The Security Daily

Technology

Black Friday Deals: 2014 Online Deals – Microsoft Store

Shared by
Microsoft

microsoftstore.com - Save on the things they want most. Our Black Friday deals make it easy to outfit your friends, your family, and even yourself, with the latest technology. From laptops and tablets, to phones, game ...

Nextbook 8" Tablet 16GB Windows 8.1 Bonus 16GB Micro SD Card - Walmart.com

Shared by
Microsoft

walmart.com - It's everything you want in a Windows tablet, but now it's ultra-fast with a full 8-inch display. This Nextbook comes with a quad-core Intel Atom-based processor for optimal performance and the Mic...

New Nintendo 3DS XL review - CNET

Shared by
CNET

cnet.com - Bringing 3D to the masses has been fraught with issues. The biggest of these -- amidst horrible one-size-fits-all glasses and the premium pricing slapped onto 3D products -- is the headaches it can...

Parrot Bebop Drone Preview - CNET

Shared by
CNET

cnet.com - With the Bebop Drone, Parrot puts higher-end features into a compact quadcopter that is sure to attract new and experienced pilots. For starters, its camera is a step-up from the one found on its p...

Forget flares. Next time you're in trouble, send up a balloon - CNET

Shared by
CNET

cnet.com - We've all seen the movie. A character gets lost at sea or deep in the woods and he or she shoots a flare into the air. It glows brightly, fizzles out and then -- nothing. A cold, lonely night accom...

Jim Parsons of 'Big Bang Theory' fame shills for Intel - CNET

Shared by
CNET

cnet.com - There comes a time, when you've made your fortune on TV, that you need to make a little more money with an ad. And so it is that Jim Parsons, Sheldon Cooper of "Big Bang Theory," has given in to pl...

How Vetting Mobile Apps Works for App Stores and Its Users - Security News - Trend Micro USA

Shared by
Trend Micro

trendmicro.com - These days, when you see someone staring intently or tapping at their mobile phones, chances are that they’re busy using an app. In the United States, for instance, a massive majority or 80% of con...

Cloudy with a chance of flaws - SC Magazine

Shared by
SCMagazine

scmagazine.com - Click here to register Date: Wednesday, December 3, 2014 Time: 2:00 PM ET / 11:00 AM PT Any number of industry pundits have noted the prevalence of major vulnerabilities this year, especially when ...

A Guide to Avoiding Cyber Monday Scams on Mobile - Security News - Trend Micro USA

Shared by
Trend Micro

trendmicro.com - view infographic: How to Have a Safe Cyber Monday Shopping Experience Nearly a decade after the term first came out in 2005, Cyber Monday, or the Monday right after Thanksgiving, continues to be ob...

Module 1: GDB TUI Mode

Shared by
Security Tube

pentesteracademy.com - Topics / x86_64 Assembly Language and Shellcoding on Linux/ Module 1: GDB TUI Mode × This is a Free Video! For just $39 a month get ALL premium course videos! Downloads Videos from x86_64 Assembly ...

Happy Thanksgiving!

Shared by
Norton

community.norton.com - Norton Community Home Forums Ideas Blogs Search Help Welcome Message FAQs Search Tips Participation Guidelines Terms and Conditions User Log in Sign up English 简体中文 Français Deutsch 日本語 Home Forums...

The Invisible Things Lab's blog: Qubes R3/Odyssey initial source code release

Shared by
Aaron Portnoy

theinvisiblethings.blogspot.com - Qubes R3/Odyssey initial source code release Back in 2013 we've started the work on generalizing Qubes architecture, which we code-named “Odyssey”, to allow for use of multiple hypervisors instead ...

Google launches security dashboard and wizard - SC Magazine

Shared by
SCMagazine

scmagazine.com - Google launched a ‘Devices and Activity' dashboard on Monday with the goal of providing Google Apps users with “additional insight over the devices accessing their Google account,” according to a c...

iPhone 6 Plus vs. Samsung Galaxy Notes: Final impressions - CNET

Shared by
CNET

cnet.com - It's just about time to put this series to bed. Again. It's been my pleasure to provide in-depth impressions of what it's like to actually live with the iPhone 6 Plus, the Galaxy Note 4 and its pre...

Siemens issues emergency SCADA patch • The Register

Shared by
Graham Cluley

theregister.co.uk - Siemens issues emergency SCADA patch Remote exploits plugged in WinCC

Assembly Language and Shellcoding on Linux « SecurityTube Trainings

Shared by
Security Tube

securitytube-training.com - The SecurityTube Linux Assembly Expert (SLAE) aims to teach the basics of assembly language on the Linux platform from a security perspective and its application to writing shellcode, encoders, dec...

