The Security Daily

Technology

Turns Out Consumers Stay Loyal to Companies After Hacks

Shared by Ophelia Chang

wired.com - The digital theft of just under 100 million records stolen from both the Office of Personnel Management and Anthem pales compared to the revelation that at least 500 million Yahoo accounts have bee...

4 Ways to Send Messages That Self-Destruct

fieldguide.gizmodo.com - Sometimes you don’t want your messages to live forever. Maybe you have something secret you want to tell someone, or maybe it’s something time-sensitive. Or maybe you just don’t want to be trapped ...

Find Out What Facebook Knows About You With This Chrome App

Shared by Dave Trader

mentalfloss.com - Facebook doesn’t have a great reputation when it comes to keeping your information private. When the company bought the messaging app WhatsApp in 2014, the company promised there wouldn’t be any sh...

Step Up Your Smart-Home Security Now

wsj.com - Connected cameras and other smart-home devices promise a Jetsons-esque future. But as a recent hijacking of more than 100,000 networked cameras and DVRs demonstrates, they also provide fertile grou...

Self-Driving Hype Doesn’t Reflect Reality

wsj.com - To judge by recent claims, “fully autonomous” self-driving technology is just around the corner. Uber Technologies Inc. is offering Pittsburgh residents rides in autonomous Ford Fusions. Ford Motor...

The Pax Era aims to be the Keurig of vaporizers

Shared by Dave Trader

engadget.com - Each 500mg cartridge is fully self-contained and single-use. That guarantees the sticky stuff inside never comes near your fingers or lips. Plus, the Era has an insanely short air path -- just thro...

The IoT needs a cybersecurity "gold standard" to tackle data breach fears

gamingtechlaw.com - No software is 100% secure, and Internet of Things technology is no different. However, because of public perception it is even more important for the IoT industry to find “adequate” safety standar...

How to stay ahead of cyber criminals in the data breach era

thenextweb.com - It’s no secret that cyber attackers are becoming increasingly sophisticated, stealthy, and motivated. As we’ve seen in high profile breaches at Target, JP Morgan and Home Depot, attackers can infil...

Paypal phishing pages, kits and samples - 30.09.2016 - Pastebin.com

pastebin.com - ===================================== Paypal phishing 30.09.2016 ------------------------------------- page: http://www.conservationcubclub.com/complaints.paypalsucks.com/limited-paypal-account/Ver...

73% of companies using vulnerable end-of-life networking devices

csoonline.com - Seventy-three percent of companies are using vulnerable, end-of-life networking equipment, up from 60 percent last year, according to a new analysis of more than 212,000 Cisco networking devices at...

Hacked Steam accounts spreading Remote Access Trojan

bleepingcomputer.com - Yesterday, I stumbled on a post where a Reddit user named Haydaddict was alerting people about some hacked Steam accounts spreading malware. As I am always interested in new malware, I took a look ...

Public Access - The Public Access Weekly: Spooooooon!

Shared by Dave Trader

engadget.com - Looking for something to read? Check out:As someone who was also heavily into Columbia Music House and Napster, I can relate pretty hard to Roberto Baldwin's piece on digital vs physical media and ...

This Snowden-approved cybersecurity company wants to build a better Slack

dailydot.com - It took about eight months for Slack to grow from nothing into a billion dollar company. But is the rise of group-chat apps putting organizations at risk? At its core, Slack allows individuals and ...

Design News - Blog - Critical Security Controls Could Thwart 70% of Cyber Attacks

Shared by James Tarala

designnews.com - Most cyber attacks could be avoided by adopting a list of Critical Security Controls that were created by the Center for Internet Security. That’s the message from Steve Mustard at his session at D...

Android malware that can infiltrate corporate networks is spreading

csoonline.com - An Android malware is spreading across app stores, including Google Play, and has the capability of stealing sensitive files from corporate networks. DressCode, a family of Android malware, has bee...

Microsoft releases Server 2016, complete with commercial Docker engine

Shared by Gal Shpantzer

theregister.co.uk - Ignite Microsoft announced the release of Windows Server 2016 and System Center 2016 at its Ignite event in Atlanta. The commercially supported edition of the Docker engine is included at no extra ...

Hackers imitate popular downloads in torrent: Audio, video, software and other digital content might be malware!

hngn.com - Regular torrent clients must be alarmed for cyber criminals find a new way to infiltrate the said site through spreading malware using popular downloads. Audio, video and other innocent torrent fil...

