The Security Daily

Technology

Microsoft Office 2016 for Mac Is Available for Free Right Now

Shared by
Microsoft

blogs.wsj.com - For the last four years, Microsoft Office for Mac users have been treated as second-class citizens. While Windows, iPhone, iPad and Android users got swanky and fresh word processing, spreadsheet a...

Listen: Sound Of Botnets Helps Microsoft Fight Cybercrime

Shared by
Microsoft

kuow.org - Last week Europol’s European Cybercrime Center led the takedown of a network of computers controlled by cybercriminals. Microsoft played an important role, taking legal action that led to the seizu...

The VU Meter Home Screen

Shared by
Lifehacker

lifehacker.com - VU meters have a certain delightful nostalgia to them. While we may have more space-efficient ways to measure things like battery life, this home screen sure looks good doing it. This design can be...

Wild and wacky tech from Mobile World Congress 2015 - CNET

Shared by
CNET

cnet.com - Mobile World Congress 2015 showcased many smartphones, tablets and wearables, but some of the most interesting aren't big name flagship devices. These unique gadgets are in a special category of th...

Get beautiful forecasts with Week Weather - CNET

Shared by
CNET

cnet.com - It takes imagination and creativity to stand out with a weather app, but developer Wolfgang Augustin has done just that with Week Weather. The app costs 99 cents, £0.79, or AU$1.29 --though that is...

Metasploit: Weekly Metasploit Wrapup: Rehashing...

Shared by
Metasploit Project

community.rapid7.com - One of the tried and true techniques for extending access in any Windows environment is the Pass the Hash (PTH) attack. As you can see from the linked Wikipedia article, this attack is described in...

Exploring the Windows 10 Settings menu - CNET

Shared by
CNET

cnet.com - Open up the Windows 10 Technical Preview (Build 9926), and you'll probably notice something about the new hybrid Start menu/screen: under Places, there are three links: File Explorer, Documents, an...

Angler Adds Keen Team Use After Free IE Vulnerability

Shared by
McAfee Labs

threatpost.com - Attackers behind the Angler Exploit Kit have added a tweaked version of an exploit for a patched Internet Explorer use-after-free vulnerability. Microsoft patched the vulnerability (MS14-056) in la...

Windows 10 Settings menu: The Privacy tab - CNET

Shared by
CNET

cnet.com - The new Windows 10 Settings menu is a bit of a mash-up between Windows 8's PC settings and the Control Panel. The Privacy tab, however, has a bunch of privacy settings you won't find in the traditi...

Protecting Point of Sales Systems from PoS Malware - Security News - Trend Micro USA

Shared by
Trend Micro

trendmicro.com - View infographic: Protecting Point of Sales Systems from PoS Malware 2014 went down in history as year of the “largest retail hacks”. After notable breaches that affected Home Depot and Kmart, PoS ...

Windows vulnerable to 'FREAK' encryption flaw too - CNET

Shared by
CNET

cnet.com - Computers running all supported releases of Microsoft Windows are vulnerable to the "FREAK," a decade-old encryption flaw that leaves device users vulnerable to having their electronic communicatio...

All Microsoft Windows versions are vulnerable to FREAK

Shared by
Malwarebytes

theregister.co.uk - Microsoft is warning users its implementation of SSL/TLS - in all versions of Windows - is vulnerable to interception through the encryption downgrade attack known as FREAK. "Microsoft is aware of ...

How Secure is your Password? -

Shared by
Trend Micro

blog.trendmicro.com - Every day it seems we need to create a new account online and with each new account comes the added risk of our personal information being stolen. Managing passwords to online accounts is not a sim...

Transparency & Trust in the Cloud Series: Kansas City, St. Louis, Minneapolis

Shared by
Microsoft MMPC

blogs.microsoft.com - Over the last few months, Microsoft has hosted a series of events to bring together Chief Information Officers (CIO) and their legal counsels, Chief Information Security Officers (CISO), as well as...

Ramirez FTC focus on data security, fraud, cross device tracking

Shared by
SCMagazine

scmagazine.com - Just two months after President Obama praised the Federal Trade Commission (FTC) for its aggressive enforcement efforts and call for a national data breach notification law, FTC Chairwoman Edith Ra...

Free TV episodes, and new movies on iTunes for March 2015 - CNET

Shared by
CNET

cnet.com - Right now, Apple is offering some TV episodes for free! While you can watch some of them elsewhere, you can watch these episodes without commercials, or download them to watch offline. Apple also h...

Harrison Ford hurt in LA plane crash

Shared by
Dave Kennedy (ReL1K)

bbc.co.uk - US actor Harrison Ford injured in small plane crash in Los Angeles, US media report This breaking news story is being updated and more details will be published shortly. Please refresh the page for...

