Last updated:
Wed Aug 20 16:23:50 2014 GMT
  2014 FIRST Annual Conference in Boston - Register now


Blogroll
weblog.cemper.com - Technology, Software Development, Project Management, Marketing News
The Dark Visitor
A Bro Blog
e-Government@large
Michael Howard's Web Log : Security
TheSecure.Net
Andreas Sterbenz's Blog
Wired: Threat Level
MoMusings@Arachnid.homeip.net
CERIAS Weblogs
SYN|ACK
Michael Howard's Web Log
Latests Alerts From Websense Security Labs
Dan Anderson's Weblog
taint.org: Justin Mason's Weblog
CERIAS Blog
ThreatFire Research Blog
Latest Analysis for All Threats
REblog
Draft Security Blog
Paul's Down-Home Page: Exchange, messaging, collaboration, security, and more
Technology Review Feed - TR Editors' Blog
Will Cox: Security
torsten's .NET blog - Security
Harry Waldron - Microsoft MVP Blog
Information Security News Desk
Jim's Bloggyness
LuFG Summerschool Applied IT Security
The Antivirus Guy Blog
Infosec Events
Nth world commentaries
eEye Digital Security - Research Blog
GPL
turnipsecurity
Network Security Blog
.NET Security Blog
Internet Security with Kirk
In-Security : Exploring Internet, Information and Infrastructure Security
Stupid Security
Roger's Information Security Blog
Security to the Core | Arbor Networks Security Blog
1 Raindrop
Security Blanket
Infosec Writers Latest Security Papers
The Security Mentor
Security Soapbox
Errata Security
Kaspersky Lab Weblog
b l o g _ m a x i m u m
HD DVD / Randomness... : Security
BlogInfoSec.com
Spam Filtering Techniques
ADD / XOR / ROL
Casper Dik's Weblog
Essential Computer Security
worm blog
Security Notes
Anti Rootkit Blog
TrendLabs | Malware Blog - by Trend Micro
Deb Shinder's MVP Blog
Wifi Security Project
McAfee Avert Labs
Fermats Security Alerts
MVP Jubo Security Blog
OSSEC Blog
Compendium
Mark's Blog
John Palfrey
Security Watch
Sorry! We couldn't find your document
Security and Technology for SMB's and SOHO's
infosec « WordPress.com Tag Feed
Fabulous Adventures In Coding : Security
The ICSI Networking Group Blog
Steve Lamb's Blog : How to Articles
Anton Chuvakin, O'Reilly Network
CyberSpeak's Podcast
Educated Guesswork
Security Fix
The Security Skeptic
Service Provider Journal
Latest Blog Entires From WebSense Security Labs
Errata Security
-- Sleeve notes of a sysadmin --
Realtime Community | IT Compliance
You Know What's Stupid? Everything I Don't Understand
Schneier on Security
malwarecrawler.com
Mal-Aware.org
Thomas Shinder Blog
Vastly Important Notes
Mark O'Neill's Radio Weblog
Solution Accelerators - Security & Compliance
Fred Avolio's Musings
Tenable Network Security
National Cyber Security - Blogs
Sergey Simakov blog
Xavier's Security Post
Vodun.org
Information Research
StillSecure, After All These Years
DISOG
An Information Security Place
OpenPacket Blog
Crypto-World - news
Security Manifest
Verizonbusiness.com
Inliniac
ADD / XOR / ROL
Martin Englund's Weblog
Network Security Blog
Security Curve Weblog
The WiFi Zone
-- Sleeve notes of a sysadmin --
netstat -a
trimMail's Email Battles
Kasun's Weblog
Error!
Esphion
RedTeam
Attack Research
Daemon on Security
OSVDB Blog
Lasipalatsi
Volatility
Liudvikas Bukys
Open-Node.net Security Weblog
Page Not Found - ASP.NET Weblogs
Matasano Chargen
Phil Windley's Technometria
Security Blog
The Security Mentor
-- Sleeve notes of a sysadmin --
Bowulf Infosec & Network Admin Blog
Rick Kingslan - Will Hack 4 Food
darren_moffat@blog$ cat /dev/mem | grep /dev/urandom
404 - Not Found
