The Security Daily

Technology

GISEC 2015 - I.T. Security Awards At GISEC

Shared by GISEC

gisec.ae - The nominations for the I.T. Security Awards will be judged by: Principal Consultant/Managing Director  at Dr Kanak Madrecha & Associates FZ LLE and President at Global Development, Supply Chain & ...

Apple Watch is a waste of time, says Conan O'Brien - CNET

Shared by CNET

cnet.com - Technically Incorrect offers a slightly twisted take on the tech that's taken over our lives. You've been poking at your wrist and talking to it. How quickly will you become used to it? How quickly...

Google's Trusted Places Disables Your Lock Screen Within Geofences

Shared by Lifehacker

lifehacker.com - Android: The Smart Lock feature in Android allows you to disable your lock screen selectively based on certain criteria like location. A recent update to this feature allows you to set geofence are...

Five Best Ebook Readers

Shared by Lifehacker

lifehacker.com - If you like taking your books on the go, you’ve never had more options. The best ereaders are slim, have batteries that last for weeks, and come in both e-ink and color varieties, have multiple scr...

Evgeniy Mikhailovich Bogachev: U.S. Announces $3 Million Reward

time.com - The United States announced a $3 million reward Tuesday for information that would lead to the arrest and/or conviction of a suspected Russian hacker, the largest bounty it has ever offered in a cy...

#CiscoChat: Incident Response in a Complex Threat Environment

blogs.cisco.com - Though 2014 has come and gone, one trend that dominated its headlines has unfortunately continued to do the same this year. So, what happens to an organization’s cybersecurity readiness plan when t...

Twitter-joking security expert barred from another United flight, lawyer says - CNET

Shared by CNET

cnet.com - Technically Incorrect offers a slightly twisted take on the tech that's taken over our lives. It seems that joking about messing with the security systems on a United Airlines flight might be askin...

ESET | Antivirus, Internet Security Software & Virus Protection :: RSA 2015

Shared by ESET

eset.com - ESET is joining IT security leaders at RSA 2015, to showcase our full range of new business security solutions. Stop by and see how our all-new, easy-to-use remote administrator makes your life eas...

Sony Cyber-shot DSC-HX90V Preview - CNET

Shared by CNET

cnet.com - When Sony released the Cyber-shot HX50V in 2013, it was the world's smallest and lightest camera with a 30x zoom lens. Now, two years later, it's back with the HX90V and WX500, which reclaim the ti...

Why You Should Enroll In Cyber Security Awareness Training

thehackernews.com - When it comes to cyber security, even big organizations lack the basic knowledge of how to protect company’s data from the outside. Everyday businesses are facing the threat of phishing, ransomware...

Russian hacking group reportedly exploited Flash, Windows - CNET

Shared by CNET

cnet.com - A group of Russian hackers has been using flaws in two popular pieces of software -- Adobe's Flash and Microsoft's Windows operating system -- to try to get information about other governments, acc...

Thank You - SumAll

Shared by Steven F. Fox

sumall.com - We noticed there’s already an account for . Please provide the password for it so we can link it to your account and make your future logins faster.

Staying Safe from IRS Scammers and Tax Fraud - Security News - Trend Micro USA

Shared by Trend Micro

trendmicro.com - View research paper: A Profile of IRS Scammers Behind Tax Fraud Over the years, attackers have come up with various clever tactics to deceive users into giving them their credentials, money, and ev...

How Targeted Attacks Changed in 2014 | Security Intelligence Blog

Shared by TrendLabs

blog.trendmicro.com - 2014 was a year in which we saw further refinements in targeted attack methodologies. As more organizations upgraded to newer versions of Windows, we saw the increased use of 64-bit malware in seve...

Apple vs. Android argument leads to bloody fight, police say - CNET

Shared by CNET

cnet.com - Technically Incorrect offers a slightly twisted take on the tech that's taken over our lives. Occasionally in the comments section of these pages, readers express their emotional and therefore irra...

Flash EK leveraged in potentially widespread malvertising attack

Shared by SCMagazine

scmagazine.com - Researchers with Malwarebytes have identified a malvertising attack carried out through Merchenta, an advertising network that works with Google's DoubleClick and claims to reach more than 28 billi...

Apple Fixes Cookie Access Vulnerability in Safari on Billions of Devices

Shared by Kaspersky Lab

threatpost.com - When Apple pushed out its most recent round of patches last week it fixed a cookie vulnerability that existed in all versions of Safari, including those that run on iOS, OS X, and Windows. Accordin...

