Last updated:
Wed Jul 23 01:25:14 2014 GMT
  2014 FIRST Annual Conference in Boston - Register now


Blogroll
eEye Digital Security - Research Blog
TrendLabs | Malware Blog - by Trend Micro
Security Blog
Tenable Network Security
MVP Jubo Security Blog
Latest Analysis for All Threats
Security Watch
Matasano Chargen
Cynical Security
Vitalsecurity.org - A Revolution is the Solution
Mal-Aware.org
Page Not Found - ASP.NET Weblogs
Federated Infrastructure : Security
Compendium
DoxPara Research
Educated Guesswork
Harry Waldron - Microsoft MVP Blog
darren_moffat@blog$ cat /dev/mem | grep /dev/urandom
The Importance of...
Service Provider Journal
REblog
Wendy's Blog: Legal Tags
cybercrime/-security sightings
Fermats Security Alerts
Logblog
Martin Englund's Weblog
Open-Node.net Security Weblog
Mark O'Neill's Radio Weblog
InfoWorld Gripe Line | Ed Foster
You Know What's Stupid? Everything I Don't Understand
MoMusings@Arachnid.homeip.net
Volatile Systems
SophosLabs blog
Small Business Server
Andrew Carpenter
Infosec Potpourri
.NET Security Blog
www.rootkit.com
chandanlog(3C)
darren_moffat@blog$ cat /dev/mem | grep /dev/urandom
The Day Before Zero
Deb Shinder's MVP Blog
NetSec
netstat -a
Spam Filtering Techniques
A Bro Blog
Kaspersky Lab Weblog
Sam Gentile
Freedom to Tinker
Paul's Down-Home Page: Exchange, messaging, collaboration, security, and more
F-Secure Antivirus Research Weblog
The Security Blanket
Lauren Weinstein's Blog
Security Sauce
Security Soapbox
disLEXia 3000 blog
turnipsecurity
Information Security News Desk
antlab
securosis.com
weblog.cemper.com - Technology, Software Development, Project Management, Marketing News
OSSEC Blog
Nth world commentaries
invulnerableit.com Blog
Technology Review Feed - TR Editors' Blog
Security Notes
Anti-Malware Engineering Team
KyleM.xwell
Lasipalatsi
Network Security Blog
Page Not Found - ASP.NET Weblogs
worm blog
Internet Insecurity
Usable Security
Norwegian Honeynet Project
Kimberly L. Tripp: Improving *my* SQL skills through your questions! - Security
GnuPG.org
Dan Anderson's Weblog
Infosec Events
Security and Technology for SMB's and SOHO's
Anton Chuvakin, O'Reilly Network
Latest Blog Entires From WebSense Security Labs
CERIAS Weblogs
Rick Kingslan - Will Hack 4 Food
Page Not Found - ASP.NET Weblogs
McAfee Avert Labs
Vastly Important Notes
Steve Lamb's Blog : How to Articles
GPL
John Palfrey
DISOG
The Security Development Lifecycle
Infosec Writers Latest Security Papers
A Day in the Life of an Information Security Investigator
Larry's Insecurity Blog
The X Dot Com Inc. - 404 Wrong Page
Emergent Chaos
NI3
Sorry! We couldn't find your document
Dana Epp's ramblings at the Sanctuary
Windows Security Logging and Other Esoterica
The Security Mentor
LuFG Summerschool Applied IT Security
torsten's .NET blog - Security
-- Sleeve notes of a sysadmin --
C.I.S.R.T.
Michael Howard's Web Log
Sorry! We couldn't find your document
Windows Incident Response
BufferOverrun : Security
Network Security
Speaking of Security, the RSA Blog and Podcast
Attack Research
Digital ID World Editors Corner
PandaLabs
Computing Research Policy Blog
Sunbelt Blog
CGISecurity.com: Your Web Site and Application Security Resource
Security Fix
Liudvikas Bukys
Realtime Community | IT Compliance
nzight
About Internet / Network Security
Tim Rains' WebLog
ThreatFire Research Blog
ADD / XOR / ROL
RedTeam
When {Puffy} Meets ^RedDevil^
Casper Dik's Weblog
APB Infosec blog
Krebs on Security
Essential Computer Security
The Security Skeptic
Ivan
Information Security News Desk
Fixing Email Weblog
Errata Security
-- Sleeve notes of a sysadmin --
b l o g _ m a x i m u m
