Sign in or Join FriendFeed
FriendFeed is the easiest way to share online. Learn more »
SSCC 157 – Routers, Browsers, Zombies and Sysadmins [PODCAST] - http://nakedsecurity.sophos.com/2014...
Here it is...this week's Chet Chat security podcast. In this episode: fixing routers, trusting browsers, killing zombies and showing TLC to sysadmins. - Hacker News
Cybercrime Ring Steals Millions in StubHub Tickets, Arrests Followed - http://www.tripwire.com/state-o...
The post Cybercrime Ring Steals Millions in StubHub Tickets, Arrests Followed appeared first on The State of Security. - Hacker News
How MSSP’s Utilize Open Source Intelligence - https://www.alertlogic.com/blog...
Below is a review of a recent webinar of a presentation examining four ways Alert Logic leverages open source intelligence (OSINT) to improve the security of their clients. 1. … The post How MSSP’s Utilize Open Source Intelligence appeared first on Alert Logic. - Hacker News
The 3 Pillars of Developer-ization - http://windowsitpro.com/email-d...
As SendGrid CEO Jim Franklin puts it: Developers are the “internal engine of innovation.” They are the driving force behind change and modernization in their business, and the population is projected to see 7.2 million more of them in the next 5 years. Companies can get on board with "developer-ization" and provide an environment that will help developers fuel their creative side and encourage higher quality products and increased efficiency. read more - Hacker News
What Tools Can You Use to Proactively Protect Your Trademarks as New gTLDs Launch? - https://blog.cyveillance.com/domains...
We get a lot of questions about how the Trademark Clearinghouse can help brand managers and legal counsel protect their rights. This article highlights the pros and cons of the Trademark Clearinghouse, and what you can do to enhance protection. In anticipation of trademark and intellectual property issues that are certain to accompany the introduction […] - Hacker News
Hacker claims to have found undocumented iOS “backdoor”; Apple denies NSA collusion - http://www.intego.com/mac-sec...
Hacker claims to have found undocumented iOS “backdoor”; Apple denies NSA collusion
A data forensics expert and jailbreaker has discovered what he claims to be a undocumented “backdoor” in the iOS operating system used on iPhones and iPads that could be exploited by the NSA and other law enforcement agencies. Read more in my article on the Intego Mac Security blog. - Hacker News
Cloud File Storage and Collaboration: Overview and Baseline Security - https://securosis.com/blog...
*This is part 2 in our series on the Security Pro’s Guide to Cloud File Storage and Collaboration (file sync and share). The full paper is available on GitHub as we write it. Part 1 is located here. Understanding Cloud File Storage and Collaboration Services Cloud File Storage and Collaboration (Sync and Share) is one of the first things people think of when they hear the word “cloud” and one of the most popular product categories out there. It also tends to be one of the first areas IT departments struggle to manage since many users and business units want the functionality, use it personally, and there is no shortage of free and inexpensive options. As you might expect since we can’t even standardize on a single category name, there is also a wide range of different features and functions across the different services. To start, we detail out the core features with security implications, then the core security features themselves, and finally more-advanced security features we see... - Hacker News
Review: PowerBot Wireless Charging Pad and Backup Battery Pack - http://windowsitpro.com/hardwar...
The PowerBot PB1082 combines wireless and wired device charging to make it the ultimate, power-conscious traveler's gadget. read more - Hacker News
Cities Grapple with Regulatory Status of Ride-Sharing Companies - http://www.govtech.com/transpo...
Having a wide array of transportation options is typically a positive attribute for most cities. But while ride-sharing companies provide residents an easy way to get around town using their smartphones, regulating the activity has been a challenge. Transportation network companies (TNCs) such as Uber and Lyft argue that they’re technology companies. Their rationale is that they don’t employ drivers or own any cars, and therefore they’re not taxi services and shouldn’t be subject to the taxicab regulatory model. On the other hand, the taxicab and limousine industry is adamant that the TNCs are delivering commercial transportation services, and should be following the same rules they must adhere to. The difference of opinion has sparked controversy in a number of cities across the U.S. Some municipalities have made it clear they consider the ride-sharing and taxi service to be the same commercial practice, while other areas have been open to modifying existing ordinances to relax the... - Hacker News
2014 World Cup: Web Security – "Let’s watch the game first and attack later" - https://blogs.akamai.com/2014...
Akamai has once again been chosen to help protect the leading global broadcasters, advertisers, partners and sponsors' sites for this year's World Cup. This has given us the opportunity to capture an incredible amount of data for analyzing specific trends.... - Hacker News
Configure Remote Desktop Web Access to Use a Remote Desktop Gateway Server - http://windowsitpro.com/windows...
Use Remote Desktop Gateway with the "Connect to a PC" option in Remote Desktop Web Access. read more - Hacker News
Four Steps to Successfully Implementing Security into a Continuous Development Shop - http://blog.veracode.com/2014...
So you live in a continuous deployment shop and you have been told to inject security into the process. Are you afraid? Don’t be. When the world moved from waterfall to agile, did everything go smoothly? Of course not – you experienced setbacks and hiccups, just like everyone else. But, eventually you worked through the […] - Hacker News
via the entity known as Randall Munroe, at XKCD. - Hacker News
Security Vulnerability in the Tails OS - https://www.schneier.com/blog...
I'd like more information on this. - Hacker News
Personal Bank accounts In Jeopardy, Multi-pronged Cyber-attack on Switzerland Underway - http://www.tripwire.com/state-o...
