The Security Daily

Technology

New Outlook for Mac available to Office 365 customers - Office Blogs

Shared by
Microsoft

blogs.office.com - Today we are announcing the new Outlook for the Mac, which delivers improved performance and reliability and a fresh look and feel that is unmistakably Microsoft Office. This release offers a more ...

Metasploit: Metasploit Weekly Wrapup: New Rubies!

Shared by
Darkoperator

community.rapid7.com - As you probably know, Metasploit is a fairly complex set of programs written in my favorite language, Ruby. Specifically, we've been on Ruby version 1.9.3 for a long while now. Well, time marches o...

Open source Knock Knock tool reveals OS X malware

Shared by
Help Net Security

net-security.org - At this year's Virus Bulletin conference held last month in Seattle, security researcher Patrick Wardle spoke about methods of malware persistence on Mac OS X. The video of his very interesting pre...

Things that freak out IT security pros

Shared by
Help Net Security

net-security.org - Ghosts and zombies aren’t the only things coming back from the dead this Halloween. Below is a list of the top security threats that organisations should be most aware of, because these are the one...

Sign-language translator uses gesture-sensing technology - CNET

Shared by
CNET

cnet.com - There are numerous apps and tech tools on the market to translate foreign languages. But sign language is a different matter. There is a major communication gap between hearing-impaired people and ...

J.P. Morgan Found Hackers Through Breach of Road-Race Website - WSJ - WSJ

Shared by
BrianHonan

online.wsj.com - J.P. Morgan Chase & Co. may not have discovered the breach in its computer systems as quickly this past summer if it hadn’t gone looking for trouble elsewhere, people briefed on the investigation s...

Skylink offers simple security for the smart home (pictures) - CNET

Shared by
CNET

cnet.com - We've done the research for you. Check out our list of the best TVs of 2014 (so far!)

RHA T10i review - CNET

Shared by
CNET

cnet.com - Earphones are made out of all sorts of materials, but it's not too often that you hear about metal injection-molded, stainless-steel ones, which is why RHA's T10i model piqued our interest. They co...

Smigin Lets You Build and Learn Useful Phrases In Different Languages

Shared by
Lifehacker

lifehacker.com - iOS: If you're traveling internationally—or want to make simple conversation with a non-English speaker—the Smigin app on iOS lets you build phrases quickly, gives you native pronunciation, and let...

2015 Volkswagen Golf GTE Preview - CNET

Shared by
CNET

cnet.com - Though there is a growing squadron of cars that defy the notion, hybrids are still considered boring cars by many. Volkswagen is doing its part with a plug-in hybrid Golf, which it has dubbed the G...

Use Earth View to spruce up Chrome's New Tab page - CNET

Shared by
CNET

cnet.com - Chrome's New Tab page is almost as empty as the search giant's official homepage. However, there have been many extensions over the last few years that sought to spruce it up a bit. As the unoffici...

Cisco Champions Program 2015. Now Accepting Nom...

Shared by
Cisco Security

communities.cisco.com - Are you passionate about Data Center, Cloud, The Internet Of Things, The Internet of Everything, Enterprise Networks, Security or Collaboration? Do you love sharing your knowledge? Do you want acce...

Javascript for Pentesters « SecurityTube Trainings

Shared by
Security Tube

securitytube-training.com - Javascript for Pentesters will take you beyond alert(‘XSS’) and equip you to demonstrate advanced attacks such as Hijacking Forms, Logging Keystrokes, DOM manipulation etc. This course is Beginner ...

Don't Pause! Stops Notifications from Interrupting Your Music

Shared by
Lifehacker

lifehacker.com - Android: You're grooving to music on your device and suddenly there's a quick pause—every time you get an email, text message, or other notifications. Don't Pause! prevents these annoying interrupt...

Best TVs under $500 - CNET

Shared by
CNET

cnet.com - We've done the research for you. Check out our list of the best TVs of 2014 (so far!)

BBC News - Millions of websites hit by Drupal hack attack

Shared by
Bruce Hallas

bbc.co.uk - Up to 12 million websites may have been compromised by attackers who took advantage of a bug in the widely used Drupal software. The sites use Drupal to manage web content and images, text and vide...

How Brian Krebs Became the World’s Leading Cybercrime Investigative Journalist — Fraud Conference News

Shared by
briankrebs

fraudconferencenews.com - Brian Krebs, author of Krebs on Security, did not become a cybercrime expert overnight.  As his website says, he wasn’t trained in computer security and actually stumbled upon the field by accident...