Metasploit for Pentesters « SecurityTube Trainings

Shared by
Security Tube

securitytube-training.com - The coherent teaching style and technically challenging lab exercises in the SecurityTube Metasploit Framework Expert certification help towards a gradual and comprehensive learning curve for the s...

Hackers threaten phone in your pocket, experts warn

Shared by
INTERPOL_Cyber

businessinsider.com - Barcelona (AFP) - The boom in smartphones among often careless users has made happy hunting for hackers, whose virus attacks and hijacking of unprotected mobiles are multiplying, experts warn. Secu...

x86/64 Assembly and Shellcoding on Linux « SecurityTube Trainings

Shared by
Security Tube

securitytube-training.com - The SecurityTube Linux Assembly64 Expert (SLAE64) aims to teach the basics of x86_64 assembly language on the Linux platform from a security perspective and its application to writing shellcode, en...

Cops Need Warrant to Get Cellphone Location Data, California Judge Rules

Shared by
BrianHonan

motherboard.vice.com - A federal judge has ruled that cops need to get a warrant if they want to access a person’s past cellphone location data, in what digital rights activists call a big win for privacy. Currently, pol...

10 tips for protecting your privacy when everything seems against it - MediaCenter Panda Security

Shared by
Panda Security

pandasecurity.com - We are always talking about the dangers that our data often faces in the Internet. Constant leaks and vulnerabilities in the services we use the most seem inevitable. Even platforms and application...

Javascript for Pentesters « SecurityTube Trainings

Shared by
Security Tube

securitytube-training.com - Javascript for Pentesters will take you beyond alert(‘XSS’) and equip you to demonstrate advanced attacks such as Hijacking Forms, Logging Keystrokes, DOM manipulation etc. This course is Beginner ...

Samsung builds high-tech dream doghouse with a pup spa - CNET

Shared by
CNET

cnet.com - Cats have their own apps. It's only fair that dogs get their own high-tech luxury doghouse from the same people who brought us the Galaxy S6 and a whole host of fancy smart TVs. As part of its spon...

Why you can't trust password strength meters

Shared by
Chester W - Sophos

nakedsecurity.sophos.com - Passwords are a weak link in the computer security chain because they rely on us being good at something we find extremely difficult. And while we aren't getting any better at choosing strong passw...

Trainings | OWASP AppSec Research (AppSecEU) 2015

Shared by
BrianHonan

2015.appsec.eu - Android App Hacking – Internet Banking Edition – Aditya Modha Bootstrap and improve your SDLC with OpenSAMM – Bart De Win Building Secure Single Page Applications – Philippe De Ryck Checking SSL/TL...

World Cyber Crisis? Students to the Rescue! | ZeroFOX

Shared by
Iftach Ian Amit

zerofox.com - UK Prime Minister David Cameron recently hopped the pond to meet with Barack Obama — one would be hard-pressed to think of a more high-profile meeting. What was on the agenda? Cyber security. Under...

Angler Exploit Kit Uses Domain Shadowing technique to Evade Detection

Shared by
Mohit Kumar

thehackernews.com - The world’s infamous Angler Exploit Kit has become the most advanced, much more powerful and the best exploit kit available in the market, beating the infamous BlackHole exploit kit, with a host of...

How to buy a backup and DR solution your CFO will love

Shared by
ITBrief

itbrief.co.nz - An organisation looking to upgrade its backup/retrieval/disaster recovery solution needs to consider the new technology from three angles: IT perspective, user perspective and executive  perspectiv...

Annual Security Report - Arbor Networks

Shared by
arbornetworks

arbornetworks.com - The annual Worldwide Infrastructure Security Report (WISR) offers a rare view into the most critical security challenges facing today’s network operators. Based on survey data provided by service p...

Audi brilliantly mocks Amazon's drones - CNET

Shared by
CNET

cnet.com - Technically Incorrect offers a slightly twisted take on the tech that's taken over our lives. He'd like to deliver many things by drone. You, however, might never have dreams again with the droning...

- Clef

Shared by
Clef

blog.getclef.com - With nearly 50,000 sites protected by Clef, we have proved that thoughtful design can keep us safer online. I’m excited to announce another piece of our protection package — today we’re releasing T...

Spammers leverage DMARC to more successfully distribute ransomware

Shared by
SCMagazine

scmagazine.com - By leveraging email authentication methods to ensure that malicious messages evade spam filters and end up directly in inboxes, attackers are improving the chances of infecting users with TorrentLo...

