Last updated:
Thu Sep 3 19:23:51 2015 GMT
  2014 FIRST Annual Conference in Boston - Register now


Blogroll
MoMusings@Arachnid.homeip.net
Digital ID World Editors Corner
turnipsecurity
nzight
Spire Security Viewpoint
Wired: Threat Level
Open-Node.net Security Weblog
whattheflex
Anti-Malware Engineering Team
Anil John - Security
Mal-Aware.org
Infothought
PandaLabs
Andrew Carpenter
Information Manager Journal
The Security Mentor
Stupid Security
Will Cox: Security
Usable Security
The WiFi Zone
Casper Dik's Weblog
Errata Security
blackhat for life
Harry Waldron - Microsoft MVP Blog
Bill Sommerfeld's Weblog
Windows Incident Response
Computing Research Policy Blog
Michael Howard's Web Log
NetSec
Security Curve Weblog
Latest Blog Entires From WebSense Security Labs
darren_moffat@blog$ cat /dev/mem | grep /dev/urandom
Tenable Network Security
Anti Rootkit Blog
CyberCrime & Doing Time
MVP Jubo Security Blog
BenEdelman.org
Kim Cameron's Identity Weblog
Security
Network Security Blog
OSSEC Blog
Page Not Found - ASP.NET Weblogs
Page Not Found - ASP.NET Weblogs
A Bro Blog
Roger Thompson
MSDN: Security
NI3
chandanlog(3C)
Tim Rains' WebLog
Anton Chuvakin, O'Reilly Network
SophosLabs blog
Security and Technology for SMB's and SOHO's
::PepperTech:: Security Management News Blog
Security Fix
A Day in the Life of an Information Security Investigator
Latest Analysis for All Threats
mcwresearch.com
Sorry! We couldn't find your document
Adobe Product Security Incident Response Team (PSIRT)
Infosec Events
Ivan
.NET Security Blog
IBM Internet Security Systems Frequency X Blog
ADD / XOR / ROL
Logblog
Fermats Security Alerts
The Importance of...
Michael Howard's Web Log : Security
National Cyber Security - Blogs
Larry's Insecurity Blog
Network Security Blog
Static in the Ether
invulnerableit.com Blog
Dana Epp's ramblings at the Sanctuary
The X Dot Com Inc. - 404 Wrong Page
Security Garden
b l o g _ m a x i m u m
torsten's .NET blog - Security
Mark's Blog
HD DVD / Randomness... : Security
Spam Filtering Techniques
Dancho Danchev's Blog - Mind Streams of Information Security Knowledge
Esphion
taint.org: Justin Mason's Weblog
Politically Motivated Computer Crime and Hacktivism
eEye Digital Security - Research Blog
APB Infosec blog
Robert Hensing's Blog
Fabulous Adventures In Coding : Security
Lasipalatsi
Casper Dik's Weblog
Page Not Found - ASP.NET Weblogs
In-Security : Exploring Internet, Information and Infrastructure Security
About Internet / Network Security
Information Research
The Antivirus Guy Blog
Financial Cryptography
Vastly Important Notes
Security Notes
OSVDB Blog
Sorry! We couldn't find your document
Kimberly L. Tripp: Improving *my* SQL skills through your questions! - Security
Panda Research Blog
MZL & Novatech Traffic & Bandwidth Statistics News
George Ou
Daemon on Security
Realtime Community | IT Compliance
Infosec Writers Latest Security Papers
Paul's Down-Home Page: Exchange, messaging, collaboration, security, and more
Essential Computer Security
disLEXia 3000 blog
The ICSI Networking Group Blog
Error!
Glenn Brunette's Security Weblog
Cheap Hack
Small Business Server
malwarecrawler.com
Infosec Potpourri
Burton Group Page Not Found
Errata Security
websecurityblog
Fred Avolio's Musings
e-Government@large
Eugene Bobukh's WebLog
The Security Blanket
Caffeinated Security
RedTeam
McAfee Avert Labs
ADD / XOR / ROL
Glenn Brunette's Security Weblog
netstat -a
F-Secure Antivirus Research Weblog