Metasploit for Pentesters « SecurityTube Trainings

Shared by
Security Tube

securitytube-training.com - The coherent teaching style and technically challenging lab exercises in the SecurityTube Metasploit Framework Expert certification help towards a gradual and comprehensive learning curve for the s...

SkylinkNet Alarm System Starter Kit review - CNET

Shared by
CNET

cnet.com - You've got more home security options these days than ever before, and an increasing number of them don't include long contracts or monthly fees. The latest such system comes from a company called ...

Cloud 5: Cloud in 2020, data clouds and robots in the cloud

Shared by
sjvn

blog.intronis.com - Before we jump into this week's links, please have a look at one of our recent blog posts, Big IT vendors finally embrace the cloud. The cloud is suddenly all the rage among large IT vendors as the...

Fitness trackers’ privacy issues

Shared by
Eugene Kaspersky

blog.kaspersky.com - It has become somewhat of an embarrassment to talk about privacy these days. What use is it to protect privacy if careless users are eager to exhibit their personal data to anyone on social network...

Chat with ghosts using an emoji ouija board - CNET

Shared by
CNET

cnet.com - If you enjoy chatting with the dead, but prefer to do it using emojicons, why not upgrade your spirit communication with an Emouija Board? After all, ghosts don't want to miss out on being about to...

Black Hat Trainings 2014 | Network Security Monitoring 101

Shared by
Richard Bejtlich

blackhat.com - Is your network safe from intruders? Do you know how to find out? Do you know what to do when you learn the truth? If you are a beginner, and need answers to these questions, Network Security Monit...

Free mobile apps = compromises on user safety?

Shared by
McAfee Labs

blogs.mcafee.com - Free mobile apps may introduce security risks that need to be addressed. While businesses need to find ways of monetizing when consumers are not ready to pay directly for using an app,  monetizatio...

x86/64 Assembly and Shellcoding on Linux « SecurityTube Trainings

Shared by
Security Tube

securitytube-training.com - The SecurityTube Linux Assembly64 Expert (SLAE64) aims to teach the basics of x86_64 assembly language on the Linux platform from a security perspective and its application to writing shellcode, en...

Watch "FTC sues AT&T for slowing internet connection speeds" Video at SCMagazine

Shared by
SCMagazine

outsidelens.scmagazine.com - The Federal Trade Commission says AT&T's practice of slowing down the connection speeds of unlimited-data customers who tap excessive amounts of data is a failure to deliver on the promise of "unli...

Black Hat Trainings 2014 | Linux Lockdown and Proactive Security

Shared by
Black Hat

blackhat.com - System compromise is so common that it seems unavoidable. Even with perfect patching, our systems may be compromised through vulnerabilities that don't have patches yet or through "0-day" vulnerabi...

I’m Terrified of My New TV: Why I’m Scared to Turn This Thing On — And You’d Be, Too

Shared by
Rebecca Herold

brennancenter.org - I just bought a new TV. The old one had a good run, but after the volume got stuck on 63, I decided it was time to replace it. I am now the owner of a new “smart” TV, which promises to deliver stre...

Inside the Mountain That Used to House Wikileaks's Servers

Shared by
Kevin Poulsen

vice.com - One hundred and fifteen feet deep under ground, inside a mountain on the Southside in central Stockholm, behind huge doors that look like a gateway to the future, lies one of the world’s coolest of...

Avatier Identity Management Suite product review

Shared by
SCMagazine

scmagazine.com - The Avatier Identity Management Suite, or AIMS for short, is a software-based identity management product. Besides automating user creation, the Avatier suite of products can do much more. It offer...

4 Scary Truths We Observed During National Cyber Security Awareness Month

Shared by
Trustwave

trustwave.com - Friday is Halloween - and the ghosts and goblins will be out in full force in search of chocolate and other tantalizing confections. But there are plenty of reasons to feel spooked without ever lea...

ssen's blog: Building xnu for OS X 10.10 Yosemite

Shared by
Dino A. Dai Zovi

shantonu.blogspot.com - The OS X kernel source (xnu) has been released for OS X 10.10 Yosemite: here Building xnu requires Xcode and some additional open-source (but not pre-installed) dependencies. You can build xnu manu...

Retailers Now Actively Sharing Cyberthreat Intelligence

Shared by
Core Security

darkreading.com - When a threat alert arrived about a new malware threat during a recent industry gathering of retailers, a group of them immediately left the room to check in with their home networks. The intel cam...

Rekall Memory Forensics blog: Rekall now has OS X 10.10 Yosemite support!

