The Security Daily

Technology

955 - Android: Code loading bypasses in system_server - project-zero - Monorail

Shared by maldevel ☣

bugs.chromium.org - As of Android Nougat, a new set of SELinux rules have been added which are designed to prevent system_server from loading arbitrary code into its address-space. This has been enforced by adding the...

HP Spectre x360 review: Faster, smaller, and better than before

Shared by PCWorld

pcworld.com - Computer makers, much like Hollywood film makers, love sequels.  But just as with movies, there’s always a risk with sequels. Will it be a franchise-killing dud like Ghostbusters II or a modern mas...

Threat Intelligence: IT-Sicherheit zum Selbermachen?

heise.de - Viele IT-Sicherheitsfirmen erweitern ihr Portfolio derzeit um sogenannte Threat Intelligence. Die ist jedoch kein Allheilmittel sondern muss gezielt eingesetzt werden, um einen echten Mehrwert zu e...

Beating The Compiler

codersnotes.com - An oft-repeated fact on programming forums these days is that a decent optimizing compiler will always beat a puny human's attempt at hand-written assembler. There are rare cases, like MPEG decoder...

India gets set for unified cyber cell | Latest News & Updates at Daily News & Analysis

Shared by cyberwar

dnaindia.com - The Centre plans to revive a plan to set up a common cyber command that will bring together the Army, Navy and Air Force to deal with cyber threats. Currently, each service has its own mechanism an...

Microsoft hopes your Windows PC can replace an Amazon Echo

Shared by Dave Trader

engadget.com - Under Home Hub, Cortana would have access to both shared content as well as that of individual users who are signed in. That would tackle one of the biggest issues with devices like Google Home -- ...

Former 'League of Legends' developers unveil 'Dauntless'

Shared by Dave Trader

engadget.com - In Dauntless, the planet has been ripped apart and is overrun with bloodthirsty Behemoths intent on destroying everything in their path. The "Slayers," a class of elite warriors, are charged with h...

Windows & Piracy: a die-hard mindset. Is it worth it and does it hurt knowledge?

peerlyst.com - Windows is the most used operating system in the world and, for this very reason, is also the world's most pirated operating system. The reasons for this are varied. In poor countries the cost of a...

Facebook Instant Games puts games right smack in the middle of News Feed, Messenger

Shared by PCWorld

pcworld.com - Facebook’s new Instant Games platform is as much about reorienting its social empire back toward gaming as much as it is cutting out the mobile apps that have threatened its hegemony on phones and ...

Kickstart the bandwagon and be a 2017 container hero.

Shared by Cloud 66

blog.cloud66.com - The end of 2016 is closing in fast. Time to think about how technology changed our developer life in 2016 and make new plans for 2017. If you didn't hear about containers (Docker), orchestration, m...

50M AirDroid users open to MITM attack, report

Shared by SC Media

scmagazine.com - "AirDroid relies on insecure communication channels in order to send the same data used to authenticate the device to their statistics server," wrote Simone Margaritelli, security researcher at Zim...

How did a full access OAuth token get issued to the Pokémon GO app?

searchsecurity.techtarget.com - The popular Pokémon GO mobile game has been a source of controversy because it erroneously obtained full account... Enjoy this article as well as all of our content, including E-Guides, news, tips ...

A Botnet Took Down Nearly a Million (Yes, Million) Routers

Shared by DEF CON

wired.com - Remember Mirai, that botnet that took down swaths of the internet for millions of users one recent Friday afternoon? We were so innocent then! A variant returned this week, taking out over 900,000 ...

Government’s cyber challenge: Protecting sensitive data for the public good

Shared by Ian Cook

dupress.deloitte.com - In the dog days of August 2015, one hacking scandal made particularly provocative headlines: 33 million customer records were stolen from AshleyMadison.com, a site designed to facilitate extramarit...

'Dronejackings' and home hacking among top cyber security threats for 2017

Shared by Bruce Hudson

mirror.co.uk - You may have heard the horror stories about hackers hijacking connected cars and steering them off the road. Now security experts are warning that drones could be hacked and commandeered in the sam...

GET pwned: Web CCTV cams can be hijacked by single HTTP request

theregister.co.uk - An insecure web server embedded in more than 35 models of internet-connected CCTV cameras leaves devices wide open to hijacking, it is claimed. The gadgets can be commandeered from the other side o...

