NetSec
  corner   



HOME

LINUX

CYBERLAW

VIRTUALIZATION

Bugtraq

Packetstorm

FD

GrokLaw


RSS Feed


Netsec, comsec, infosec and IA news, research and trends

 

9.20.2014

 
Apple Can't Decrypt Data for Law Enforcement; Is It Enough? from Nicole



9.19.2014

 
Dark web getting darker

 
Fraud Analytics: Heat Map of Potential Retail Data Breaches by State from Tarik

 
 5 Million Gmail Addresses and Passwords Exposed, ‘No Evidence of Compromise,’ Says Google 
from Tarik



9.18.2014

 
Home Depot Hack Could Be Largest Ever: 56 Million Credit Cards at Risk



9.16.2014

 
Just how much information can be squeezed from one week of your metadata?



9.14.2014

 
Chinese Attack Groups Operate in Parallel in Cyber Espionage Campaigns: FireEye from Tarik



9.11.2014

 
New Proposal Could Singlehandedly Cripple Free Speech Online from Nicole



9.10.2014

 
Five million Gmail addresses and passwords dumped online



9.08.2014

 
Home Depot confirms suspected customer data breach  Anyone who shopped at a Home Depot store with a payment card since April may be exposed to the hack, the home improvement retailer says.



9.04.2014

 
Nothing new here but of interest to many: "The growing security threat to virtual systems"

 
Law Enforcement Agencies Scramble For Pricey Cell Tower Spoofer Upgrades As Older Networks Are Shut Down from TC.



9.02.2014

 
Using WPS on your Wi-Fi router may be even more dangerous than you think



8.28.2014

 
Group finds way to decrypt files after Cryptolocker Ransomeware



8.26.2014

 
Duping the machine - the cunning malware that throws off researchers:  "The trouble with analysing malware in a sandbox environment is when the malware is cunning enough to realise, and then employs a variety of techniques to throw off researchers."



8.19.2014

 
US Nuclear Regulatory Commission hacked 3 times in 3 years - "The first attack used a regular phishing email to trick staff into handing over their login credentials. The message asked them to verify their user accounts by clicking on a link which took them to a cloud-based Google spreadsheet they had to log in to view. The ruse targeted around 215 staff, of which 12 fell for the bait..."

 
VMware experts want to use virtualization to embed security controls into the fabric of the data center

 
Cryptography Expert Says, 'PGP Encryption is Fundamentally Broken, Time for PGP to Die'



8.18.2014

 
Stuxnet Vulnerability Still Present on Millions of Machines: Is it a surprise to anyone that the "lion's share" of these machines are running Windows XP?

 
Hackers Breach Hospital Network, Steal 4.5 Million Patient Records



8.14.2014

 
The NSA is developing an automatic malware-killer from Antoine



8.13.2014

 
Fifteen zero days found in hacker router comp romp:  Four routers rooted in SOHOpelessly Broken challenge



8.10.2014

 
All About Bitcoin Mining: Road To Riches Or Fool's Gold?



8.08.2014

 
Hacker Redirects Traffic From 19 Internet Providers to Steal Bitcoins



8.05.2014

 
Billions of accounts compromised



8.01.2014

 
Massive, undetectable security flaw found in USB: It's time to get your PS/2 keyboard out of the cupboard from Joe. Any architecture that allows a device to say "Hello, please load this kernel module so that you can talk to me" is going to have such issues.

 
U.S. government warns retailers about malicious software from Lisa - Attacking POS systems has been a trend for a while now.



7.28.2014

 
Computer Virus Catalog

 
Enraged Verizon FiOS Customer Posts Video Seemingly Proving ISP Throttles Netflix from Joe - Net Neutrality should be a thing. Users pay for bandwidth and receive said bandwidth. Imagine a taxicab charging a person's source and/or destination for a customers' arrival as well as charging the customer for the ride. Would anyone think that to be a rational system?



7.19.2014

 
Some are only just now realizing Tor's true intended purpose.



7.16.2014

 
Slashdot: "Selectively Reusing Bad Passwords Is Not a Bad Idea, Researchers Say"

"...Microsoft researchers have determined that reuse of the same password for low security services is safer than generating a unique password for each service..."

Microsoft research paper

Article from the Register referenced in Slashdot post above

Labels: , ,




7.15.2014

 
"Gameover" malware revival - is it really up from the canvas?



7.14.2014

 
World Cup security well executed... if you don't count the Wi-Fi



7.04.2014

 
RSA: Brazil's 'Boleto Malware' stole nearly $4 billion in two years from Lenzy



7.03.2014

 
Here is something that shows real promise. - The Ultra-Simple App That Lets Anyone Encrypt Anything

 
Some People Want A Time Limit On The NSA's 'Zero-Day' Exploits — Here's Why That's A Terrible Idea from Dave Aitel



7.01.2014

 
Mysterious cyberattack compromises more than a thousand power plant systems - Article from Symantec on the issue - from Zach



6.29.2014

 
WordPress Timthumb Exploit Resurfaces



6.24.2014

 
Wearable technology creates new privacy issues for employers

 
With New Hack, Cellphone Can Get Data Out of Computers from Lenzy

 
Confiscated data must be returned or deleted if it's not covered by a warrant from Tarik



6.20.2014

 
Beijing Implicated As Hong Kong Vote Sites Crash Under Massive DDoS

 
That awkward moment when you CC everyone instead of BCCing them: Email gaffe unmasks 'anonymous' bidders in Bitcoin auction





This page is powered by Blogger.


Site Meter Locations of visitors to this page