Consumers Who Are Too Connected at Home Are at Greater Risk of Being Hacked

mainstreet.com - "Even if end users do patch these devices, what happens in a couple of years when the developer moves to a new version of the device and stops supporting the old equipment?" Gregg said. "End users ...

Microsoft TypeScript 2.0 Language - Ready for Prime Time in IT? - Petri

petri.com - Microsoft updates TypeScript language to 2.0. It’s an open-source superset of JavaScript, but said to be easier to use, more productive, create more reliable code, and compile down to standard Java...

Arduino makes hardware hacking easier than ever with its new ESLOV IoT Invention Kit

thetechportal.com - The electronics market today is filled with hundreds of thousands of devices. And yeah, that means there is more than one device that has the same design. But this kind of an industry was unthinkab...

Traveling for Work? You’re a Prime Target for Hackers

hbr.org - As if the stresses and headaches of business travel weren’t enough, there’s one more thing to worry about while traveling in unfamiliar places: the security of your email. Thanks to the rapid ascen...

Fancy Bear Hackers use a new Mac Trojan against aerospace industry

securityaffairs.co - In the last weeks, we have discussed a lot about a string of attacks that targeted the US  Democratic National Committee (DNC), security experts collected evidence of the involvement of Russian nat...

More than 400 malicious apps infiltrate Google Play

Shared by Sam Bowne

arstechnica.com - Google Play was recently found to be hosting more than 400 apps that turned infected phones into listening posts that could siphon sensitive data out of the protected networks they connected to, se...

A Bug Bounty Reality-Check

Shared by Jonathan Cran

darkreading.com - Bug bounty programs are all the rage lately, but these vulnerability reward initiatives can cost an organization more than they bargained for if they don't have sufficient software development proc...

Recognizing That Not Every Hacker Is a Cybercriminal

itbusinessedge.com - Cyber Crime Report Finds Old Breaches Led to New Breaches I was very happy when cybersecurity came up for discussion in Monday’s presidential debate. I’d been trying since the primaries to get some...

WCTF Debrief

Shared by DEF CON

wirelessctf.blogspot.com - In this edition of WCTF blog we welcome guest blogger 0rsu who was a member of the second place team of the DEFCON WCTF challenge. void main () { I rolled into Vegas this year much as I have the pa...

Emergency CERT Disaster Response Training to be held on Lana’i - MAUIWatch

mauiwatch.com - Maui Civil Defense Agency announced that it will offer a free, four-week series of Community Emergency Response Team (CERT) training classes on Lanai. CERT is a volunteer training program that prep...

Uber is going to start using selfies to give riders a safer experience

thestreet.com - NEW YORK (TheStreet) -- Ride-sharing service Uber is teaming up with tech giant Microsoft (MSFT) to introduce a new selfie-based security feature on its app in the U.S. The new feature will prompt ...

2016 BASC Homepage - OWASP

Shared by Rafał Łoś

owasp.org - Sponsorships are available: See Sponsorship Kit Please help us keep BASC free by viewing and visiting all of our sponsors. This is the homepage for the 2016 Boston Application Security Conference (...

A word with Chris Lynch, head of the Defense Digital Service

politico.com - With help from Eric Geller, Martin Matishak and Sara Stefanini A NERD’S TOUR OF DUTY — Chris Lynch, head of the nearly one-year-old Defense Digital Service, sat down with Martin in the organization...

Scammers sent to the slammer for romance and secret shopping fraud

Shared by Moix Security

nakedsecurity.sophos.com - Seven online fraudsters who duped victims out of their money through fake checks, online dating and mystery shopper scams have been sentenced. On Wednesday, the US Department of Justice (DOJ) annou...

Dissecting the Most Complex DDoS Test Challenge in the World

ixiacom.com - Distributed Denial of Services, or DDoS, has gone through more extreme innovations than many other threat vectors. Now, this is not to undermine the tremendous evolution we have seen in malwares or...

Yahoo Mobile Mail Wide Open Even After Password Reset

infosecurity-magazine.com - In the aftermath of Yahoo announcing the breach of 500 million user accounts, Trend Micro Zero Day Initiative (ZDI) researchers are warning that a password reset still leaves mobile mail wide open ...

Android Security for Pentesters « SecurityTube Training

Shared by Security Tube

securitytube-training.com - Android Security for Pentesters aims to help students get started with Android application security and pentesting using a step-by-step, hands-on approach to finding vulnerabilities in real world A...

