught Cyber Security Skills

Shared by
Kaspersky Lab

news.sky.com - Children as young as 11 will be shown how to stay safe online and be taught skills which could inspire them to take careers defending Britain in cyberspace. The new national lesson plans, created b...

After gaining U.S. government approval, Samsung Knox security for Android found to be "completely compromised"

Shared by
Darkoperator

appleinsider.com - Knox was a differentaitor for Samsung in enterprise...'was' being key word. Why would they let that go?? don't they have a team of over 250 people on this? (just on Knox) If this is the case, they ...

Pawn Storm Espionage Attacks Use Decoys, Deliver SEDNIT - Security News - Trend Micro USA

Shared by
Trend Micro

trendmicro.com - View research paper: Operation Pawn Storm Using Decoys to Evade Detection This Trend Micro research paper unravels a series of attacks that targets military officials as well as various defense con...

The Numero Home Screen

Shared by
Lifehacker

lifehacker.com - Today's home screen is particularly AMOLED-friendly. While Android goes for a much brighter look these days, this design by My Color Screen user 21macro12 sticks to the dark themes, with only one m...

Darknets: Murky recesses of the hidden web

Shared by
Security Affairs

foxnews.com - The Brazilian police investigation that cracked a high-tech child porn ring earlier this month has shone a spotlight on the darker recesses of the web, an area which still poses massive technology ...

Malware on Breyer Horses website for about 18 months, payment card data at risk - SC Magazine

Shared by
SCMagazine

scmagazine.com - An undisclosed number of people who made purchases on the Breyer Horses website between March 31, 2013 and Oct. 6 are being notified that their personal information – including payment card data – ...

SANS Institute

Shared by
SANS Institute

sans.org - For a limited time, OnDemand courses from SANS Institute are discounted by $800. All of SANS' cyber defense, penetration testing, digital forensics and incident response, management and legal cours...

Six Colors: Review: 27-inch iMac with Retina 5K Display

Shared by
Rich Mogull

sixcolors.com - When it was first announced in 1998, and for most of the years that followed, the name iMac represented Apple’s affordable all-in-one “computer for the rest of us.” The iMac was never the kind of M...