The Security Daily

Technology

Linux Foundation releases PARANOID internal infosec guide

Shared by Ian

theregister.co.uk - Linux Foundation project director Konstantin Ryabitsev has publicly-released the penguinistas' internal hardening requirements to help sysadmins and other paranoid tech bods and system administrato...

Boffins laugh at Play Store bonehead security with instant app checker

Shared by Kimberly

theregister.co.uk - An armada of university researchers have devised a novel method of detecting malicious applications on Android app, and by way of demonstration have dug up 127,429 shady software offerings, includi...

Alienware's latest X51 gaming PC amps up with liquid cooling, latest Intel chip

Shared by CNET

cnet.com - Alienware, Dell's in-house PC gaming brand, has announced updates to several of its systems at the annual PAX Prime gaming convention in Seattle, Washington. These gaming PCs, including one desktop...

Microsoft Surface Pro 4 rumor roundup: Everything we know about the next version of Microsoft's signature tablet

Shared by CNET

cnet.com - Since having been designated "best productivity tablet" by CNET upon its release in 2014, Microsoft's Surface Pro 3 has injected some excitement into the tablet-PC hybrid market. And it's been rega...

Apple iPhone 6S rumor roundup: Everything we know about the next version of Apple's flagship phone

Shared by CNET

cnet.com - We now know one thing: Apple will unveil the next iPhone on September 9, 2015. If Cupertino sticks to its script for upgrades -- big redesigns for even numbered years, internal specs updates for od...

Adobe aims to bring Photoshop to mobile masses with upcoming app - CNET

Shared by CNET

cnet.com - SAN FRANCISCO -- Photoshop is so well known that the product name is synonymous with photo editing. But the software itself is a success only on personal computers, not smartphones or tablets. Phot...

Ruskie ICS hacker drops nine holes in popular Siemens power plant kit

Shared by Kimberly

theregister.co.uk - Ilya Karpov of Russian security outfit Positive Technologies has reported nine vulnerabilities in Siemens industrial control system kit used in critical operations from petrochemical labs and power...

Friday beers scam up 240 percent, inflicts $1.2 billion in damages

Shared by Kimberly

theregister.co.uk - Fake email supplier scams are booming and have inflicted $1.2 billion in damages to businesses globally in the past year according to the FBI. The scams formally known as "business email compromise...

Researchers uncover possible Iranianbacked phishing scam

scmagazine.com - Researchers at Citizen Lab at the Munk School of Global Affairs at the University of Toronto released a report today describing a phishing campaign conducted against Iranian dissidents and how util...

Cybersecurity Under FTC Authority: What Does it Mean?

Shared by Trend Micro

darkreading.com - Earlier this week, a U.S. appellate court granted the Federal Trade Commission (FTC) authority to regulate corporate cybersecurity. While this isn’t the first time the U.S. government has stepped i...

Metasploit for Pentesters « SecurityTube Trainings

Shared by Security Tube

securitytube-training.com - The coherent teaching style and technically challenging lab exercises in the SecurityTube Metasploit Framework Expert certification help towards a gradual and comprehensive learning curve for the s...

What’s Worse Than Losing Your Data? Losing Your Trust In It | Overt Action

Shared by daveaitel

overtaction.org - The news about the Office of Personnel Management’s data breach gets worse every day. As of this writing, Chinese hackers stole over 22 million personnel files from OPM, forcing Director Katherine ...

Errata Security: About the systemd controversy...

Shared by Rob Graham

blog.erratasec.com - About the systemd controversy... As a troll, one of my favorite targets is "systemd", because it generates so much hate on both sides. For bystanders, I thought I'd explain what that is. To begin w...

Is Microsoft up to old bundling tricks?

Shared by GFI Software

gfi.com - Undoubtedly, you have heard of the new Microsoft Windows 10 browser, Edge, and if you install the new OS, it will be almost impossible to avoid the new browser. Why, I hear you ask? Because Windows...

Learn Pentesting Online

Shared by Security Tube

pentesteracademy.com - This course will teach you Python scripting and its application to problems in computer and network security. This course is ideal for penetration testers, security enthusiasts and network administ...

TECH TRAINING 8: Hacking Web Applications – Case Studies of Award-Winning Bugs in Google, Yahoo, Mozilla and More « HITB GSEC – Singapore 2015

Shared by HITBSecConf

gsec.hitb.org - Have you ever thought of hacking web applications for fun and profit? How about playing with authentic, award-winning security bugs identified in some of the greatest companies? If that sounds inte...