Sunbelt Blog
Security Blog
Napsterization
worm blog
-- Sleeve notes of a sysadmin --
cybercrime/-security sightings
Internet Security with Kirk
Krebs on Security
Security to the Core | Arbor Networks Security Blog
The Security Skeptic
CERIAS Weblogs
Xavier's Security Post
DoxPara Research
Schneier on Security
OpenPacket Blog
-- Sleeve notes of a sysadmin --
Network Security
Security Blanket
Latest Blog Entires From WebSense Security Labs
Roger's Information Security Blog
LuFG Summerschool Applied IT Security
Page Not Found - ASP.NET Weblogs
Steve Lamb's Blog : How to Articles
C.I.S.R.T.
Martin Englund's Weblog
Greyhat of the World Unite...
InfoWorld Gripe Line | Ed Foster
Arun Perinkolam's Weblog
Information Security News Desk
Security Sauce
Security Soapbox
Kasun's Weblog
TrendLabs | Malware Blog - by Trend Micro
Larry Osterman's WebLog : Security
Abner Stories
Pinpoint Labs Blog
Carnal0wnage Blog
BlogInfoSec.com
Lauren Weinstein's Blog
Emergent Chaos
Freedom to Tinker
Vulnerability Analysis Blog
: 404 Not Found
KyleM.xwell
Speaking of Security, the RSA Blog and Podcast
Federated Infrastructure : Security
SYN|ACK
Vodun.org
Technology Review Feed - TR Editors' Blog
The Dark Visitor
Volatile Systems
The Evil Empire
trimMail's Email Battles
BufferOverrun : Security
Latests Alerts From Websense Security Labs
CyberSpeak's Podcast
Jim's Bloggyness
Solution Accelerators - Security & Compliance
1 Raindrop
When {Puffy} Meets ^RedDevil^
Educated Guesswork
Crypto-World - news
Verizonbusiness.com
REblog
John Palfrey
Sam Gentile
Sorry! We couldn't find your document
Bkis Blog
Windows Shell/User (MSN & OneCare Too)
Aaron Margosis' "Non-Admin" WebLog
-- Sleeve notes of a sysadmin --
The Security Development Lifecycle
weblog.cemper.com - Technology, Software Development, Project Management, Marketing News
Matasano Chargen
honeyblog
Service Provider Journal
Alert Logic
The Security Mentor
Inliniac
Security Fix
Rick Kingslan - Will Hack 4 Food
Vitalsecurity.org - A Revolution is the Solution
darren_moffat@blog$ cat /dev/mem | grep /dev/urandom
The Security Skeptic
ThreatFire Research Blog
Norwegian Honeynet Project
Liudvikas Bukys
You Know What's Stupid? Everything I Don't Understand
Page Not Found - ASP.NET Weblogs
Compendium
Information Security News Desk
Larry Seltzer's Security Weblog
TaoSecurity
Security Manifest
CERIAS Blog
www.rootkit.com
Draft Security Blog
Windows Security Logging and Other Esoterica
Cybercrime
Sergey Simakov blog
Thomas Shinder Blog
Andreas Sterbenz's Blog
Page Not Found - ASP.NET Weblogs
TheSecure.Net
An Information Security Place
Bowulf Infosec & Network Admin Blog
Internet Security News and Analysis
Page Not Found - ASP.NET Weblogs
Hex blog
StillSecure, After All These Years
New Directions in Security (Comments)
404 - Not Found
GnuPG.org
fes' WebLog
GPL
Dan Anderson's Weblog
antlab
Security Watch
Volatility
Cynical Security
The Day Before Zero
securosis.com
1 Raindrop
Fixing Email Weblog
Phil Windley's Technometria
Wendy's Blog: Legal Tags
Security Response Weblog
Mark O'Neill's Radio Weblog
Solution Accelerators - Security & Compliance
Wifi Security Project
@CyberForge
Internet Insecurity
CGISecurity.com: Your Web Site and Application Security Resource
Nth world commentaries
infosec « WordPress.com Tag Feed
Attack Research
ModSecurity Blog
bIPlog
SecuriTeam Blogs
Kaspersky Lab Weblog
Deb Shinder's MVP Blog
The Microsoft Security Response Center Blog
DISOG
September 03, 2015


