Tag: IFTTT
-
Exposing Dominoes order volumes through incrementing order IDs via /r/netsec
Exposing Dominoes order volumes through incrementing order IDs http://ift.tt/2aeBy7f Submitted July 27, 2016 at 11:05PM by freakingthefuckout12 via reddit http://ift.tt/2afxff5
-
Appsec Gamification via /r/netsec
Appsec Gamification http://codeba.sh Submitted July 28, 2016 at 12:23AM by babablacksheep45 via reddit http://ift.tt/2aLLHdj
-
How HTTP(s) Proxies Work via /r/netsec
How HTTP(s) Proxies Work http://ift.tt/2abwSkn Submitted July 28, 2016 at 07:39AM by Parsia via reddit http://ift.tt/2a1n8fq
-
Defeating Antivirus Real-time Protection From The Inside via /r/netsec
Defeating Antivirus Real-time Protection From The Inside http://ift.tt/2a1zjsE Submitted July 28, 2016 at 10:06AM by kgretzky via reddit http://ift.tt/2a1zwvW
-
TLS tunnels even w/out a public IP in new open source SDK via /r/netsec
TLS tunnels even w/out a public IP in new open source SDK http://ift.tt/2adAmB8 Submitted July 28, 2016 at 10:55AM by beame_io via reddit http://ift.tt/2ay40H6
-
LastPass: design flaw in communication between privileged and unprivileged components via /r/netsec
LastPass: design flaw in communication between privileged and unprivileged components http://ift.tt/2axSQle Submitted July 28, 2016 at 12:42PM by kukfa via reddit http://ift.tt/2ajLehz
-
Sniffing HTTPS URLS with malicious PAC files via /r/netsec
Sniffing HTTPS URLS with malicious PAC files http://ift.tt/2a0xdZW Submitted July 28, 2016 at 01:13PM by campuscodi via reddit http://ift.tt/2aMx2Pn
-
Dark Web OSINT With Python and OnionScan: Part One via /r/netsec
Dark Web OSINT With Python and OnionScan: Part One http://ift.tt/2atencf Submitted July 28, 2016 at 03:13PM by jms_dot_py via reddit http://ift.tt/2ag6fZC
-
Get Fired up About Threat Intelligence With Recorded Future at Black Hat 2016
Nothing is hotter than the Nevada desert in August. Except for our booth at Black Hat 2016, that is! Sure, “threat intelligence” is big industry buzzword, but do you really understand how you can use it in your organization to identify indicators of compromise or imminent threats? Are you able to demonstrate the effectiveness of…
-
Curated list of vehicle security resources, software, hardware, books, jobs, people, and more. via /r/netsec
Curated list of vehicle security resources, software, hardware, books, jobs, people, and more. http://ift.tt/2af0DoH Submitted July 28, 2016 at 06:04PM by ScubaSteve225 via reddit http://ift.tt/2atIpN0