Third Party Patch Roundup - August 2015

Shared by GFI Software

gfi.com - August signals the last days of summer. For those of us in the hotter areas it means relief from 100°+ days and for those up north, it means starting to think ahead to prepare for winter and the ex...

5 Internet Marketing Mistakes Small Businesses Should Avoid - Tweak Your Biz

Shared by Moblized

tweakyourbiz.com - To a small business owner that already has a million things to get right, the online landscape can be a very confusing and intimidating space. Especially when just starting out, and in an effort to...

Photo Galleries - Engadget

engadget.com - <p>Elliott infiltrates Steel Mountain in person, and we see lots of penetration-testing&nbsp;tools and skills put into play, making this a physical security-focused episode. Even Elliot&rsquo;s loc...

Enterprise application spending: Where's all the money going?

Shared by ITBrief

channellife.co.nz - Worldwide enterprise application spending is expected to rise, driven by modernisation, functional expansion and digital transformation projects, according to Gartner. In fact, it is expected that ...

Will VoIP and Unified Communication (UC) define the future?

Shared by Bev Robb

powermore.dell.com - In part 1 of this series, I covered the history of communications, the PSTN vs. VoIP debate and the role VoIP will play in companies being future ready.  One trend gaining traction in the voice ove...

Using Ansible to PUSH Cisco IOS Configurations « Packet Geek Networks

packetgeek.net - There are a lot of very good articles on the Internet about how Network Engineers can use Ansible to create standardized network device configurations or use Ansible with existing network vendor AP...

Browsers and privacy: Pay attention to what you search for

Shared by Bev Robb

betanews.com - Internet browsers are like sports teams. Every IT department and individual has an opinion on which one is the best, and personal preferences often comes down to long standing allegiances. In the b...

9 Common Mistakes That May Kill Your Business Online

Shared by Moblized

smallbiztrends.com - Cloud, social networking, mobile friendly and big data are the new digital trends that are going to shape businesses, big and small, over the next decade. Being ‘digital ready’ is an equalizer that...

Eight Terminal Utilities Every OS X Command Line User Should Know · mitchchn.me

mitchchn.me - The OS X Terminal opens up a world of powerful UNIX utilities and scripts. If you’re migrating from Linux, you’ll find many familiar commands work the way you expect. But power users often aren’t a...

Another nail in Adobe Flash's coffin - Chrome to block Flash ads from September 1st

Shared by Philip Hall

grahamcluley.com - Last month, Firefox blocked all Flash content by default - as it waited for Adobe to patch a critical security hole that was being actively exploited in malicious attacks. The news came hot on the ...

Before You Start A Business, RESEARCH! | CAREEREALISM

Shared by RingCentral

careerealism.com - If you’re thinking about starting your own business, you may have a few stars in your eyes — think Steve Jobs in a garage or Ray Kroc planning an unheard of chain of hamburger joints, but Apple and...

Interview: Forget the threat of hackers, what about your employees? | ITProPortal.com

Shared by Bev Robb

itproportal.com - With the spate of high-profile data breaches dominating news headlines recently, we are now all aware (hopefully) about the ever-growing threat of hackers. But there is one security threat that com...

9 Fresh Sites to Discover New Software

Shared by Moblized

moblized.com - Startups are sexy. The idea of breaking new ground, chasing dreams, and loving what you do is just downright attractive. The best startups are not about competing in established spaces; they’re abo...

Google Tells Developers How to Get Around Apple's New Security Rules So They Can Keep Selling Ads

Shared by Philip Hall

recode.net - Apple says it cares a lot about privacy. Just ask Tim Cook. Hence, its new iOS 9 operating system will boast a new feature, called App Transport Security, or ATS, which is supposed to require iPhon...

Ashley Madison Breach Proves Hackers Can and Will Take Away Your CEO's Job

recode.net - If you were ever inclined to think that criminal computer hackers were more nuisance than mortal threat to companies and the careers of their senior executives, the events of the past week should q...

Security and the Internet of Things – Are We Repeating History? - Darkmatters

Shared by Bev Robb

darkmatters.norsecorp.com - The Internet of Things (IoT) refers to the networking of endpoint products and objects that can be accessed via the Internet. The objective of this level of networking is to make our every day expe...

A Roadmap for a World Without Drivers

medium.com - Recently, a number of analysts have written thoughtful pieces about the future of mobility in a world of self-driving cars. Often, the projections assume that most cars will transition to electric ...