IBM Internet Security Systems Frequency X Blog
Page Not Found - ASP.NET Weblogs
malwarecrawler.com
The Evil Empire
Security to the Core | Arbor Networks Security Blog
TheSecure.Net
CERIAS Blog
Mark's Blog
Schneier on Security
Page Not Found - ASP.NET Weblogs
Glenn Brunette's Security Weblog
Larry Seltzer's Security Weblog
Cheap Hack
TaoSecurity
Vodun.org
Security
The Microsoft Security Response Center Blog
Esphion
mcwresearch.com
::PepperTech:: Security Management News Blog
The WiFi Zone
Static in the Ether
bIPlog
Solution Accelerators - Security & Compliance
CyberCrime & Doing Time
Wifi Security Project
Carnal0wnage Blog
Abner Stories
honeyblog
Errata Security
Jim's Bloggyness
New Directions in Security (Comments)
@CyberForge
Phil Windley's Technometria
404 - Not Found
websecurityblog
Robert Hensing's Blog
Napsterization
Dancho Danchev's Blog - Mind Streams of Information Security Knowledge
Windows Shell/User (MSN & OneCare Too)
Security Response Weblog
-- Sleeve notes of a sysadmin --
Security Fix
Alert Logic
ModSecurity Blog
Sorry! We couldn't find your document
Arun Perinkolam's Weblog
Glenn Brunette's Security Weblog
Greyhat of the World Unite...
Anti Rootkit Blog
Will Cox: Security
Adobe Product Security Incident Response Team (PSIRT)
Anil John - Security
Information Manager Journal
ADD / XOR / ROL
taint.org: Justin Mason's Weblog
George Ou
MSDN: Security
Daemon on Security
Page Not Found - ASP.NET Weblogs
Roger's Information Security Blog
Stupid Security
Michael Howard's Web Log : Security
Security Garden
Infothought
Error!
SecuriTeam Blogs
Solution Accelerators - Security & Compliance
Latest Blog Entires From WebSense Security Labs
Internet Security with Kirk
The Security Skeptic
The Dark Visitor
Cybercrime
The Antivirus Guy Blog
In-Security : Exploring Internet, Information and Infrastructure Security
Bowulf Infosec & Network Admin Blog
MZL & Novatech Traffic & Bandwidth Statistics News
Inliniac
Security Blanket
Bkis Blog
OSVDB Blog
Larry Osterman's WebLog : Security
Kasun's Weblog
Page Not Found - ASP.NET Weblogs
The ICSI Networking Group Blog
Sergey Simakov blog
An Information Security Place
Information Research
Verizonbusiness.com
fes' WebLog
Burton Group Page Not Found
blackhat for life
The Security Mentor
Casper Dik's Weblog
: 404 Not Found
CyberSpeak's Podcast
Pinpoint Labs Blog
Thomas Shinder Blog
Roger Thompson
OpenPacket Blog
Vulnerability Analysis Blog
Panda Research Blog
Fabulous Adventures In Coding : Security
trimMail's Email Battles
Bill Sommerfeld's Weblog
Kim Cameron's Identity Weblog
Financial Cryptography
HD DVD / Randomness... : Security
National Cyber Security - Blogs
Andreas Sterbenz's Blog
Spire Security Viewpoint
SYN|ACK
Xavier's Security Post
Wired: Threat Level
Politically Motivated Computer Crime and Hacktivism
BlogInfoSec.com
infosec « WordPress.com Tag Feed
Internet Security News and Analysis
Hex blog
Security Curve Weblog
Aaron Margosis' "Non-Admin" WebLog
Draft Security Blog
Network Security Blog
whattheflex
Volatility
StillSecure, After All These Years
1 Raindrop
1 Raindrop
Crypto-World - news
Eugene Bobukh's WebLog
Fred Avolio's Musings
Security Manifest
BenEdelman.org
Latests Alerts From Websense Security Labs
e-Government@large
Caffeinated Security
July 22, 2014


http://www.symantec.com/connect/blogs/facebook-scam-leads-nuclear-exploit-kit
None


BlueMix Brings Enterprise DevOps to the MidMarket
StillSecure, After All These Years

SaaS pricing model bring PaaS to everyone A couple of weeks ago I went up to Orlando for the IBM Innovation conference. The event was at the Swan/Dolphin resort in Disney World. IBM knows how to throw a conference and...