Security. Some assembly required.: The Absolute Worst Case - 2 Examples of Security's Black Swans

Shared by
Rafał Łoś

blog.wh1t3rabbit.net - The Absolute Worst Case - 2 Examples of Security's Black Swans You know that saying "It just got real"? If you're an employee of Sony Pictures - it just got real. In a very, very bad way. There are...

Black Friday Starts Early This Year, With Pre-Thanksgiving Sales Up 19% Over 2013

Shared by
CA Technologies

techcrunch.com - Holiday shopping got an earlier start this year with a number of retailers including Walmart, Target, Amazon, Staples, Lowe’s, Sears and several others launching “pre-Black Friday” deals, or kickin...

Rootpipe, WireLurker and Masque Attack, the latest vulnerabilities on Apple devices - MediaCenter Panda Security

Shared by
Panda Security

pandasecurity.com - You have heard it more than once but it is a myth. It always has been. It does not matter how many times you have been told, Macs do have viruses. It is true that, until not too long ago, Apple com...

Analyzing the Security Management of Docker

Shared by
Hoff

securitycurrent.com - It's the holiday season, which means that many of us are already in the process (or soon will be) of putting up holiday decorations.  Ordinarily that wouldn't be particularly noteworthy -- or appli...

Nibble Security: Abusing Docker's Remote APIs

Shared by
Andres Riancho

blog.nibblesec.org - Forewords: is this post about a security vulnerability? Ultimately it's not. This is a short note on how to exploit a somehow under-documented feature in the Docker remote APIs, since I did not man...

Managing my SPAM & Junk Mail – ILGM Customer Support

Shared by
ILGM, Inc.

ilgm.zendesk.com - If you are using ILGM's email servers your spam filtering is being handles by Nuvotera formally SpamSoap, and there may be a time where you have a need to get access to what is being quarantined an...

The Night Before Black Friday - The State of Security

Shared by
Kimberly

tripwire.com - Home « News « IT Security and Data Protection « Cyber Security « The Night Before Black Friday Black Friday is here, if we remember this time last year we were still unaware that Target was comprom...

Best networking and storage Black Friday deals of 2014 - CNET

Shared by
CNET

cnet.com - The SoloPro G3 is one of a few disaster-proof external hard drives. It's perfect for storing important information safely and securely should disaster strike. That makes it more expensive than othe...

Traffic lights could be next big cyber attack threat [w/videos] - Autoblog

Shared by
AlienVault

autoblog.com - "If you want to attack a browser, you download it for free. If you want to attack a car, you have to buy a car." – Chris Valasek. Private contractors usually administer and operate these systems; t...

Team on the Run Product Review

Shared by
Moblized

moblized.com - The Team on the Run (TOTR) mobile App is especially designed to meet the internal communication needs of businesses and organizations of all sizes. By improving communication is saves time and mone...

SQL SERVER – Beginning with SQL Server Security Aspects

Shared by
Allen White

blog.sqlauthority.com - This article is the high-level overview of the SQL Server security best practices and aspects. Ensuring SQL Server security is an important task that may be successfully solved by applying best pra...

Clubbing Seals - VaGoSec

Shared by
Jonathan Cran

vagosec.org - Is this website secure? Well, it just contains statically generated content and holds no personal information, so most likely it is. But how would you be able to tell whether it actually is secure?...

CSM and Microsoft in malware threat intelligence initiative

Shared by
CyberSecurityM'sia

digitalnewsasia.com - NATIONAL cybersecurity agency CyberSecurity Malaysia (CSM) has announced the activation of a Cyber Threat Intelligence Programme (CTIP) in partnership with Microsoft Malaysia.   Microsoft’s CTIP is...

3 Things Your Business Needs to Accept Apple Pay

Shared by
Moblized

moblized.com - Financial institutions, credit issuers, and payment processors have had months (perhaps years) to negotiate, document, and prepare for the launch of Apple Pay. You have had all of 3 days to digest,...

Course Introduction

Shared by
Security Tube

pentesteracademy.com - Topics / x86 Assembly Language and Shellcoding on Linux/ Course Introduction × This is a Free Video! For just $39 a month get ALL premium course videos! Downloads Videos from x86 Assembly Language ...

Sony Pictures hackers release list of stolen corporate files

Shared by
GFI Software

arstechnica.com - On Monday, employees at Sony Pictures Entertainment—the television and movie subsidiary of Sony Corp.—discovered that their internal corporate network had been hijacked. A message from an individua...

Uber’s data-sucking Android app is dangerously close to malware [updated]

Shared by
Security Beacon

cultofmac.com - Uber has been sideswiped by a ridiculous number of controversies lately, but things are about to get even worse for the ride-sharing service. A security researcher just reverse-engineered the code ...

Microsoft Ad For Surface Pro 3 Compared To Video Equivalent Of An Ugly Holiday Sweater, But Makes A Point

Shared by
Wes Miller

hothardware.com - I think its an awesome ad, and I like the Surface Pro 3 from what I've been shown. I could definitely see getting one of these. They appear to be versatile and fun to use.