Cyber-Shock 2015: Corporate Breach Role Play – Session - RSA Conference

Shared by RSA

rsaconference.com - This session will give you 360 degree view of the challenge of dealing with a major cybersecurity incident.  We will start as the CERT/SOC and will need to report to executive management on a devel...

Targeted Attack Campaigns and Trends: 2014 Annual Report - Security News - Trend Micro USA

Shared by Trend Micro

trendmicro.com - View Targeted Attack Campaigns and Trends: 2014 Annual Report A targeted attack is a type of threat that aims to exfiltrate data from target systems. It is composed of six components: intelligence-...

Huawei P8 Preview - CNET

Shared by CNET

cnet.com - Huawei has a new flagship smartphone to boast about and it's called the P8. Replacing the P7, this Android Lollipop phone squashes a 5.2-inch full HD display into a one-piece metal body and include...

Metasploit for Pentesters « SecurityTube Trainings

Shared by Security Tube

securitytube-training.com - The coherent teaching style and technically challenging lab exercises in the SecurityTube Metasploit Framework Expert certification help towards a gradual and comprehensive learning curve for the s...

Huthos VPS Provider: Totally legit, 1000% not a criminal organization

Shared by Lenny Zeltser

morris.guru - I observed a hacker trying to compromise one of my internet-facing Linux servers and repurpose it to sell to unknowing legitimate customers. Last year I built a system called Animus. In a nutshell,...

x86/64 Assembly and Shellcoding on Linux « SecurityTube Trainings

Shared by Security Tube

securitytube-training.com - The SecurityTube Linux Assembly64 Expert (SLAE64) aims to teach the basics of x86_64 assembly language on the Linux platform from a security perspective and its application to writing shellcode, en...

Sony prices 2015 4K and Android TVs - CNET

Shared by CNET

cnet.com - We've known about Sony's 4K-heavy 2015 lineup of TVs since CES in January, when the company announced their existence and posted detailed specifications on their features and differences. In Februa...

Researchers identify new targets in Operation Pawn Storm campaign

Shared by Trend Micro

scmagazine.com - The White House and NATO appear to be two of the latest targets in ‘Operation Pawn Storm,' a campaign – written about by Trend Micro in October 2014 – that is believed to be ongoing since 2007 for ...

Assembly Language and Shellcoding on Linux « SecurityTube Trainings

Shared by Security Tube

securitytube-training.com - The SecurityTube Linux Assembly Expert (SLAE) aims to teach the basics of assembly language on the Linux platform from a security perspective and its application to writing shellcode, encoders, dec...

Car to car: Internet-connected cars. Will they be the main cause of accidents in the future? - MediaCenter Panda Security

pandasecurity.com - Smartphones, watches and a thousand home appliances. More day-to-day objects are connected every day. But the Internet of Things also runs on four wheels. Tomorrow’s cars will not be flying cars, a...

¡Atención! ¡Oleada de Ransomware simulando ser Correos! - Media Center Spain

pandasecurity.com - “Su paquete ha llegado a 20 de marzo. Courier no pudo entregar una carta…” ¿Has recibido un correo electrónico así? ¡No hagas caso! Nuestros compañeros de Soporte han detectado, en las últimas hora...

Come si propagano nella rete i dati sottratti in un attacco informatico? | Tech Economy

techeconomy.it - Uno dei principali problema relativi all’investigazione di violazioni di sistemi informatici è la scoperta tempestiva dell’incidente. Purtroppo molto spesso prima che le organizzazioni vittime di u...

How to enable YouTube's new transparent player - CNET

Shared by CNET

cnet.com - YouTube is testing a new design that turns the bar of controls along the bottom edge of its video player transparent. The change is rolling out slowly, but if you are eager to get it now, you can d...

Are You the Author of Your Own Life? - Best Seller Authors

bestsellerauthors.com - We’re all the authors here.  And I think that one of the first things that we can do is if we understand the power of self-amplifying feedback loops, the way our spaces influence our thinking and o...

BSNL Password Decryptor : Free BSNL Modem/ADSL Router Login Password Decoder Tool

securityxploded.com - It supports dual mode of password recovery. You can either enter the encrypted BSNL password directly or specify the BSNL Modem's backup configuration file. In second case, it will automatically de...

Ugly Mail: How to know if your emails are being tracked - MediaCenter Panda Security

pandasecurity.com - Is like this that some companies sneak into your office’s privacy to find out if you are ignoring them, and taking, as they are already in, any information about your employees habits. Now, thanks ...

Yelp Product & Engineering Blog | OSXCollector: Forensic Collection and Automated Analysis for OS X

Shared by Sam Bowne

engineeringblog.yelp.com - We use Macs a lot at Yelp, which means that we see our fair share of Mac-specific security alerts. Host based detectors will tell us about known malware infestations or weird new startup items. Net...

