The Security Daily

Technology

Router Manufacturers Secretly added TCP 32764 Backdoor Vulnerability Again - The Hacker News

Shared by
Mohit Kumar

thehackernews.com - At the beginning of this year, we reported about the secret backdoor ‘TCP 32764’ discovered in several routers including, Linksys, Netgear, Cisco and Diamond that allowed an attacker to send comman...

QuickClick Customizes Volume Button Actions, No Root Required

Shared by
Lifehacker

lifehacker.com - Android: With touch screen smartphones, volume buttons are among the few physical keys you can press. QuickClick makes it easy to put them to use for more than volume control. For example, say you ...

MEGA - Applications Android sur Google Play

Shared by
عبدالله العلي

play.google.com - Never be away from your important files again! With up to 50GB of free storage, MediaFire lets you access all your documents, photos, and videos from anywhere. Securely store, organize, and share a...

How to move off of Dropbox - Drop Condoleezza Rice or we will #dropdropbox

Shared by
عبدالله العلي

drop-dropbox.com - For information on why you should #DropDropbox, please see the main page Switching off of Dropbox is actually really easy. Almost all of the alternatives are much cheaper, and many have better priv...

Morpheus represents PlayStation's new reality - CNET

Shared by
CNET

cnet.com - Morpheus has an excellent opportunity to create the most impressive gaming experience to come out of the PlayStation group in its history and is certainly one of the most impressive products to com...

Dropbox Acquires Document Collaboration Service Hackpad

Shared by
عبدالله العلي

thenextweb.com - Following Dropbox’s acquisition of Loom, collaborative document editing service Hackpad has announced that it is joining the company. Unlike Loom, however, Hackpad will continue to support its prod...

Five Best Text Editors

Shared by
Lifehacker

lifehacker.com - Whether you're a developer or a writer, a good text editor is a must-have on any computer, in any operating system. The humble text editor is great for managing code, writing down quick notes, or j...

Writebox Is a Minimalistic Notepad That Syncs With Dropbox

Shared by
Lifehacker

lifehacker.com - Web/Chrome/iOS/Android: Looking for a plain text editor that works in your browser and on your phone, while syncing with Dropbox or Google Drive? Meet Writebox! We talked about Writebox briefly in ...

This Week's Top Downloads

Shared by
Lifehacker

lifehacker.com - Every week, we share a number of downloads for all platforms to help you get things done. Here were the top downloads from this week. Chrome: The Heartbleed bug is among the major security vulnerab...

Hacker snifs and exposes 678 Twitter Accounts

Shared by
Cyberwarzone

cyberwarzone.com - This hacking group which is responsible for various attacks world wide has published a new pastebin file which claims to hold 678 Twitter accounts which has been sniffed by the Mauritania Attacker ...

Beyond basic TV settings - CNET

Shared by
CNET

cnet.com - When we talk about TV setup, most of the time we're just discussing the basics. The first page of the TV settings menu. But most TVs have many more pages of settings. Some of these have a pretty ob...

Thanks

Shared by
Slim Amamou

whenyoudontexist.eu - Facebook

SANS Institute

Shared by
SANS Institute

sans.org - Web applications are a major point of vulnerability in organizations today. Web app holes have resulted in the theft of millions of credit cards, major financial and reputational damage for hundred...

Scam Facebook Chat Verification Hijacking users account

Shared by
Mourad ben lakhoua

sectechno.com - Security research from Trend Micro are alerting of a new spam messages that are spoofing official Facebook Chat Team notification. The spam message is a fake Facebook Chat verification that asks us...

Black Hat USA 2014

Shared by
Black Hat

blackhat.com - Tactical Response is a multidisciplinary approach to understanding the methodologies, techniques, and tools for both offensive and defensive security. This four-day course introduces a tactical app...

WPScan Wordpress Vulnerability Scanner

Shared by
Mourad ben lakhoua

sectechno.com - New version of the wordpress security assessment tool – WPScan, the tool already included in many popular pentest distributions such as BackBox Linux, Kali Linux ,Pentoo and SamuraiWTF. The new rel...

Covering all the SAP bases - SC Magazine

Shared by
SCMagazine

scmagazine.com - X1 is an agentless SAP auditing tool that is able to map out entire SAP landscapes, display any insecure configurations on the individual elements of the landscape, as well as show the insecure com...