‘CSI: Cyber’ Riddled with Misperceptions, Lacks ‘Cyber’ Substance

Shared by
Kimberly

tripwire.com - On March 4, the series premiere for the new crime drama CSI: Cyber aired on CBS. The show stars Patricia Arquette, who recently won an Oscar for Best Supporting Actress in a Supporting Role, as Ave...

Webinar: ChatOps: Conversation-driven DevOps - DevOps.com

Shared by
George V. Hulme

devops.com - At its heart, the goal of DevOps is better communication between the dev and operations teams at an organization. Some of the tools that help achieve this include version control, chat, and monitor...

Learn Pentesting Online

Shared by
Security Tube

pentesteracademy.com - This course will teach you Python scripting and its application to problems in computer and network security. This course is ideal for penetration testers, security enthusiasts and network administ...

Microsoft Security Advisory 3046015

Shared by
Matt Suiche

technet.microsoft.com - To improve security protections for customers, Microsoft provides vulnerability information to major security software providers in advance of each monthly security update release. Security softwar...

Multiplatform Boleto Fraud Hits Users in Brazil

Shared by
Kimberly

blog.trendmicro.com - A study conducted around June last year revealed a malware-based fraud ring that infiltrated one of Brazil’s most popular payment methods – the Boleto Bancário, or simply the boleto. While the rese...

Efforts To Team Up And Fight Off Hackers Intensify

Shared by
alexander knorr

darkreading.com - First in a series on ISACs and threat intelligence-sharing. Call it safety in numbers. Over the past year, major industries in the hacker's bullseye -- retail and oil & gas -- have formed official ...

Chrome 41 update includes 51 security fixes

Shared by
SCMagazine

scmagazine.com - Chrome 41 was promoted to the stable channel for Windows, Mac and Linux on Tuesday – the update includes 51 security fixes, several of which are deemed high in severity. A researcher identified as ...

CSX North America Conference | Cyber Event

Shared by
SearchCompliance.com

isaca.org - The cyberattacks that made headlines in 2014 alone demonstrate how critical cybersecurity has become to all organizations. ISACA® recognizes this, so CSX 2015 was created to be the first of its kin...

Find out what it's doing outside with Storm by Weather Underground - CNET

Shared by
CNET

cnet.com - Perhaps the current and ongoing winter we are experiencing in the Northeast inspired the title of Weather Underground's new iOS app, Storm. The app is free and universal, though it'll cost you $1.9...

» How to Find Age-Appropriate Apps for Your Kids

Shared by
Mary Kay Hoal

internet-safety.yoursphere.com - A big question that parents want answered is: How do I find age-appropriate apps for my kids? There are rating systems for movies (MPAA) and video games (ESRB), which are great tools for parents wh...

DNS enhancement catches malware sites by understanding sneaky domain names

Shared by
GFI Software

arstechnica.com - A researcher at OpenDNS Security Labs has developed a new way to automatically detect and block sites used to distribute malware almost instantaneously without having to scan them. The approach, in...

Adobe launches cashless bug bounty

Shared by
Kimberly

theregister.co.uk - Adobe has launched a bug bounty program that hands out high-fives, not cash. The web application vulnerability disclosure program announced today and launched last month operates through HackerOne ...

Command Injection - Filters

Shared by
Security Tube

pentesteracademy.com - Topics / Web Application Pentesting/ Command Injection - Filters × This is a Free Video! For just $39 a month get ALL premium course videos! Downloads Videos from Web Application Pentesting New con...

Google Boosts Security in Chrome 41 - Datamation

Shared by
eSecurityPlanet

datamation.com - Google is out with Chrome 41, providing users with new security updates, bug fixes and features for the widely used browser. On the features side, Chrome 41 now supports a number of new web technol...

STUDY REVEALS AVERAGE TECH WORKER’S WARDROBE IS 85% FREE TECH T-SHIRTS

Shared by
David Maynor

haltingproblem.tumblr.com - A team of UC Berkeley researchers has discovered that the 85% of the average tech worker’s clothes are free tech t-shirts, hoodies, and other assorted clothing. The study of this prevalent free clo...

Capture The Flag: Project HEAVENWEB « Haxpo 2015 Amsterdam

Shared by
HITBSecConf

haxpo.nl - The Capture-The-Flag Teaser will be online starting 6th of March @ 20:00 CET to give players a general idea of the interesting challenges they will be facing during the onsite game. The teaser CTF ...

Here's How Samsung's Apple Pay Competitor Will Work

Shared by
Mary Kay Hoal

huffingtonpost.com - NEW YORK (AP) — Last fall, Apple launched Apple Pay, bringing mobile-payment technology to the iPhone. Samsung now wants to get that on Android phones — at least the ones it makes. The Galaxy S6 an...

This site uses cookies for an optimal experience. By continuing to browse the site you are agreeing to our use of cookies. Find out more →