DuckDuckGo Blog : The First Global Quack & Hack

duck.co - Join the DuckDuckGo community Saturday, August 29th for 24 hours of hacking our search engine! Our community will come together virtually and at meetup groups worldwide for the first-ever, “Global ...

Alleged Russian hackers behind the EFF Spear phishing Scam

Shared by Tom Slovenski

securityaffairs.co - Attackers, alleged to belong to a Russian state-sponsored APT registered a bogus Electronic Frontier Foundation domain earlier this month. The hackers used the name brand of popular privacy watchdo...

Sending Windows Event Logs to Logstash - /dev/random

Shared by Solomon Sonya

blog.rootshell.be - This topic is not brand new, there exists plenty of solutions to forward Windows event logs to Logstash (OSSEC, Snare or NXlog amongst many others). They perform a decent job to collect events on r...

Is Berlin the Next Silicon Valley? - Intel iQ

Shared by Ian

iq.intel.com - While California has long been the tech startup center of the world, Berlin is creating some buzz of its own. As tech enthusiasts file in for IFA, Europe’s largest consumer electronics show, the Ge...

The Samsung Galaxy Tab S2 is like the Android iPad Air you always wanted [REVIEW]

Shared by Tom Slovenski

mashable.com - You might be hard-pressed to pick the new 9.7-inch version of the Samsung Galaxy Tab S2 out of a lineup of Apple iPad Air 2's. Side by side, the similarities are striking, though upon closer examin...

The Many Variants of Russian Cyber Espionage

Shared by Ian

icds.ee - It is no secret that the security situation in Europe and the world has deteriorated significantly in the last two years due to Russia’s conflict with Ukraine and the resulting tensions with the We...

Can a wi-fi pineapple hack photos? • /r/hacking

Shared by Securityblog

reddit.com - If he was legitimately hacked by someone using a pineapple AP, this is how it most likely would've gone down. Someone would have set up an access point that mimicked his real WiFi connection in eve...

Le migliori applicazioni Android per registrare chiamate

Shared by Securityblog

enjoyphoneblog.it - Registrare chiamate è legale? La Legge italiana spesso lascia qualche dubbio sulla sua applicabilità a determinate fattispecie giuridiche, lasciando largo spazio all’interpretazione. Su una cosa pe...

Iphone USA sbloccati per reti in Cina, condannate 14 persone

Shared by Securityblog

focustech.it - Un tribunale cinese con sede in Zhengzhou ha condannato senza possibilità di assoluzione 14 individui ritenuti oltre ogni ragionevole dubbio gli hacker responsabili della sottrazione del database F...

AdBlock: perdite stimate per 22 miliardi di dollari

Shared by Securityblog

focustech.it - Conoscevate l’ammontare dei proventi delle pubblicità sul web persi a causa di AdBlock e da tool analoghi? Secondo un recente studio, condotto da PageFair e Adobe, i meccanismi di blocco degli annu...

Windows 10: attivare il tema dark

Shared by Securityblog

focustech.it - Esiste, in Windows 10, una variante in tonalità scura del tema predefinito di sistema nascosto agli occhi degli utenti che possono richiamarlo attraverso un apposito hack. La progettazione degli el...

Apple iPad Air 2 4G: arriva il sottocosto con prezzo bomba

Shared by Securityblog

appletvitalia.it - Torna in offerta a prezzo sottocosto l’Apple iPad Air 2 16GB Wifi + 4G con un offerta su scala nazionale del nuovo volantino Bennet valido anche per i primi giorni di settembre 2015. Pensavamo che ...

Workflow Lets You Put Shortcuts To Frequent Actions Right In iOS’ Notification Center

Shared by Securityblog

techcrunch.com - Workflow, the clever if somewhat geeky app aimed at iOS power users that helps you automate frequent tasks you perform on your iPhone or tablet, like ordering an Uber to your next event, making a G...

Ashley Madison gate: come usare in sicurezza i siti di incontri - Io Donna

Shared by Securityblog

iodonna.it - Che si tratti di cercare l’anima gemella, o l’avventura di una sera, la privacy è la prima preoccupazione di chi è iscritto a un sito di incontri. Il caso di ashleymadison.com, specializzato in rel...

This site uses cookies for an optimal experience. We also allow third party cookies by trusted partners. By continuing to browse the site you are agreeing to our use of cookies. To learn more and disable some specific cookies, check our Privacy policy →