Turn your streamer remote into a universal remote

Shared by CNET

cnet.com - Everyone loves their Apple TVs, their Fire TVs, their Roku boxes. But using one inevitably means juggling two remotes: one for the streamer, one for the TV itself. You'd think that in this highly c...

How to set up two-step verification for your Apple ID

Shared by CNET

cnet.com - Your Apple ID holds payment details and personal information in the form of photos and iMessages, so it only makes sense you secure it using two-step authentication. Two-step verification (or authe...

Man walks into Apple store, smashes every iPhone he can find

Shared by CNET

cnet.com - Technically Incorrect offers a slightly twisted take on the tech that's taken over our lives. He could have been an explosive Samsung fan. He could simply have been a man with political leanings to...

6 easy ways to speed up Windows 10

Shared by CNET

cnet.com - Windows 10 may be practically brand-new, but it still suffers from some typical Windows performance issues -- especially if you're running it on an older machine. Here are some quick, easy ways to ...

The best places to install smoke detectors (and how to make them less annoying)

Shared by CNET

cnet.com - Installing fire detectors in your home is vital to home safety. But chances are you don't have enough smoke detectors in your home. The one-and-done approach isn't enough for the typical family hou...

How to prepare for your digital afterlife

Shared by CNET

cnet.com - You're probably not going to die any time soon (knock on wood), but it's never a bad idea to prepare for the worst. Your will may take care of who gets your car when you pass away, but what about w...

9 settings every Samsung Galaxy S7 owner should change

Shared by CNET

cnet.com - These lesser-known options help personalize Samsung's newest phone. After going through the basic setup process of your new Galaxy S7 or S7 Edge, there are a few more things you should do to get th...

SSH brute force attacks compromise servers for DDoS attacks

Shared by SCMagazine

scmagazine.com - Sucuri researcher Daniel Cid found that it only took an attacker 12 minutes to compromise an IPv4 server and shortly after, use it to launch a DDoS attack on an unsuspecting victim while performing...

x86/64 Assembly and Shellcoding on Linux « SecurityTube Training

Shared by Security Tube

securitytube-training.com - The SecurityTube Linux Assembly64 Expert (SLAE64) aims to teach the basics of x86_64 assembly language on the Linux platform from a security perspective and its application to writing shellcode, en...

BIND update fixes high-severity flaw affecting ICS, as CERT releases update to CSET tool

Shared by SCMagazine

scmagazine.com - The Internet Systems Consortium (ISC) released an update Tuesday for a high-severity security flaw that would allow the Berkeley Internet Name Domain (BIND) software, the open source software compo...

CatchApp system can spy on WhatsApp encrypted communications from a backpack

Shared by Dejan Kosutic

securityaffairs.co - The Israeli surveillance firm Wintego is offering for sale a system that is able to hack WhatsApp encrypted communications from mobile devices within close proximity of a hidden Wi-Fi hacking devic...

Jive Notifies Customers of Data Breach, Resets Account Passwords

tripwire.com - Home » Latest Security News » Jive Notifies Customers of Data Breach, Resets Account… Last week, enterprise software vendor Jive notified customers of a data breach, which may have led to outsiders...

$1.5 Million Reward Announced for Remote Jailbreak of iOS 10

tripwire.com - A company is offering to pay 1.5 million USD to anyone who submits a remote jailbreak for Apple’s iOS 10. On Tuesday, the exploit broker Zerodium made the announcement on Twitter: Announcement – Ou...

Your Quick Reference Guide to Always-On SSL

bitpipe.com - Encryption is a vital part of day-to-day business for enterprises, and Always-On SSL is a great tool to utilize to make sure all information transferred between websites and users is secure. But wh...

NVD - Detail

web.nvd.nist.gov - National Cyber Awareness System Vulnerability Summary for CVE-2012-0618 Overview WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or...

6 Easy-to-Follow Tips for MSPs to Stop Ransomware

Shared by Andrew Hay

thevarguy.com - In a recent blog post we discussed the growing variety of ransomware that plagues today’s IT landscape. While this proliferation of threats may seem daunting and virtually impossible to combat, the...

This site uses cookies for an optimal experience. We also allow third party cookies by trusted partners. By continuing to browse the site you are agreeing to our use of cookies. To learn more and disable some specific cookies, check our Privacy policy →