whattheflex
Krebs on Security
MZL & Novatech Traffic & Bandwidth Statistics News
disLEXia 3000 blog
Page Not Found - ASP.NET Weblogs
Ivan
Tim Rains' WebLog
cybercrime/-security sightings
Information Manager Journal
The Microsoft Security Response Center Blog
Dancho Danchev's Blog - Mind Streams of Information Security Knowledge
blackhat for life
Infothought
Usable Security
Cheap Hack
Wendy's Blog: Legal Tags
IBM Internet Security Systems Frequency X Blog
Page Not Found - ASP.NET Weblogs
::PepperTech:: Security Management News Blog
Larry Seltzer's Security Weblog
The Security Blanket
Latest Blog Entires From WebSense Security Labs
Security Response Weblog
Andrew Carpenter
Financial Cryptography
Fixing Email Weblog
Bill Sommerfeld's Weblog
Sorry! We couldn't find your document
Sam Gentile
C.I.S.R.T.
Cybercrime
BufferOverrun : Security
Roger Thompson
Windows Security Logging and Other Esoterica
NetSec
Sunbelt Blog
Arun Perinkolam's Weblog
Federated Infrastructure : Security
The Evil Empire
securosis.com
Vitalsecurity.org - A Revolution is the Solution
Internet Insecurity
DoxPara Research
Solution Accelerators - Security & Compliance
Napsterization
Larry Osterman's WebLog : Security
APB Infosec blog
KyleM.xwell
Glenn Brunette's Security Weblog
Anti-Malware Engineering Team
When {Puffy} Meets ^RedDevil^
honeyblog
Pinpoint Labs Blog
: 404 Not Found
Bkis Blog
Burton Group Page Not Found
www.rootkit.com
CyberCrime & Doing Time
PandaLabs
Lauren Weinstein's Blog
chandanlog(3C)
Security Garden
Internet Security News and Analysis
Logblog
The X Dot Com Inc. - 404 Wrong Page
Computing Research Policy Blog
Glenn Brunette's Security Weblog
Digital ID World Editors Corner
Dana Epp's ramblings at the Sanctuary
ModSecurity Blog
Security Fix
Infosec Potpourri
Page Not Found - ASP.NET Weblogs
TaoSecurity
George Ou
Windows Incident Response
Volatile Systems
Emergent Chaos
SecuriTeam Blogs
Cynical Security
Abner Stories
About Internet / Network Security
Information Security News Desk
Kim Cameron's Identity Weblog
Spire Security Viewpoint
Carnal0wnage Blog
Panda Research Blog
New Directions in Security (Comments)
darren_moffat@blog$ cat /dev/mem | grep /dev/urandom
NI3
Page Not Found - ASP.NET Weblogs
Eugene Bobukh's WebLog
fes' WebLog
Politically Motivated Computer Crime and Hacktivism
GnuPG.org
Security
The Security Development Lifecycle
websecurityblog
Security Sauce
Alert Logic
mcwresearch.com
Windows Shell/User (MSN & OneCare Too)
Network Security
Kimberly L. Tripp: Improving *my* SQL skills through your questions! - Security
Small Business Server
Sorry! We couldn't find your document
Static in the Ether
nzight
F-Secure Antivirus Research Weblog
A Day in the Life of an Information Security Investigator
The Security Skeptic
@CyberForge
Casper Dik's Weblog
The Day Before Zero
antlab
Freedom to Tinker
Norwegian Honeynet Project
MSDN: Security
bIPlog
Larry's Insecurity Blog
1 Raindrop
CGISecurity.com: Your Web Site and Application Security Resource
Anil John - Security
SophosLabs blog
Aaron Margosis' "Non-Admin" WebLog
Speaking of Security, the RSA Blog and Podcast
InfoWorld Gripe Line | Ed Foster
The Importance of...
Robert Hensing's Blog
Hex blog
Page Not Found - ASP.NET Weblogs
invulnerableit.com Blog
BenEdelman.org
Adobe Product Security Incident Response Team (PSIRT)
Vulnerability Analysis Blog
Page Not Found - ASP.NET Weblogs
Caffeinated Security
Greyhat of the World Unite...
August 20, 2014