Open source Sleepy Puppy tool finds XSS bugs in target apps and beyond
infosec « WordPress.com Tag Feed

Since Monday, security pros can add another XSS-finding tool to their arsenal, as Netflix has open s


Children's apps and websites raise privacy concerns
infosec « WordPress.com Tag Feed

Members of the Global Privacy Enforcement Network say many kids websites and apps collect and


Microsoft Data Harvesting Backported To Windows 7 & 8
infosec « WordPress.com Tag Feed

from Darknet The Darkside http://bit.ly/1LOgCSE via IFTTT


Cisco Patches File Overwrite Bug in IMC Supervisor and UCS Director
infosec « WordPress.com Tag Feed

Cisco has patched a remote file-overwrite vulnerability in a couple of its products that could allow


Children's apps and websites raise privacy concerns
SophosLabs blog

Members of the Global Privacy Enforcement Network say many kids' websites and apps collect and share too much personal information.


Persistent cyber spies try to impersonate security researchers
infosec « WordPress.com Tag Feed

Rocket Kitten, a cyber espionage group that mostly targets individuals in the Middle East, has been


How I Got Here: Window Snyder
infosec « WordPress.com Tag Feed

Dennis Fisher talks with Window Snyder of Fastly about her early interest in technology, what it was


PayPal stored XSS vulnerability exposed
infosec « WordPress.com Tag Feed

Bitdefender researchers have located a stored XSS vulnerability in PayPal that leaves the e-payment


New Android Ransomware Communicates over XMPP
infosec « WordPress.com Tag Feed

A new strain of Android ransomware disguised as a video player app uses an instant messaging protoco


Cyber crooks opt for APT method for delivering malware
infosec « WordPress.com Tag Feed

Delivering malware without it being flagged by users and security solutions is one of the biggest ch


"The Declining Half-Life of Secrets"
Schneier on Security


Clever Android ransomware infects tens of thousands of devices
infosec « WordPress.com Tag Feed

A new, improved variant of the Android Simplocker ransomware is lurking on third-party app stores.


New Versions of Carbanak Banking Malware Seen Hitting Targets in U.S. and Europe
infosec « WordPress.com Tag Feed

New variantsof the notorious Carbanak Trojan has surfaced in Europe and the United States, and rese


It's undeniable, IoT will change security forever
infosec « WordPress.com Tag Feed

Over 20 percent of enterprises will have digital security services devoted to protecting business in


Vulnerable gambling apps put corporate data at risk
infosec « WordPress.com Tag Feed

Based on an analysis of hundreds of thousands of scans of mobile apps installed in actual corporate


Should the US hit China with sanctions over cyberespionage?
infosec « WordPress.com Tag Feed

The Obama administration is developing economic sanctions against China for cyberespionage against U


Should the US hit China with sanctions over cyberespionage?
SophosLabs blog

The Obama administration is developing economic sanctions against China for cyberespionage against US companies. Are sanctions likely to succeed in deterring China? Or will they only invite retaliation that will damage the world economy?


Interview, Jeff Williams, Contrast Security
Network Security Blog

I sat down for a few minutes at Black Hat to talk to Jeff Williams, the Chief Technology Officer of Contrast Security. We spent a little time reviewing his past, which includes penning the OWASP Top 10 we all know and love, as well as talking about the wo

September 02, 2015


Unsolved cipher mystery: Spaniard says he's cracked Dead Pigeon code
infosec « WordPress.com Tag Feed

A pigeon skeleton from WW2 with a coded message strapped to its leg was found in England in 2012. Th


Unsolved cipher mystery: Spaniard says he's cracked Dead Pigeon code
SophosLabs blog

A pigeon skeleton from WW2 with a coded message strapped to its leg was found in England in 2012. The challenge: unscramble the message!Google accused of rigging search results by India's competition cops
infosec « WordPress.com Tag Feed

"Yep, Google’s a search bully," agree Facebook, Nokia’s maps division, MakeMy-


THE ASHLEY MADISON BREACH
infosec « WordPress.com Tag Feed

If you have paid close attention to tech news lately, you would have come across the most recent dat


Google accused of rigging search results by India's competition cops
SophosLabs blog

"Yep, Google's a search bully," agree Facebook, Nokia's maps division, MakeMy-Trip.com, Flipkart and several other companies.Victims of June OPM Hack Still Havent Been Notified
infosec « WordPress.com Tag Feed

Millions of government workers whose information was implicated in this years expansive Office of P


Wikipedia blocks sockpuppet accounts amid blackmail claims
infosec « WordPress.com Tag Feed

As part of an internal investigation, the Wikimedia Foundation found that rogue editors had violated


Netflix Sleepy Puppy Awakens XSS Vulnerabilities in Secondary Applications
infosec « WordPress.com Tag Feed

Netflix released Sleepy Puppy, a cross-site scripting payload management framework, to open source.


