NetSec
  corner   



HOME

LINUX

CYBERLAW

VIRTUALIZATION

Bugtraq

Packetstorm

FD

GrokLaw


RSS Feed


Netsec, comsec, infosec and IA news, research and trends

 

4.10.2015

 
Linux Australia gets pwned, rooted, RATted and botted



4.01.2015

 
PCI DSS Penetration Test Guidance from Tarik

 
Federal agents charged over alleged Silk Road Bitcoin theft from Joe



3.24.2015

 
Get ripped or die mining: How FitCoin can make you a BitCoin fortune at the gym



3.20.2015

 
Kali Linux NetHunter from Joe



3.13.2015

 
Details Surface on Stuxnet Patch Bypass from Joe



2.16.2015

 
Kaspersky ties Equation Group to NSA



2.06.2015

 
Anthem's stolen customer data not encrypted from Joe



2.03.2015

 
Hackers are using a one-two malware punch to penetrate corporate networks and install backdoors on corporate systems.



1.29.2015

 
NSA offers advice to enterprises confronting malware-wielding attackers


Full report here

 
The size of DDoS attacks has increased 50 times in the past decade

 
750 major data breaches in the US last year

 

Ghost, affects most Linux systems




1.28.2015

 
Bughunter cracks "absolute privacy" Blackphone - by sending it a text message



1.23.2015

 
Oracle patches a record 169 security holes across its product line from Marcus



1.22.2015

 
Cisco's Annual Security Report 2015 from Marcus



1.21.2015

 
A spy in the machine



1.10.2015

 
Lizard Stresser Runs on Hacked Home Routers from Joe



1.03.2015

 
Handy builder for country specific ACLs.

 
Japanese newspaper makes bold claim about Mt Gox's giant 2014 Bitcoin loss from Joe



12.23.2014

 
Cyberattack on German steel factory causes 'massive damage' from Joe



12.19.2014

 
Critical 'Misfortune Cookie' bug puts millions of internet-connected routers at risk from Joe



12.16.2014

 
US Congress OKs 'unprecedented' codification of warrantless surveillance - from Joe

All your SSL are belong to U.S.?

"Communications can be retained indefinitely if they have to do with foreign intelligence or counterintelligence, contain evidence of a crime, or are "enciphered" or "reasonably believed to have a secret meaning," among other conditions."



11.27.2014

 
Zen and the Art of Cloud Database Security (Part 1) from Tarik - DBs should reside on private clouds.

 
Hackers Exfiltrating Data with Video Steganography via Cloud Video Services from Tariq



11.14.2014

 
Anyone running a Windows Server should patch stat.



11.13.2014

 
Virginia Police Have Been Secretively Stockpiling Private Phone Records - Gen. Hayden states during an April debate that “We kill people... based on metadata.”



10.28.2014

 
Poodle Attacks on SSL 3.0 from Dennis



10.21.2014

 
Facebook prowls the internet looking for your password



10.11.2014

 
IMAP C&C channels have some massive advantages for attackers and penetration testers



10.09.2014

 
Twitter Sues DOJ Over National Security Letter Disclosures - from Nicole



10.06.2014

 
83,000,000 customer's data compromised at JP Morgan Chase. from Nam - Reports are that card numbers, social security numbers etc were not disclosed, just names, addresses, phone numbers and email addresses.



9.25.2014

 
Serious BASH vulnerability.  Update, update update.
Read Red Hat's Security blogUbuntu's advisory, and US-Cert's advisory.

 
Bash specially-crafted environment variables code injection attack



9.20.2014

 
Apple Can't Decrypt Data for Law Enforcement; Is It Enough? from Nicole



9.19.2014

 
Dark web getting darker

 
Fraud Analytics: Heat Map of Potential Retail Data Breaches by State from Tarik

 
 5 Million Gmail Addresses and Passwords Exposed, ‘No Evidence of Compromise,’ Says Google 
from Tarik



9.18.2014

 
Home Depot Hack Could Be Largest Ever: 56 Million Credit Cards at Risk



9.16.2014

 
Just how much information can be squeezed from one week of your metadata?





This page is powered by Blogger.


Site Meter Locations of visitors to this page