Javascript for Pentesters « SecurityTube Trainings

Shared by Security Tube

securitytube-training.com - Javascript for Pentesters will take you beyond alert(‘XSS’) and equip you to demonstrate advanced attacks such as Hijacking Forms, Logging Keystrokes, DOM manipulation etc. This course is Beginner ...

BeEF - The Browser Exploitation Framework Blog: The email that's watching you

blog.beefproject.com - Today's post contributed by Anthony Piron and Bart Leppens Cross-site Scripting (XSS) is probably the most common security vulnerability in web applications. Nevertheless, the impact of XSS is stil...

MSN Live Password Recovery Tool MSN/Hotmail/Windows Live Messenger Password Recovery Software

securityxploded.com - Both MSN/Windows Live Messenger uses Windows built-in 'Credential Store' to securely store the login account passwords. Not only Windows uses it to store network authentication passwords, but also ...

Six Clicks for Linux beginners: Ubuntu 15.04, Vivid Vervet | ZDNet

zdnet.com - Steven J. Vaughan-Nichols, aka sjvn, has been writing about technology and the business of technology since CP/M-80 was the cutting edge, PC operating system; 300bps was a fast Internet connection;...

BLAM! Valve slams brakes on Steam flimflam with $5 spam scram plan

Shared by Kimberly

theregister.co.uk - Vid-gaming kingpin Valve has promised to do a better job of protecting its subscribers from dollops of spam, by applying a $5 limit on user accounts before unlocking a number of key features. The c...

APT28 Russian hackers exploited two zero-day flaws in the wild

securityaffairs.co - Security experts at FireEye have recently detected a new cyber espionage campaign, dubbed “Operation RussianDoll,” operated by the Russian APT28 group. This time the hackers run highly targeted att...

Yelp/osxcollector

Shared by Sam Bowne

github.com - OSXCollector is a forensic evidence collection & analysis toolkit for OSX. The collection script runs on a potentially infected machine and outputs a JSON file that describes the target machine. OS...

In-store Employee Wi-Fi Leads to Surprising Gains in Customer Loyalty | Loyalty360.org

loyalty360.org - As the virtual online sphere becomes inseparably entwined with daily reality, more brands are embracing web-based solutions to increase customer engagement. These schemes have included tidal waves ...

Are crowdfunding sites becoming too political? - CNET

Shared by CNET

cnet.com - Moments after Oklahoma reserve deputy Robert Bates was charged with manslaughter in the fatal shooting of a suspect, a $25,000 fund-raising campaign to pay for his legal bills kicked off on Indiego...

Learn Pentesting Online

Shared by Security Tube

pentesteracademy.com - This course will teach you Python scripting and its application to problems in computer and network security. This course is ideal for penetration testers, security enthusiasts and network administ...

How Microsoft's fast track Azure will help businesses conquer IoT

Shared by Matt Suiche

techradar.com - Things are getting smarter in business – quite literally. Everything from light bulbs to lifts to your product inventory can be a smart object that you can track, model and make predictions about, ...

Google Embraces 'Mobile-Friendly' Sites in Search Shake-Up

time.com - (SAN FRANCISCO) — Google is about to change the way its influential search engine recommends websites on smartphones and tablets in a shift that’s expected to sway where millions of people shop, ea...

Critical Microsoft HTTP.sys Remote Code Execution

Shared by Kimberly

sectechno.com - Microsoft have released over this week several security patches that comes to fix critical security vulnerabilities. One of these vulnerabilities is an HTTP.sys security issue that do not properly ...

1337Day Agreement - 1337day Inj3ct0r Exploit Database : vulnerability : 0day : new exploits : buy and sell private exploit : shellcode by Inj3ct0r Team

Shared by codelancer

1337day.com - We do not approve or encourage anyone to nullify any vendor licenses, deface websites, hack into databases and/or trade with fraudulent or stolen material. We do not publish advisories/vulnerabilit...

WiFi hackable planes not a massive threat

scmagazineuk.com - The Government Accountability Office (GAO) published a report on April 14, on behalf of FAA's look into next-generation air transportation systems, and it indicated that on-board Wi-Fi could feasib...

TheRealDeal black Marketplace Offers Zero-Day Exploits

securityaffairs.co - The anonymity ensured by the Dark Web and black markets it hosts is an element of attractive for cyber criminal and intelligence agencies. Black markets offer a wide range of illegal products and s...

This site uses cookies for an optimal experience. By continuing to browse the site you are agreeing to our use of cookies. Find out more →