Wikipedia blocks sockpuppet accounts amid blackmail claims
SophosLabs blog

As part of an internal investigation, the Wikimedia Foundation found that rogue editors had violated its terms of use by creating new pages, as well as modifying existing ones for the purposes of financial gain.Gone Girl Suspect Confesses to ReporterAs FBI Listens In
You Know What's Stupid? Everything I Don't Understand


Yes, they just droned a hacker
Errata Security

Many are disputing the story about a recent story about a drone strike that targeted the hacker TriCk from Anonymous group TeaMp0isoN. They claim instead that the guy, 


Popular Android AppLock app full of gaping security holes
infosec « WordPress.com Tag Feed

AppLock, by DoMobile, is a very popular Android app for limiting access to certain content on the de


OPM (Mis)Spends $133M on Credit Monitoring
infosec « WordPress.com Tag Feed

The Office of Personnel Management (OPM) has awarded a $133 million contract to a private firm in an


Major browser makers synchronize end of support for RC4
infosec « WordPress.com Tag Feed

Mozilla, Google and Microsoft have come to an agreement: support for the increasingly vulnerable RC4


HTCIA2015 Conference Follow up
Windows Incident Response


Uber hires the guys who hacked a Jeep to develop safer driverless cars
infosec « WordPress.com Tag Feed

Charlie Miller and Chris Valasek, security researchers who caused huge headaches for Fiat Chrysler w


WHSmith contact form spams out personal customer data
infosec « WordPress.com Tag Feed

Users of UK newsagent chain WHSmith’s online services have reported large amounts of email arr


Best practices for ensuring compliance in the age of cloud computing
infosec « WordPress.com Tag Feed

When was the last time you heard someone utter the sentence, Im looking forward to the audit next


Adware installer gives itself permission to access Mac users' keychain
infosec « WordPress.com Tag Feed

Malwarebytes researcher Adam Thomas has made an interesting discovery: an adware installer created b


Google Patches Critical Vulnerabilities in Chrome 45
infosec « WordPress.com Tag Feed

Google promoted Chrome 45 to a stable release, patching 29 security vulnerabilities. It has also sta


Microsoft Word Intruder Revealed - inside a malware construction kit
infosec « WordPress.com Tag Feed

What happens when cybercrooks take a leaf out of the Advanced Persistent Threatsters’ book? Ga


Gone Girl Suspect Confesses to ReporterAs FBI Listens In
Wired: Threat Level

‘Gone Girl’ Suspect Confesses to Reporter—As FBI Listens In

A word of advice to jail inmates who give press inte


Uber hires the guys who hacked a Jeep to develop safer driverless cars
SophosLabs blog

Charlie Miller and Chris Valasek, security researchers who caused huge headaches for Fiat Chrysler when they showed the world how to remotely hack a Jeep, have hacked their way into new jobs with Uber.WHSmith contact form spams out personal customer data
SophosLabs blog

Users of UK newsagent chain WHSmith's online services have reported large amounts of email arriving in their inboxes, containing personal contact data on other users.Microsoft Word Intruder Revealed - inside a malware construction kit
SophosLabs blog

What happens when cybercrooks take a leaf out of the Advanced Persistent Threatsters' book? Gabor Szappanos of SophosLabs investigates...History of the L0pht
Schneier on Security


What's burning up resources for IT pros during the summer?
infosec « WordPress.com Tag Feed

IT pros felt the heat this summer as they kept networks humming along for remote workers on vacation


Verizon and Splunk deliver actionable threat intelligence
infosec « WordPress.com Tag Feed

Verizon Enterprise Solutions launched its Data Breach Investigations Report (DBIR) app for Splunk so


Snoopers Charter will cause extreme rise in business costs
infosec « WordPress.com Tag Feed

The UK Governments Investigatory Powers Bill, dubbed Snoopers Charter by critics, has already be


iOS KeyRaider - Daily Security Byte EP.135
infosec « WordPress.com Tag Feed

The bad news is a new iOS malware variant has stolen the iCloud credentials of 225,000users. The go


95% of websites in 10 new TLDs are suspicious
infosec « WordPress.com Tag Feed

Much has changed since the early days of the Internet when the Web had only six common top level dom


0-days found in widely used Belkin router, fixes still unavailable
infosec « WordPress.com Tag Feed

CERT/CC has issued a warning about the existence of several serious zero-day vulnerabilities affecti


Cyber Espionage Sanctions - Daily Security Byte EP.134
infosec « WordPress.com Tag Feed

According to unnamed sources in the Obama administration, the US government is developingsanction a


all content is copyright its respective owner or owners.

the technology behind infosec daily is partially copyright © 2003-2008 jose nazario.