CHS Breach: Typical Methods, Atypical Target For Chinese Hackers
infosec « WordPress.com Tag Feed

Publicly traded healthcare organizations stock goes up as breach notifications go out. from D


Google et al slammed by justice chief over 'right to be forgotten'
SophosLabs blog

Europes Commissioner for Justice, Martine Reicherts, has slammed Google and other opponents of the 'right to be forgotten' ruling, claiming that they are attempting to undermine the reform.


Data vs. Metadata
F-Secure Antivirus Research Weblog

Google uses HTTPS for all search queries. That's good, because it means that all of the questions you ask (a.k.a. your data) will be encrypted. However regardless of HTTPS, inferences about yo


Microsoft Yet to Deliver Fix for Faulty Patch Tuesday Update
infosec « WordPress.com Tag Feed

Microsoft said it is still working on a fix for a broken patch released last Patch Tuesday that is c


Researchers Easily Slipped Weapons Past TSAs X-Ray Body Scanners
Wired: Threat Level

Two years ago, a blogger named Jonathan Corbett published a YouTube video that seemed to show a facepalm-worthy vulnerability in the TSAs Rapiscan full-body X-ray scanners: Because metal detected by the scanners appeared black in the images the sca


Google plans YouTube clean-up, ready for kid customers
SophosLabs blog

The new services reportedly will include a dashboard for parents, a child-safe YouTube, and a new age requirement on Android gadgets. This might be a good thing. Can you imagine a YouTube that won't make you feel like you need a shower after a viewing ses


Delaware passes law to give others access to our e-lives when we die
SophosLabs blog

It's the broadest law regarding digital assets of the deceased to be passed in the US, and internet companies and privacy advocates aren't too crazy about it. At the end of the day/your days, a will that addresses digital assets is still a smart move that


5 excuses for doing nothing about computer security!
SophosLabs blog

Here are five security excuses that we hear a lot, both from individuals and from small businesses. We've given you some advice to help you argue back that security really does matter...


Critical data protection: When the next storm rolls in will you be prepared? - Daily Business Buzz
infosec « WordPress.com Tag Feed

Critical data protection: When the next storm rolls in will you be prepared?Daily Business BuzzPat d


A swarm of cars
Network Security Blog

Its a given that we will have intelligence in our cars within the next decade. Quite frankly, theres no way it is avoidable, given the appetite of consumers for all things to be connected to the Internet and too each other. In


'Google Is Worse Than the NSA' Rupert Murdoch
infosec « WordPress.com Tag Feed

from The Hacker News http://bit.ly/1uMrKcr via IFTTT


Android ransomware masquerades as Symantec mobile AV
infosec « WordPress.com Tag Feed

A new piece of Android ransomware is doing rounds, and is tricking users into installing it by posin

August 19, 2014


http://www.symantec.com/connect/blogs/phishers-serve-paolo-bediones-sex-video-steal-facebook-user-logins
None


Breaking the security of physical devices
infosec « WordPress.com Tag Feed

In this podcast recorded at Black Hat USA 2014, Silvio Cesare, Director of Anti-Malware Engineering


US Nuclear Regulatory Commission hacked 3 times in 3 years
SophosLabs blog

According to documents obtained under an open-records request, two of the hacks, perpetrated via phishing emails, are believed to have originated in foreign countries, while the source of the third remains unknown because incident logs have been destroyed


Cybercrime Exposed Part 2: When Adware Goes Bad A Closer Look at Adware
TrendLabs | Malware Blog - by Trend Micro

With the ostensibly harmless nature of adware, we are constantly tricked into believing that they are nothing but online nuisances. But underneath, they are marketing-engineered software that could potentially carry malicious programs to target your brows