File system ops, effects on MFT records
Windows Incident Response

I recently conducted some testing of different actions on a Windows 7 system, with the specific purpose of identifying artifacts within the file system (in this case, the MFT and the USN change journal), particularly within individual records. I wan


How Europe can avoid to be living in a reality distortion field of 'security'.
infosec « WordPress.com Tag Feed

It is fairly surprising, what lately surfaces as being published from the distortion field around te


500,000-per-day SMS spammer gets just 4,000 fine
SophosLabs blog

An Indian call-centre operator has been fined by a London court for breaching Data Protection laws, but despite his operation bombarding UK cell phones with spams, his punishment amounts to little more than a slap on the wrist.


Intermediary Liability News from Italy: Courts block Mega and Mail.ru and Force YouTube to Proactively Monitor its Platform for Copyright Infringement
You Know What's Stupid? Everything I Don't Understand


Um, talks are frequently canceled at hacker cons
Errata Security

Talks are frequently canceled at hacker conventions. It's the norm. I had to cancel once because, on the flight into Vegas, a part fell off the plane forcing an emergency landing. Last weekend, I filled in at HopeX with a talk, replacing somebody else who


What does the future hold for cloud computing?
infosec « WordPress.com Tag Feed

Positive reports of increasing levels of cloud adoption in the UK were plentiful in the technology m


Tech Start-up of the Week: MyLegalDiary - Siliconrepublic.com
infosec « WordPress.com Tag Feed

Tech Start-up of the Week: MyLegalDiarySiliconrepublic.comsiliconrepublic.com. Dublin: 19.07.2014 06


Hackers Could Take Control of Your Car. This Device Can Stop Them
Wired: Threat Level

David Schwen Wheel: Getty Hackers Charlie Miller and Chris Valasek have proven more clearly than anyone in the world how vulnerable cars are to digital attack. Now theyre proposing the first step towards a solution. Last year the two Darpa-f


Mozilla Firefox Version 31.0 Released
Security Garden


Securing the Nest Thermostat
Schneier on Security


New Variant of Havex Malware Scans for OPC Servers at SCADA Systems
infosec « WordPress.com Tag Feed

from The Hacker News http://bit.ly/1wHnfwo via IFTTT


New search engine Indexeus unmasks malicious hackers
SophosLabs blog

Indexeus is a database of stolen names and passwords, many doxed from the hackers who've themselves doxed others' data. Is it poetic justice, exploitation of a lucrative market, a prototype of an educational tool, or all of the above?


Your Gmail account is fair game for cops or feds, says US judge
SophosLabs blog

A New York court on Thursday opened up our entire Gmail accounts to feds or cops with warrants, in spite of two recent decisions that went against similar requests.


Dirty Dozen Spampionship which country is spewing the most spam?
SophosLabs blog

The World Cup may be done and dusted, but the Spampionship continues! Where did you come in our spam-sending league tables?


How Central Banking magnifies the Crisis and ensures Depression
Financial Cryptography

he current times are fantastic opportunities for a new generation of economists to cut their teeth, albeit in studying the misery of us all. Here's some of that, cutting of teeth or gnashing, you decide. H/t to Arthur, here is the punchline from "Banks, g


Finding Holes in Banking Security: Operation Emmental
TrendLabs | Malware Blog - by Trend Micro

Like Swiss Emmental cheese, the ways your online banking accounts are protected might be full of holes. Banks have been trying to prevent crooks from accessing your online accounts for ages. Passwords, PINs, coordinate cards, TANs, session tokens


Siemens Working on Patches for OpenSSL Bugs Under Exploit
infosec « WordPress.com Tag Feed

OpenSSL vulnerabilities discovered in a number of Siemens industrial control systems are being explo