Showmecon 2016 - Show Me Your Tokens (And Ill Show You Your Credit Cards)

Shared by Security Tube

securitytube.net - Description: Abstract:E-Commerce merchants love credit card tokenization as a way to minimize PCI regulations��"but can tokenization stop adversaries? In this talk, we will exploit tokenization ser...

iPhone vs. iPod: Which one sounds better playing music?

Shared by CNET

cnet.com - Do you remember those bygone days when the iPod was Apple's pride and joy, and the little white player changed the way we listened to music on the go? I do, and trust me on this, the iPod was a rea...

Apple's car letter: What's it driving at? - Roadshow

Shared by CNET

cnet.com - Those hoping for another peep under the hood of Apple's mysterious car project are in luck. It's only a peep though. In a November letter to the National Highway Traffic Safety Administration, a US...

How to use WhatsApp from your computer

Shared by CNET

cnet.com - Typing long messages or holding multiple WhatsApp conversations on your smartphone is possible, but there are times when typing away on a full keyboard and viewing messages on a full-size computer ...

10 signs it's time to get a new phone

Shared by CNET

cnet.com - For some, the sign it's time to get a new phone is when Tim Cook takes to the stage in September and announces a new iPhone is upon us. Or when Samsung unveils its latest Galaxy phone for Android. ...

The Acer Iconia One 10 is as cheap as 10-inch tablets get, and all that that implies

Shared by CNET

cnet.com - The $129 Acer Iconia One 10 reminds me of the $50 (or £50 in the UK) Amazon Fire tablet; it's not good, but it's good for the price. The price roughly converts to £100 in the UK and AU$170 in Austr...

Apple TV, Roku, Fire TV, Chromecast and Android TV: All the apps and channels compared

Shared by CNET

cnet.com - Updated December 3 to cover DirecTV Now and the addition of numerous other apps on various devices. These days just about every major entertainment app is available on just about every living room ...

SF Muni hack contained. Next transit hack could be train wreck

Shared by CNET

cnet.com - The SF Municipal Transportation Agency fell victim to a hacking attack in which someone or some group tried to extort about $73,000 from the transit service in exchange for giving back control of i...

Black Hat Asia 2017

Shared by Black Hat

blackhat.com - Attacking 2G/3G Mobile Networks, Smartphones and Apps Pedro Cabrera & Simon Roses Femerling | March 28 - 29 Overview This 2 day hands-on course will cover the following topics: Day 1: Attacking 2G/...

50 Million Potentially Impacted by AirDroid Vulnerabilities

Shared by SecurityWeek

securityweek.com - Vulnerabilities in the Android remote management tool AirDroid potentially impact over 50 million devices, security researchers at Zimperium zLabs warn. The application has seen between 10 and 50 m...

Offensive Internet of Things Exploitation « SecurityTube Training

Shared by Security Tube

securitytube-training.com - Offensive Internet of Things (IoT) Exploitation is an in-depth course in IoT security and teaches you how to pentest and exploit the so-called “smart” devices. This online class is taught using pra...

Time for a data detox

Shared by SC Media

scmagazine.com - Once upon a time, getting stuck on the subway stairs behind someone who is furiously tapping on their phone, pace slowed to a crawl, holding up a whole line of commuters, brought me closest I'll ev...

Linux Forensics « SecurityTube Training

Shared by Security Tube

securitytube-training.com - Linux Forensics will guide you step by step through the process of investigating a computer running Linux. Everything you need to know from the moment you receive the call from someone who thinks t...

4 Stupid Things I've Seen in Pen-Tests

Shared by Core Security

coresecurity.com - This last week Core Security organized and ran a Capture the Flag hacking challenge for a group of high school students in New York City. We use a fictional health care provider’s network for these...

Cybersecurity experts to Trump: U.S. should train 100,000 hackers by 2020

Shared by Ian Cook

money.cnn.com - The new president should also make an effort to develop international norms for hacking, essentially drawing red lines to avoid cyber warfare or even armed conflict. President Obama's special Commi...

The UK just legalized everything that Snowden warned us about

Shared by Ian Cook

theverge.com - The UK is about to become one of the world’s foremost surveillance states, allowing its police and intelligence agencies to spy on its own people to a degree that is unprecedented for a democracy. ...

Secure Your Phone Today Or Face A Data Breach Tomorrow

Shared by Ian Cook

abovethelaw.com - According to the ABA’s 2015 Legal Technology Survey Report, nearly 40 percent of lawyers in the U.S. use public Wi-Fi to access client data, but only 22 percent are using an encrypted connection. C...