DragonJAR Security Conference 2014 – del 5 al 10 de Mayo en Manizales

Shared by
Jaime Andrés R.

hakim.ws - Recomiendo los congresos organizados por DragonJAR. He tenido la oportunidad de presentar en el ACK Security Con y ha sido de los mejores eventos internacionales de habla hispana a los que he ido. ...

Is There a Future for Passwords? « Techtonics

Shared by
Kaspersky Lab

blogs.voanews.com - Whether you go online to check your email, use social media, shop or play games, the odds are you have more passwords than you can keep straight in your head and even more scribbled on enough stick...

HP ArcSight ESM v6.5c product review

Shared by
SCMagazine

scmagazine.com - HP's ArcSight ESM is a mature product that collects events from virtually any source. It collects raw data and then searches, stores and reports on the converted data. ArcSight converts the data in...

Web Shell: PHP Meterpreter

Shared by
Security Tube

pentesteracademy.com - Topics / Web Application Pentesting/ Web Shell: PHP Meterpreter × This is a Free Video! For just $39 a month get ALL premium course videos! Downloads Videos from Web Application Pentesting New cont...

Mandiant: Hackers Broke In Using Heartbleed - Digits - WSJ

Shared by
Mandiant

blogs.wsj.com - Hackers successfully used the Heartbleed bug to break into a Mandiant customer’s network, the boutique security firm said Friday. Mandiant, a unit of FireEye, didn’t name the client affected and th...

Life at 6700': Questioning Information Security - It's all about the data

Shared by
Jayson E. Street

dieselcafe.com - In Questioning Information Security Part 1, I argued that your security is only as good as the questions you ask.  If you never ask the question - is my network exposed to compromise through third ...

Life at 6700': Questioning Information Security: A couple of examples

Shared by
Jayson E. Street

dieselcafe.com - We've discussed the necessity in information security of asking good questions (Questioning Information Security - Part 1) and how to answer those questions using data and analytics (Questioning In...

Bsidesla 2013 - Cross Platform Metasploit Payloads @Bperry

Shared by
Security Tube

securitytube.net - Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume ...

Seguridad Infantil en Internet - Entrevistamos a Carlos Pajuelo de Escuela de Padres.

Shared by
Panda Security

soporte.pandasecurity.com - No son pocas las veces que hemos hablado sobre la necesidad de saber qué hacen los niños en Internet y cómo pueden los padres vigilar la actividad online de los más pequeños de la casa. Hoy vamos a...

BADBios live Linux DVDs persistent storage? : Malware

Shared by
Wesley McGrew

reddit.com - In 2010, I switched to using live DVDs to circumvent being hacked because DVDs have the reputation of being nonpersistent. There needs to be warnings nonpersistence in live DVDs can be worked aroun...

Learn Pentesting Online

Shared by
Security Tube

pentesteracademy.com - This course will teach you Python scripting and its application to problems in computer and network security. This course is ideal for penetration testers, security enthusiasts and network administ...

Kelihos botnet total unique infected peer's IPs

Shared by
Hendrik ADRIAN

malwaremustdie.org - Graphical GeoIP Plotting by GPIC https://github.com/JC-SoCal/GIPC

Kelihos botnet total alive callbacks IP

Shared by
Hendrik ADRIAN

malwaremustdie.org - Graphical GeoIP Plotting by GPIC https://github.com/JC-SoCal/GIPC

Darknet gets its first search engine - SC Magazine

Shared by
SCMagazine

scmagazine.com - An anonymous developer has launched a new search engine, called Grams Darknet Market Search, to help users browse the darknet, according to a Wired report. Patterned after Google — even including a...

Passwords are Obsolete — Cyber Security — Medium

Shared by
MSK Security

medium.com - I have 268 passwords on 268 different websites. At least that’s what my password manager says. I actually stopped saving new passwords a while back, so the real number of passwords I should change ...

Scream: Write-up - My portfolio

Shared by
Sam Bowne

paulsec.github.io - This post contains the steps to get a root shell with Scream VM This VM can he found here. Have a look to find even more VMs. But before starting the report, I’d like to congratulate g0tmi1k for hi...

Debasish Mandal's Blog: Attacking Audio reCaptcha using Google's Web Speech API

Shared by
alexander knorr

debasish.in - I had a fun project months back, Where I had to deal with digital signal processing and low level audio processing. I was never interested in DSP and all other control system stuffs, But when quest...

Javascript for Pentesters « SecurityTube Trainings

Shared by
Security Tube

securitytube-training.com - Javascript for Pentesters will take you beyond alert(‘XSS’) and equip you to demonstrate advanced attacks such as Hijacking Forms, Logging Keystrokes, DOM manipulation etc. This course is Beginner ...

