The Security Daily

Technology

SSCC 199 - Don't panic, it's not really as VENOMous as you thought [PODCAST]

Shared by Sophos

nakedsecurity.sophos.com - Filed Under: Android, Data loss, Featured, Law & order, Mobile, Podcast, Privacy Here's our latest security podcast, featuring Sophos experts and Naked Security writers Chester Wisniewski and Paul ...

Mozilla overhauls Firefox smartphone plan to focus on quality, not cost - CNET

Shared by CNET

cnet.com - Mozilla has revamped its Firefox OS mobile software project after concluding that ultra-affordable $25 handsets aren't enough to take on the biggest powers of the smartphone world, CNET has learned...

The LOGJAM vulnerability in TL;DR format...

Shared by Sophos

nakedsecurity.sophos.com - A1. Logjam is a vulnerability in TLS (also called SSL), the system that puts the "S" in "HTTPS" and the padlock in your browser, amongst other computer security tasks. The vulnerability involves tr...

Microsoft tried to buy Salesforce for $55B, report says - CNET

Shared by CNET

cnet.com - Microsoft almost made one of the most colossal tech acquisitions in history earlier this spring. Talks between the world's largest software maker and Salesforce.com, the San Francisco-based cloud-c...

Uber CEO Would Replace Drivers With Self-Driving Cars

Shared by Dave Lewis

time.com - Once self-driving cars are everywhere, Uber thinks they’ll make up its entire fleet. Speaking at Re/code’s Code conference, Uber CEO Travis Kalanick said he loves the idea of autonomous vehicles, l...

Live almost anywhere on Earth in futuristic Ecocapsule - CNET

Shared by CNET

cnet.com - The tiny-house movement has been steadily gaining traction around the world as more and more people ditch their large, expensive-to-operate homes for more affordable, easy-to-maintain spaces. Now, ...

This Week's Most Popular Posts: May 15th to 22nd

Shared by Lifehacker

lifehacker.com - This week we learned why Chrome is such a RAM hog, where the “dadbod” really comes from, the beauty of gaming mice for productivity, and how to properly lock your bike. Here’s a look back. Chrome m...

What Happens After a Cyberattack?

huffingtonpost.co.uk - Around this time last year a large online auction website went public to announce they had been breached and millions of customer records were compromised. They were not alone, 2014 was marked by h...

'Tomorrowland' in Dolby Cinema: the best picture I've seen in a theater - CNET

Shared by CNET

cnet.com - George Clooney's grizzled face filled the screen, and I was in awe. Not at the face per se, but at all the wrinkles. The individual creases and lines. Fine hairs and pores. Then there were the subt...

Scareware: Fake Minecraft apps Scare Hundreds of Thousands on Google Play

Shared by ESET

welivesecurity.com - ESET has discovered over 30 scareware applications available for download from the Google Play store. The malicious applications, which pretended to be cheats for the popular Minecraft game, have b...

Microsoft faces claims it threatened MPs with job cuts in constituencies

Shared by Slim Amamou

theguardian.com - Microsoft executives telephoned Conservative MPs threatening to shut down a facility in their local area because of planned IT reforms, David Cameron’s former strategy chief has claimed. Steve Hilt...

Black Hat USA 2015

Shared by Black Hat

blackhat.com - GSM networks are compromised for over five years. Starting from passive sniffing of unencrypted traffic, moving to a fully compromised A5/1 encryption and then even to your own base station, we hav...

Saltando y Asegurando los Periodos de prueba en el Software

dragonjar.org - Enviado por DragoN en dic 20, 2010 | 12 Comentarios Una gran mayoría del software pago (shareware) que encontramos para nuestros equipos, utilizan como parte de su estrategia de mercadeo versiones ...

Today's Best Deals: Retina iMac, Buried Treasure, and a Lot More

Shared by Lifehacker

deals.kinja.com - Here are the best of today’s deals. Get every great deal every day on Kinja Deals, follow us on Facebook and Twitter to never miss a deal, join us on Kinja Gear to read about great products, and on...

Anatomy of a LOGJAM - another TLS vulnerability, and what to do about it

Shared by SophosLabs

nakedsecurity.sophos.com - Transaction security on the internet is where the you can find the funkiest vulnerability names. They include BEAST, Lucky Thirteen, BREACH, POODLE and Heartbleed. FREAK is where you sit yourself o...

TextFlow Adds Tons of Text Formatting Options to OS X

Shared by Lifehacker

lifehacker.com - Whether you’re a writer, coder, or simply spend your days writing lots of emails, you tend to need to change text formatting for all kinds of reasons. TextFlow is a set of Automator actions that ma...

