Mobile Phone Call Scams, Pegasus Mobile Spyware, Newegg Data Breach – WB35

This is the Shared Security Weekly Blaze for September 24, 2018 sponsored by Security Perspectives – Your Source for Tailored Security Awareness Training and Assessment Solutions and Silent Pocket. This episode was ...
The Internet of Things (IoT) and digitally stored PII: Avoidable or Inevitable? 

The Internet of Things (IoT) and Digitally Stored PII: Avoidable or Inevitable? 

The Internet of Things (IoT) is rapidly showing up in all facets of daily life and collecting personally identifiable information (PII) in massive quantities. From smart home thermostats to one-click purchasing, IoT devices ...

Coming soon!

| | Hacking
The post Coming soon! appeared first on InfoSec Resources. Coming soon! was first posted on September 18, 2018 at 4:11 pm. ©2017 "InfoSec Resources". Use of this feed is for personal... Go ...
Android Hacking and Security, Part 2: Content Provider Leakage

Android Hacking and Security, Part 2: Content Provider Leakage

| | feature, Hacking
In the previous article, we discussed how an attacker exploits vulnerable Activity Components and ways to secure them. In this article, we will discuss “Content Provider Leakage.” What... Go on to the ...

What is a Honey Pot?

| | feature, forensics, Hacking
1. Introduction Honeypots are special programs that are written for a sole purpose: to be exploited. Honeypots can emulate the existence of the vulnerability, so the attackers, viruses and worms are... Go ...

Security Risks of Government Hacking

Some of us -- myself included -- have proposed lawful government hacking as an alternative to backdoors. A new report from the Center of Internet and Society looks at the security risks ...

Nmap Evade Firewall & Scripting [Updated 2018]

| | feature, firewalls, Hacking, Nmap
Nmap is the most powerful scanner that is used to perform so many functions including port scanning, service detection, and even vulnerability detection. Nmap from beginner to advanced has covered... Go on ...
Network security appliances vs. Word and PowerShell

Network security appliances vs. Word and PowerShell

Over the last few months we have seen a surge in attacks using apparently innocent documents that install malware covertly on victims' systems. Unless you are running specialist monitoring tools, or very ...
British Airways Hack Update: Caused by Injected Script & PCI DSS Non-Compliance is Suspected

British Airways Hack Update: Caused by Injected Script & PCI DSS Non-Compliance is Suspected

On Friday (7th September 2018), British Airways disclosed between 21st August 2018 and 5th September 2018, 380,000 BA customer's payment card transactions were compromised by a third party through its website and ...

The Shared Security Weekly Blaze – Five Eyes Security Alliance, Google and Your Offline Purchases, Privacy by Default in Firefox

This is the Shared Security Weekly Blaze for September 10, 2018 sponsored by Security Perspectives – Your Source for Tailored Security Awareness Training and Assessment Solutions and Silent Pocket. This episode was ...
Loading...