The 13 Biggest, Most Controversial Privacy Stories of 2016

Shared by Bruce Hudson

observer.com - 2016 will go down in history as the year that many Americans learned the meaning of words like “encryption” and “metadata.” It was a year of government spying, corporate lurking and software-powere...

DMV to Replace DBCC INPUTBUFFER Command - Interview Question of the Week #100 - Journey to SQL Authority with Pinal Dave

Shared by UpSearch

blog.sqlauthority.com - Question: Is there any way to replace DBCC INPUTBUFFER Command? Answer: In a recent interview, I heard this question and it caught me off guard. Honestly, when I heard this question being asked to ...

Lauren Willison: STEM education bolsters cybersecurity (Daily Mail)

wvgazettemail.com - Our growing dependence on the internet and the convenience of technology is not without its challenges. From smartphones and online banking to passwords, attackers are constantly trying to steal se...

Visbot Malware Found on 6,691 Magento Online Stores

bleepingcomputer.com - Nearly 6,700 online stores running on top of the Magento platform are infected with the Visbot malware that hides on web servers, steals credit card information, encrypts it, hides it inside an ima...

Android 'Gooligan' Hackers Just Scored The Biggest Ever Theft Of Google Accounts

forbes.com - A new variant of Android malware is responsible for what's believed to be the biggest single theft of Google accounts on record. The so-called Gooligan strain has infected as many as 1.3 million An...

From the Cloud to Drones: Threat Predictions for 2017 | McAfee Blogs

securingtomorrow.mcafee.com - 2016 has been quite the year. From widespread IoT attacks, to ransomware campaigns that extract millions of dollars, cyberthreats have continued to grow in size and impact throughout the past 12 mo...

Android Malware Uses TeamViewer Mobile App to Take Control of Remote Devices

bleepingcomputer.com - Crooks are spreading Android malware disguised as a one-time password (OTP) generator app for banking apps that steals the user's banking credentials and then installs the TeamViewer QuickSupport a...

Cyber Weapons Dealer Investigates 'Leak' Of Tor Hack That Helped Cops Bust Child Porn Site

forbes.com - Exodus Intel is one of a handful of companies that develops, buys and sells software vulnerabilities for anything up to and beyond $1 million a pop. On the one hand, governments can use Exodus expl...

Tech giants warn IoT vendors to get real about security

Shared by Gigamon

theregister.co.uk - The heavyweights behind the Broadband Internet Technical Advisory Group (BITAG) are sick of Internet of Things (IoT) startups foisting insecure rubbish on consumers, and have fired a report that lo...

Google Unveils OSS-Fuzz to test Open Source Software Security

Shared by Paul Roberts

securityledger.com - In-brief: Google’s security team on Thursday announced the release of a new tool, OSS-Fuzz that it says will improve the security of the Internet by providing realtime, automated secruity testing o...

Find out what your web browser is telling websites about you

zdnet.com - Your web browser holds a lot of information about you, and this information is available to websites who want it. Want a peek at the sort of information that a website has access to? Read on! If yo...

Your Dream RPG - Make A Complete Role Playing Game In Unity

Shared by Nerd Monk

kickstarter.com - Role Playing Games can be complex beasts to create, with many interacting gameplay systems. We want to make it easy for you, by creating a series of online courses that teach you step-by-step how t...

What is FTC (Federal Trade Commission)? - Definition from WhatIs.com

searchcompliance.techtarget.com - The FTC (Federal Trade Commission) is a United States federal regulatory agency designed to monitor and prevent anticompetitive, deceptive or unfair business practices.  IT operations are sometimes...

Cerber 5.0.1 Arrives with New Multithreading Method

blog.fortinet.com - A new update of Cerber Ransomware, Cerber 5.0.1, has just arrived, appearing shortly after Cerber 5.0.0. had been released. Cerber 5.0.1 handles multithreading differently when it comes to encrypti...

the anti-virus harm balance

anti-virus-rants.blogspot.com - the anti-virus harm balance anti-virus software, like all software, has defects. sometimes those defects are functional and manifest in a failure to do something the software was supposed to do. so...

This site uses cookies for an optimal experience. We also allow third party cookies by trusted partners. By continuing to browse the site you are agreeing to our use of cookies. To learn more and disable some specific cookies, check our Privacy policy →