Newer versions of Windows are getting better at protecting against malware according to security report

Shared by Symantec

winbeta.org - Later this year, Microsoft will have to pitch Windows 10 to a public that was overwhelming apathetic to its previous OS offering with Windows 8. Offering a free upgrade to Windows 10 is a huge sell...

Android factory reset not enough to keep data secure

net-security.org - Android factory reset not enough to keep data secure If you sell or gift your old Android phone to someone, is it enough to do a factory reset to wipe all your sensitive data? And if your Android g...

Malvertising: Silent but Deadly -

Shared by Trend Micro

blog.trendmicro.com - The malvertising phenomenon is not a new thing; it has been a criminal tactic for over a decade. Back in 2004, visitors to the technology website, “The Register” were hit by a rogue advertisement, ...

Joke or Blunder: Carbanak C&C Leads to Russia Federal Security Service

Shared by TrendLabs

blog.trendmicro.com - In an interesting turn of events, a C&C used in the Carbanak targeted attack campaign now resolves to an IP linked to the Russian Federal Security Service (FSB). Yesterday, while checking the indic...

IC3 report says social mediarelated complaints quadrupled over five years

Shared by SCMagazine

scmagazine.com - In its annual internet crime report (PDF), the FBI's Internet Crime Complaint Center (IC3) revealed that it received 269,422 complaints in 2014, up from 262,813 complaints last year. Published Tues...

Windows Group Policy exploitation via MiTM attack

Shared by S.J. Moore

blog.coresecurity.com - Windows has been around a long time. After years of evolving from one version to another, it is rare to find vulnerabilities that allow remote code execution from Windows XP to Windows 8.1 (32 and ...

Virtual reality may rule video games. Here's who will rule VR - CNET

Shared by CNET

cnet.com - Some of the greatest rivalries have come out of the video game industry: Midway's Space Invaders against Atari's Asteroids. Nintendo's Mario versus Sega's Sonic the Hedgehog. Microsoft's Halo again...

Malware upsurge threatens millions of POS devices

net-security.org - Notable brands like Target, Neiman Marcus, PF Chang’s, Staples, Michaels Stores, and Home Depot have all have become victims of point of sale (POS) security breaches targeting consumer payment card...

Apple Store app gets 2-step verification, Touch ID security - SlashGear

Shared by Graham Cluley

slashgear.com - Considering the mess it found itself in over the iCloud fiasco, Apple could not but help hunker down on its security measures. Aside from data encryption and Touch ID, which is advertised to be bot...

Fraud Can Happen Anytime, Anywhere, and to Anyone

Shared by Malwarebytes

blog.malwarebytes.org - We’re no strangers to fraud. Thanks to the digital age, most of us at least have an idea that stealing something doesn’t just involve money and physical things anymore. Criminals can steal card det...

Google Hangouts for Windows, OS X, and Windows Updated with a New Look

Shared by Lifehacker

lifehacker.com - Windows/Mac/OS X: Google updated the Hangouts Chrome app today with a brand new look that makes it a lot more appealing to use. The new app looks a lot like the Android and iOS versions of Hangouts...

Cisco, EMC, Once Allies Now Frenemies, Have Similar Strategy To Maintain Dominance

forbes.com - Commodification promised to kill old tech stalwarts like Cisco, EMC EMC and Oracle Oracle as standardized, mass produced hardware paired with open source software undermined their high-margin busin...

Ersatz Scheme Deceives Hackers, Protects Stored Passwords

Shared by Kaspersky Lab

threatpost.com - Researchers at Purdue University have developed a scheme that protects stolen passwords from offline cracking. The project is explained in a paper called “ErsatzPasswords – Ending Password Cracking...

Hundreds of people who want to hire hackers just got outed

Shared by Kevin Poulsen

fusion.net - In February, an Alabama woman named Terri went on a hacker-for-hire website called Hacker’s List, and posted a job she needed done. “I need to get information off an iPhone6, mainly texts (current ...

Apple Watch lets nimble-fingered crooks use your Apple Pay

Shared by SophosLabs

nakedsecurity.sophos.com - As the sleeve-tattooed among us already know, Apple Watch needs nice, clear access to skin. As long as it's got that contact, it won't pester users to re-enter their passcode every time they want t...

Hack of online dating site Adult FriendFinder exposes millions - CNET

Shared by CNET

cnet.com - Technically Incorrect offers a slightly twisted take on the tech that's taken over our lives. It's one thing when your bank account, your credit card details or your buying behavior at Target get l...