Notorious Shylock banking malware taken out by law enforcement
infosec « WordPress.com Tag Feed

Law enforcement action led by the National Crime Agency (NCA) in the UK has knocked out the infrastr


Red Hat Adds Tiering, Data Protection To OpenStack - CRN.in
infosec « WordPress.com Tag Feed

CloudWedge Red Hat Adds Tiering, Data Protection To OpenStackCRN.inRed Hat Adds Tiering, Data Protec

July 21, 2014


SoHo routers to get hacker-style scrutiny in return for "awesome" prizes
SophosLabs blog

Buy a $50 SoHo router, plug it in, press a couple of buttons. Bingo! A connected household! What could possibly go wrong? If history is any guide, quite a lot...Banks: Card Breach at Goodwill Industries
Krebs on Security

Heads up, bargain shoppers: Financial institutions across the country report that they are tracking what appears to be a series of credit card breaches involving Goodwill locations nationwide. Goodwill Industries International Inc. says it is working with


Seagate delivers five new NAS products
infosec « WordPress.com Tag Feed

Seagate announced five NAS products in a range of capacities from 2TB to 30TB and performance suited


Fingerprinting Computers By Making Them Draw Images
Schneier on Security


Whitepaper: History of cryptography
infosec « WordPress.com Tag Feed

This whitepaper presents a brief history of cryptography and how encryption-related technologies hav


More fun with #TSA
Errata Security

SNOWDEN WANTS MORE DATA PROTECTION - Daily Mail
infosec « WordPress.com Tag Feed

SNOWDEN WANTS MORE DATA PROTECTIONDaily MailWhistleblower Edward Snowden has spoken of his concerns


Apple and Google told to stop misleading consumers about 'free' apps
SophosLabs blog

The European Commission (EC) has recently been working with national authorities and app store owners to address concerns over in-app purchases, especially where those transactions are undertaken by children. Google's response was positive, while Apple sa


Data protection challenges facing the social housing sector - Lexology (registration)
infosec « WordPress.com Tag Feed

ITProPortal Data protection challenges facing the social housing sectorLexology (registration)At the


Jailed Apple phishing duo also imported pickpockets and cloned credit cards
SophosLabs blog

How's this for irony? A pair of fraudsters phished bank account details out of over 150 Apple users by sending them hairy-scary messages about their accounts having been compromised. Shopping site reports 3-year-old data breach
SophosLabs blog

Australian shopping website CatchOfTheDay has warned customers of a data breach dating back to 7 May 2011, urging anyone who has kept the same password at the site since that date to change it.FBI Botnets Infecting 18 Computers per Second. But How Many of Them NSA Holds?
infosec « WordPress.com Tag Feed

from The Hacker News http://bit.ly/1oZNKvs via IFTTT


Monday review - the hot 20 stories of the week
SophosLabs blog

Catch up with everything we wrote in the last seven days - it's weekly roundup time.


New York proposes strict regulations for Bitcoin
SophosLabs blog

The rules are strict. Will the community pay heed, or will it ignore attempts to control this wild landscape? Supply Chains Mean (Cyber) War
BlogInfoSec.com

Authors note: Since this column was originally written, another scandal broke around the use by third-party suppliers of North Korean gold, affecting such companies as Hewlett-Packard Co. and IBM, as described by Joel Schectman in the Risk & Complianc


Smart Meter Attack Scenarios
TrendLabs | Malware Blog - by Trend Micro

In our previous post, we looked at how smart meters were being introduced across multiple countries and regions, and why these devices pose security risks to their users. At their heart, a smart meter is simply… a computer. Let’s look atour ex


BlackBerry's assistant known asBlackBerry Assistant - Siliconrepublic.com
infosec « WordPress.com Tag Feed

BlackBerry’s assistant known asBlackBerry AssistantSiliconrepublic.comsiliconrepublic.com. Du


Multiple Cisco Wireless Gateways Vulnerable to Remote Attacks
infosec « WordPress.com Tag Feed

from The Hacker News http://bit.ly/1pcmmsI via IFTTT


all content is copyright its respective owner or owners.

the technology behind infosec daily is partially copyright © 2003-2008 jose nazario.