Tag: IFTTT
-
Radia Perlman – Resilience Despite Malicious Participants via /r/netsec
Radia Perlman – Resilience Despite Malicious Participants http://ift.tt/2aCY4vF Submitted August 11, 2016 at 09:45AM by ysangkok via reddit http://ift.tt/2aNlwaS
-
CRIME, TIME, BREACH and HEIST: A brief history of compression oracle attacks on HTTPS via /r/netsec
CRIME, TIME, BREACH and HEIST: A brief history of compression oracle attacks on HTTPS http://ift.tt/2aO8o12 Submitted August 11, 2016 at 10:15AM by tekz via reddit http://ift.tt/2aYqooq
-
Hacker Interviews – Claudio Caracciolo
Hacker Interviews – Claudio Caracciolo http://ift.tt/2aM6ca9 Today I have interviewed Claudio Caracciolo one of the most renowned Security Professional that works like Chief Security Ambassador for ElevenPaths Claudio Caracciolo wrote a book and is known for his effective interpersonal skills and his ability as an international speaker. Enjoy the Interview. You are one of the…
-
Off-Path TCP Exploits: Global Rate Limit Considered Dangerous via /r/netsec
Off-Path TCP Exploits: Global Rate Limit Considered Dangerous http://ift.tt/2aL2Fgs Submitted August 10, 2016 at 01:37PM by epiblas279 via reddit http://ift.tt/2bfEN4v
-
Revealing Ransomware Secrets With All-Source Analysis
Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware. Observing these, as with any type of cyber attack, can provide early warning signs of…
-
Over 300 new cyber threats pop up on underground markets each week
Over 300 new cyber threats pop up on underground markets each week http://ift.tt/2aRVUHi Approximately 305 new cyber threats are added each week on cybercrime markets and forums, mostly located on dark nets and the deep web. The threats include information on newly developed malware and exploits that have not yet been deployed in a cyber-attack…
-
Facebook User ID Bypass Issue
Facebook User ID Bypass Issue http://ift.tt/2aSRIV6 A vulnerability allowed remote attackers to determine which specific Facebook user ID is linked with a mobile phone number without secure approval. The vulnerability is located in the ctx and recover lwv parameters and /login/identify modules. Vulnerabilities via Exploit Files ≈ Packet Storm http://ift.tt/1Fpvz7L August 9, 2016 at 12:57PM
-
#Obfuscated #Malware Discovered on #Google #Play – McAfee
#Obfuscated #Malware Discovered on #Google #Play – McAfee http://ift.tt/2aAD9cv The McAfee Labs Mobile Malware Research team found early this week on Google Play a set of malware published by the developer account ValerySoftware: Each one of these apps have been downloaded and installed up to 500 times, which means up to 3,000 devices could be…
-
Census ‘attack’: ‘I smell bullsh*t’
Census ‘attack’: ‘I smell bullsh*t’ http://ift.tt/2aKSTZ0 PUBLIC scepticism is rising as authorities stumble over terminology in a bid to explain the census fail. Can this digital attack map tell us more? Threat Intel via CERT-EU : EMM AlertFilter System: CERT-LatestNews http://ift.tt/1gYYfLb August 10, 2016 at 01:43AM
-
August Patch Tuesday: Nine Bulletins, Five Rated Critical
August Patch Tuesday: Nine Bulletins, Five Rated Critical http://ift.tt/2aLjK67 The second Tuesday of August has arrived, which means one thing for Microsoft users: Patch Tuesday. Relatively speaking, August’s batch of patches is relatively light, with only nine bulletins, although five are rated as Critical. The Critical vulnerabilities cover flaws in Internet Explorer (MS16-095), Microsoft Edge…