Skimmer Innovation: ‘Wiretapping’ ATMs — Krebs on Security

Shared by
Patrick C Miller

krebsonsecurity.com - Banks in Europe are warning about the emergence of a rare, virtually invisible form of ATM skimmer involving a so-called “wiretapping” device that is inserted through a tiny hole cut in the cash ma...

Is This The Final Straw? Uber's Android Application--"Literally Malware" - Forbes

Shared by
OPSWAT

forbes.com - Update – Uber responded to this article with the following statement: Access to permissions including Wifi networks and camera are included so that users can experience full functionality of the Ub...

Globe website hacked due to 'poor internet connection service'

Shared by
PCI DSS Wiki

technology.inquirer.net - MANILA, Philippines – The website of Globe Telecommunications was allegedly hacked by a group of hacktivists protesting their “poor internet connection service.” The hacktivists identified themselv...

When iPads fall, Windows tablets rise

Shared by
Wes Miller

betanews.com - The tablet market could be slowing down after years of growth, according to industry estimates, with Apple's iPad set to be hardest hit. Research firm IDC projects that total tablet shipments globa...

Descubre lo que Google sabe de ti y cómo evitar que lo use para dirigirte publicidad - Noticias de Tecnología

Shared by
EnfoqueSeguro

elconfidencial.com - ¿Es usted un hombre de entre 30 y 35 años aficionado a la cocina japonesa, los deportes de equipo y la astronomía? ¿O una mujer de unos 45 años interesada en el arte, la música contemporánea y las ...

NetAppVoice: This Black Friday, Stores Know Customers Better, Via Big Data - Forbes

Shared by
Richi Jennings

forbes.com - Macy’s and Sears might not be psychics or fortune-tellers, but that doesn’t mean they can’t predict the future. Each year, retail giants attempt to forecast the hottest toys and trends of the holid...

The looming cyberthreat to America’s backbone

Shared by
Security Affairs

foxnews.com - Recently a series of high-profile attacks hit U.S. infrastructure - computer networks at the White House, the State Department and U.S. Postal Service systems were compromised by hackers. Security ...

Icelandic hacker pleads guilty to embezzling funds from Wikileaks - Boing Boing

Shared by
Matthijs R. Koot

boingboing.net - An Icelandic hacker who was once an ally of Julian Assange pled guilty Wednesday to charges that he embezzled 30 million Icelandic crowns ($240K USD) from Wikileaks. Sigurdur Thordar­s­son's courtr...

Module 2: Class-Dump-Z

Shared by
Security Tube

pentesteracademy.com - Topics / Pentesting iOS Applications/ Module 2: Class-Dump-Z × This is a Free Video! For just $39 a month get ALL premium course videos! Downloads Videos from Pentesting iOS Applications Full Video...

CoreSecurity/Agafi · GitHub

Shared by
S.J. Moore

github.com - Agafi/ROP is a Win32 command line tool chain useful to find gadgets and build ROP-Chains used by x86 binary exploits. Agafi (Advanced Gadget Finder) is a x86 gadget-finder tool useful to find gadge...

Appetite Review - Moblized

Shared by
Moblized

moblized.com - Appetite is a mobile payment, rewards and engagement platform. Our goal is to empower franchises, retail chains, and independent merchants with in-store mobile wallet capabilities for customers, an...

ACMA creates self-service portal for malware diagnosis - Security - News - iTnews.com.au

Shared by
Adli Wahid

itnews.com.au - The Australian Communications and Media Authority has launched an online portal for ISPs and network operators to log-in and check which IP addresses on their network might be infected with malware...

Share: The Icon No One Agrees On - BOLD by Pixelapse

Shared by
Andrew G. Allen

bold.pixelapse.com - What do each of these symbols have in common? They are all trying to convey the exact same action - share! Sharing to a social network or via email is a ubiquitous action nowadays but designers hav...

Security Slice: Snapcash Security Issues - The State of Security

Shared by
Tripwire, Inc.

tripwire.com - Home « News « Security Slice « Security Slice: Snapcash Security Issues Snapchat will soon let users transfer cash using Square. Even though this new feature will only be available to users with An...

Facebook's Privacy Policy Is Changing And You're Going To Get A Long Email About It - Business Insider

Shared by
Theresa Payton

businessinsider.sg - Facebook is sending users a lengthy email detailing changes to its privacy policy that’ll start on January 1, 2015. Facebook is launching a tool called Privacy Basics that’ll show users who can see...

Webcast

Shared by
Adli Wahid

acma.gov.au - Did you know that malware infections are becoming more sophisticated? The ACMA’s Australian Internet Security Initiative (AISI), which reports compromised IP addresses to internet service providers...