The FCC warns Internet providers they’re on the hook now for user privacy

Shared by NortonOnline

washingtonpost.com - Photo by Michael Bocchieri/Getty Images Don't misuse your customers' personal information. That's the warning federal regulators are sending to Internet providers such as Comcast and Verizon, in a ...

x86/64 Assembly and Shellcoding on Linux « SecurityTube Trainings

Shared by Security Tube

securitytube-training.com - The SecurityTube Linux Assembly64 Expert (SLAE64) aims to teach the basics of x86_64 assembly language on the Linux platform from a security perspective and its application to writing shellcode, en...

House lawmakers information accessed in CareFirst BlueCross BlueShield breach

Shared by SCMagazine

scmagazine.com - House lawmakers might have had some of their personal data compromised in the CareFirst BlueCross BlueShield data breach earlier this week. An email sent to lawmakers and reported on by POLITICO, t...

Assembly Language and Shellcoding on Linux « SecurityTube Trainings

Shared by Security Tube

securitytube-training.com - The SecurityTube Linux Assembly Expert (SLAE) aims to teach the basics of assembly language on the Linux platform from a security perspective and its application to writing shellcode, encoders, dec...

Software Engineer - iOS - Bluebox Security

Shared by Dave Lewis

bluebox.com - Founded in 2012 by a team of security experts, Bluebox Security offers the first mobile data security solution to safeguard corporate data across the device, application, and network. The cloud-bas...

Nokia CEO: We don't know yet if we'll sell Here mapping business - CNET

Shared by CNET

cnet.com - Nokia is no stranger to big sales, but that doesn't mean the company will follow the same path with its mapping division. Nokia's Here division is a hot commodity in the mapping business. For years...

Computing GCSE gets the green light

Shared by BrianHonan

computerweekly.com - Exam board OCR will submit the draft for a computer science GCSE next week. The computer science GCSE was announced by prime minister David Cameron in December 2014. It is set to be introduced to c...

Network security improved by Cisco data mining

searchsecurity.techtarget.com - SAN FRANCISCO -- Cisco is undoubtedly one of the biggest names in network security today, priding itself on constantly transitioning with the evolving market trends. Part of Cisco's success in keep...

CareFirst data breach affects about 1.1M people

securityaffairs.co - Health insurer CareFirst BlueCross BlueShield is notifying more than one million individuals that it was the victim of a data breach which may have exposed personal information used by attackers to...

Javascript for Pentesters « SecurityTube Trainings

Shared by Security Tube

securitytube-training.com - Javascript for Pentesters will take you beyond alert(‘XSS’) and equip you to demonstrate advanced attacks such as Hijacking Forms, Logging Keystrokes, DOM manipulation etc. This course is Beginner ...

Russian models that fall in love with you… it’s a scam! - MediaCenter Panda Security

pandasecurity.com - “I want to chat with you” if you have received an email with this subject, or something similar, with the picture of a beautiful Miss Russia, just ignore it! She is not contacting you because she h...

Smart Lock. Cómo tener el móvil desbloqueado mientras estás en un lugar seguro - Media Center Spain

pandasecurity.com - Ya sabemos lo importante que es elegir bien nuestras contraseñas. Además, para realizar cualquier tarea en el teléfono móvil hay que completar los pasos: introducir el PIN, la clave o el patrón que...

Internet Health Test Checks to See if Your ISP Slows Your Connection

Shared by Sam Bowne

lifehacker.com - The FCC recently established new rules to prevent ISPs from selectively degrading your connection to certain services, like some have done in the past. This tool, from Fight for the Future, can che...

Security and the Internet of Things - Computer Science Zone

Shared by Rafał Łoś

computersciencezone.org - The Internet of Things includes both traditional electronics and everyday “things” embedded with sensors, computing, and networking capabilities. Coffee Makers Thermostats Refrigerators Cars Even C...

How to keep your data from ending up in the wrong hands

Shared by Sophos

blogs.sophos.com - It’s safe to say that no business wants to end up like Target, Sony or Anthem. Those companies suffered massive data breaches at considerable cost – from fines and legal fees, to loss of reputation...

IRRITANT HORN – NSA plan to Hijack Google Play Store to serve spyware

securityaffairs.co - New top-secret documents leaked by the whistleblower Edward Snowden revealed that the NSA and its allies of the Five Eyes group (United States, United Kingdom, Canada, New Zealand and Australia) pl...

JPEG malicious code

pandasecurity.com - We daily capture them on our phones. We have dozens of them stored on our computers. We share them on social networks and we love to see those of others. We are talking about the images in JPEG for...

McNealy, Sun Micro’s Ex-Chairman, Steps Up to Run Startup

wsj.com - McNealy, Sun Micro’s Ex-Chairman, Steps Up to Run Startup Wayin helps companies turn social-network posts into marketing messages

This site uses cookies for an optimal experience. By continuing to browse the site you are agreeing to our use of cookies. Find out more →