Shared by
SANS DFIR

rekall-forensic.blogspot.com - Last night, I pushed a changelist that officially adds support for analysing OS X 10.10 (Yosemite) to Rekall. The profile for Yosemite is now available, and OSXPMem supports full memory acquisition...

Is there a future for native apps?

Shared by
CA Technologies

econsultancy.com - Recent research seems to casts doubt on the future growth of the once-thriving app economy. According to Deloitte, almost a third of UK-based smartphone users no longer download new apps in a typic...

Why it is better to purchase an antivirus directly from the developer

Shared by
Kaspersky Lab

blog.kaspersky.com - Wanting to save your money when buying things is normal, yet sometimes this might impose a threat to you. Although our ancestors tried to drive out this sinful attitude, even making up dozens of pr...

Android dialler hides, resists attempts to remove it

Shared by
Help Net Security

net-security.org - Android dialler hides, resists attempts to remove it A malicious dialler disguised as an application for adults could become a big problem for Android users, as the malware systematically removes t...

Trustwave Zero Malware Guarantee

Shared by
Trustwave

trustwave.com - Trustwave pledges to detect and stop 100 percent of malware that propagates over the web and is scanned by the Trustwave Managed Anti-Malware Service. Subscribe to our recommended protection levels...

Popular Science served up Rig Exploit Kit on its website - SC Magazine

Shared by
SCMagazine

scmagazine.com - Popular Science was serving up malicious code on its website earlier this week, according to new research from Websense. A malicious iFrame redirected users to websites serving up the Rig Exploit K...

Sandworm Vector Used for New, 'Dyre' Consequences - Infosecurity Magazine

Shared by
Microsoft MMPC

infosecurity-magazine.com - The legacy of Sandworm continues: The latest variant of the Dyreza/Dyre banking trojan malware is mounting a fresh offensive on the financial sector, with a focus on several banks in Switzerland an...

China's Huawei Accused of Hacking Government and Forging Documents in South Sudan - The Epoch Times

Shared by
daveaitel

theepochtimes.com - Chinese telecom company Huawei is being accused of forging government documents and hacking government emails in South Sudan. Michael Leuth, head of South Sudan’s Ministry of Information and Broadc...

Full Security and Privacy Tip Sheet - Trend Micro

Shared by
Trend Micro

thatguy.trendmicro.com - Many internet users overshare confidential information, including private images, personal contact information, location information and personal life details, and they do not seem to understand th...

Module 1: Bit-Shifting Operations

Shared by
Security Tube

pentesteracademy.com - Topics / x86_64 Assembly Language and Shellcoding on Linux/ Module 1: Bit-Shifting Operations × This is a Free Video! For just $39 a month get ALL premium course videos! Downloads Videos from x86_6...

Facebook just created a new Tor link for users who wish to remain anonymous

Shared by
Norton

theverge.com - Facebook just took the surprising step of adding a way for users of the free anonymizing software Tor to access the social network directly. Tor is an open source project that launched in 2002 to p...

Roku Just Got Google Play

Shared by
Lifehacker

gizmodo.com - Roku was already the best little streaming device money could buy. But now, Google has gone and given Roku access to all your Google Play goodies. Which, more than just being an unprecedented move ...

The FBI's Secret House Meeting to Get Access to Your iPhone - NationalJournal.com

Shared by
Saleh Alsanad

nationaljournal.com - The Obama administration is ramping up its campaign to force technology companies to help the government spy on their users. FBI and Justice Department officials met with House staffers this week f...

Attack on White House systems breached unclassified networks - SC Magazine

Shared by
SCMagazine

scmagazine.com - Cyberattackers recently targeted White House computer systems and successfully gained access to unclassified networks. A White House official confirmed on Tuesday that the sustained attack was unus...

Confidentialité- France

Shared by
ChrisJohnRiley ✪

sourceforge.net - Notre réseau a détecté que vous êtes localisé en France. SlashdotMedia accorde de l’importance à la vie privée de nos utilisateurs. Les lois françaises exigent que nous obtenions votre permission a...

The Fastest Growing Cloud Apps of Q3 2014

Shared by
LastPass

blog.skyhighnetworks.com - Up until just a few years ago, when it came to software you only had a couple choices. You’d either trek to the local retailer and pick from a box from the shelf, or in the case of enterprise softw...

It’s Kill a Zombie Day, so clean up malware and help stop cybercrime!

Shared by
Sophos

blogs.sophos.com - If you want to help stop cybercrime and protect yourself from malware threats at the same time, today is a perfect day to do it: Halloween, which we’re also calling Kill a Zombie Day. We’re not tal...