Hands on with Ubuntu 14.04: The best Ubuntu desktop ever

Shared by
sjvn

zdnet.com - Lately, Ubuntu has been getting a lot of flack from other Linux users for going its own way. For example, Canonical, Ubuntu's parent company, eventually plans on using its own Mir display server in...

IT threat evolution Q1 2014 - Securelist

Shared by
Securelist

securelist.com - In September 2013 we reported on a targeted attack called Icefog, focused mainly on targets in South Korea and Japan. Most APT campaigns are sustained over months or years, continuously stealing da...

Cryptology ePrint Archive: Report 2014/248

Shared by
Sam Bowne

eprint.iacr.org - Abstract: This work exposes further vulnerabilities in virtualized cloud servers by mounting Cross-VM cache attacks in Xen and VMware VMs targeting AES running in the victim VM. Even though there e...

Challenge 14: HTTP Traffic File Carving Solution

Shared by
Security Tube

pentesteracademy.com - Topics / WAP Challenges/ Challenge 14: HTTP Traffic File Carving Solution × This is a Free Video! For just $39 a month get ALL premium course videos! Downloads Videos from WAP Challenges New conten...

Challenge 14: HTTP Traffic File Carving

Shared by
Security Tube

pentesteracademy.com - Topics / WAP Challenges/ Challenge 14: HTTP Traffic File Carving × This is a Free Video! For just $39 a month get ALL premium course videos! Downloads Videos from WAP Challenges New content added w...

ToolWar | IT Security Tools | opexxx

Shared by
alexander knorr

scoop.it - ToolWar Provide You Updated Ethical Hacking, Security Tools, Network, Cracking, Exploits,Vulnerability Scanning, Forensics, Exploiting, penetration Tools with Video Tutorial

» University of Virginia, Spokeo, Indiana among eight sites hacked by NullCrew

Shared by
Sam Bowne

databreaches.net - Students and employees of the University of Virginia (UVa) may be scratching their heads today and wondering what UVa can or will do to secure its servers better. The university, which was hacked i...

Bsidesla 2013 - Gps Hacking @Recompiler

Shared by
Security Tube

securitytube.net - Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume ...

Time to bid farewell to the old pkg_ tools : The Ports Management Team

Shared by
Hendrik ADRIAN

blogs.freebsdish.org - There comes a time in the life cycle of just about every software package that it has bee re-evaluated, refreshed, deprecated or just retired. It is time that we bid farewell to the old pkg_* soft...

Feedly Android App Javascript Injection vulnerability exposes Millions of Users to Hackers - The Hacker News

Shared by
Mohit Kumar

thehackernews.com - When it comes to Android apps, even the simplest app could greatly compromise your privacy and security. Injecting malicious JavaScript into Android applications has drawn an increased attention fr...

A tale of two security approaches – and why you need both

Shared by
GFI Software

gfi.com - Once upon a time, attacks on computers and networks were relatively simple. Our primary worry was viruses and their variants – worms, Trojans, rootkits. Their authors set out with malicious intent,...

Microsoft corrects Windows XP/Security Essentials bug

Shared by
Hendrik ADRIAN

zdnet.com - Microsoft has issued a new antimalware engine and signatures to correct a bug which made systems running Microsoft Security Essentials, Forefront Client Security, Forefront Endpoint Protection, Win...

A Journey Through the CPU Pipeline - General Programming - Articles - Articles - GameDev.net

Shared by
alexander knorr

gamedev.net - It is good for programmers to understand what goes on inside a processor. The CPU is at the heart of our career. What goes on inside the CPU? How long does it take for one instruction to run? What ...

This Earth Day, “Clean” Your Device Before You Recycle It

Shared by
Robert Siciliano

blogs.mcafee.com - One man’s trash is another man’s new identity? Yes, because that “junk mail” you toss in the garbage contains valuable data about yourself. A crook bent on identity theft can potentially have a fie...

El Blog del CCI: De cuando una debilidad revoluciona los medios: HeartBleed y los ICS (Claudio Caracciolo, 11Paths, CCI)

Shared by
Yago Jesus

blog.cci-es.org - De cuando una debilidad revoluciona los medios: HeartBleed y los ICS (Claudio Caracciolo, 11Paths, CCI) Introducción En la historia de la Ciberseguridad siempre existieron debilidades graves que “r...