The post Personal Bank accounts In Jeopardy, Multi-pronged Cyber-attack on Switzerland Underway appeared first on The State of Security. - Hacker News
Everything can be a bomb - http://blog.erratasec.com/2014...
This last week, pranksters replaced the US flag on top the Brooklyn Bridge with a white-flag. Nobody knows who or why. Many in the press have linked this to terrorism, pointing out that it could've been a bomb. Not only local New York newspapers have s... - Hacker News
Four Steps to Successfully Implementing Security into a Continuous Development Shop - http://blog.veracode.com/2014...
Google given 18 months to change its handling of user data - http://nakedsecurity.sophos.com/2014...
The Italian Data Protection Commissioner has given Google 18 months to change the way it treats and stores user data. - Hacker News
Security Operations Maturity: The Sweet Spot - http://h30499.www3.hp.com/t5...
On a maturity scale of 0 to 5, you should aim for a 3? That is exactly right.Read on to find the sweet spot of security operations maturity in this new infographic. - Hacker News
The Highly Requested, Highly Sought After Big Red (CYOA) Button Comes to System Center Configuration Manager - http://windowsitpro.com/configu...
The much requested "big red button" for Configuration Manager has gone from dream to reality in Adaptiva's OneSite 4.0 release. read more - Hacker News
Everything can be a bomb - http://blog.erratasec.com/2014...
Everything can be a bomb
This last week, pranksters replaced the US flag on top the Brooklyn Bridge with a white-flag. Nobody knows who or why. Many in the press have linked this to terrorism, pointing out that it could've been a bomb. Not only local New York newspapers have said this, but also CNN. Such irrational fears demonstrate how deeply we've fallen for police-state fears, where every action is perceived as a potential terrorist threat. It could've been a bomb, of course. But what could also have been a bomb is a van full of C4 explosives driven across the bridge. There are no checkpoints at either end inspecting vehicles with bomb sniffing dogs. What also could've been a bomb is a ship full of fertilizer that, when ignited, would act as a small nuke. The point is that everything can be a bomb. Instead of using this as justification for an ever increasing police-state, we just need to accept this and live with the danger -- because this danger is, in the end, tiny. A thousand 9/11 events would still... - Hacker News
Should small and medium-sized businesses be worried about PoS attacks? - https://blog.avast.com/2014...
One of the most dangerous places in America is your local retailer. Before you leave the building with your purchases, you run the risk of having your identity stolen. No doubt you recall the 2013 security breaches at Target, Michael’s, and Neiman Marcus where millions of records were compromised by Point-of-Sale (PoS) attacks. PoS occurs […] - Hacker News
RSA Conference APJ Day 2 Recap - http://www.rsaconference.com/blogs...
Professor Andy McAfee, the renowned MIT fellow, kicked off this morning’s keynotes to a full room of intrigued listeners. He really is an engaging speaker with a compelling style and perspective……he even got the audience playing “Jeopardy”. Speakers from Splunk, Qualys and Cisco followed, before the Exhibition opened and track sessions kicked-off. Like yesterday, the Exhibition was jam-packed, with attendees queuing up to talk to our 70+ sponsors and exhibitors. New this year is a Demo Theatre where our sponsors delivered 20-minute sessions throughout the Conference. We’re always asked what the… - Hacker News
Protecting Yourself Against Your Own Users - https://blogs.rsa.com/protect...
There is a common thread among many of the major attacks that have occurred in the past couple of years—they were perpetrated either directly or indirectly by someone on the inside. While most of network and computer security is still focused on guarding against external threats, the reality is that privileged users on the inside... The post Protecting Yourself Against Your Own Users appeared first on Speaking of Security - The RSA Blog and Podcast. - Hacker News
HP TippingPoint and Damballa: Enhanced perimeter protection against advanced threats - http://h30499.www3.hp.com/t5...
Each time you add new software or devices to your network, you create a new opportunity for hackers to sneak into your system. To keep your organization safe, you need a collaborative security strategy. Read how HP TippingPoint and Damballa can he... - Hacker News
MailPoet Vulnerability Exploited in the Wild – Breaking Thousands of WordPress Sites - http://blog.sucuri.net/2014...
A few weeks ago we found and disclosed a serious vulnerability on the MailPoet WordPress Plugin. We urged everyone to upgrade their sites immediately due to the severity of the issue. The vulnerability allowed an attacker to inject anything they wanted on the site, which could be used for malware injections, defacement, spam and many Read More - Hacker News
Tesla Model S hacked to open doors while in motion - http://www.welivesecurity.com/2014...
Tesla’s Model S has been hacked to make the doors and sun roof open while the car is in motion - and the researchers behind the attack were able to control the systems remotely. The post Tesla Model S hacked to open doors while in motion appeared first on We Live Security. - Hacker News
Traditional DLP does not deter ‘Smart Contractors’ - http://www.clearswift.com/blog...
Microsoft Adds SharePoint Servers Farms to the Azure Preview Portal - http://windowsitpro.com/sharepo...
Azure's new multi-vm deployment capability allows customers to generate entire SharePoint Server Farms. read more - Hacker News
Rights Management Services Certificate Types - http://windowsitpro.com/securit...
Learn about Client Licensor Certificates vs. End User Licenses, as well as other Rights Management Services certificate types. read more - Hacker News
Other ways to read this feed:Feed readerFacebook