The Administrator of Things (AoT) A Side Effect of Smartification
TrendLabs | Malware Blog - by Trend Micro

In an earlier article, we talked about the ongoing smartification of the home the natural tendency of households to accumulate more intelligent devices over time. While this has its benefits, the residents of smart homes also need to invest their time an


ISC StormCast for Monday, August 18th 2014 http://bit.ly/1uLcmgo, (Mon, Aug 18th)
infosec « WordPress.com Tag Feed

…(more)… from SANS Internet Storm Center, InfoCON: green http://bit.ly/1qiBmVa via IFTTT


US Nuclear Regulatory Commission hacked 3 times in 3 years
SophosLabs blog

According to documents obtained under an open-records request, two of the hacks, perpetrated via phishing emails, are believed to have originated in foreign countries, while the source of the third remains unknown because incident logs have been destroyed


Data protection changes risk 'dire consequences', scientists warn - Times Higher Education
infosec « WordPress.com Tag Feed

Times Higher Education Data protection changes risk ‘dire consequences’, scientists warn


How to Save the Net: Build a Backup
Wired: Threat Level

As more vital services are dependent on the Internet, we must make a back-up to avoid chaos.


How to Save the Net: Keep It Open
Wired: Threat Level

We have a unique opportunity to redesign the Internet's governance by enshrining the openness principle and the concept that all stakeholders should participate in policy development.Twitter injects favourites into newsfeeds, but is it an 'invasion of privacy'?
SophosLabs blog

Twitter is taking people's favourites - what many (mistakenly) have assumed were private - and sticking them into people's newsfeeds, along with follow notifications. Supervalu says it was breached - is it the next Target?
SophosLabs blog

US retailer Supervalu is warning customers that an intrusion of its network may have resulted in the theft of credit and debit card account numbers from up to 200 of its stores. Meanwhile, a related data breach affected another 800 stores for which Supe


US won't release Russian MP's son being held on PoS hacking charges
SophosLabs blog

A US federal court has refused to release Roman Seleznev, arrested in the Maldives under suspicion of rigging retail PoS systems to rip off credit card details. Prosecutors say he was caught with over 2 million stolen cards on his laptop and that he'd bee


Dell releases new data production bundle to deliver enterprise virtualisation ... - OnWindows.com
infosec « WordPress.com Tag Feed

Dell releases new data production bundle to deliver enterprise virtualisation …OnWindows.comW


How To Save The Net
Wired: Threat Level

We asked some of the biggest stakeholders in the Internet as we know it to lay out ways we can fix it. We are excited to present you with six thoughtful solutions to problems urgently facing the future of the Internet.How to Save the Net: Dont Give In to Big ISPs
Wired: Threat Level

The next Netflix won't stand a chance if the largest US Internet service providers are allowed to merge or demand extra fees from content companies trying to reach their subscribers.How to Save the Net: Break Up the NSA
Wired: Threat Level

The NSA has too many missions: a military mission dedicated to network attacks and political espionage, a law enforcement mission focused on individual bad actors across the globe, and a defensive mission devoted to protecting the nation's information inf


How to Save the Net: Take Ownership
Wired: Threat Level

We need to do more to develop and empower digital citizens.


How to Save the Net: A CDC for Cybercrime
Wired: Threat Level

Forming an agency whose core mission is cybersecurity research and information sharing would help change the nature of the game.


This Android Shield Could Encrypt Apps So Invisibly You Forget Its There
Wired: Threat Level

In the post-Snowden era, everyone wants to make encryption easier. Now, one group of researchers has created a tool intended to make it invisible. A team from Georgia Tech has designed software that acts as an overlay on Android smartphones’ communi


Twitter injects favourites into newsfeeds, but is it an invasion of privacy?
SophosLabs blog

Twitter is taking people's favourites - what many (mistakenly) have assumed were private - and sticking them into people's newsfeeds, along with follow notifications. Supervalu says it was breached is it the next Target?
SophosLabs blog

US retailer Supervalu is warning customers that an intrusion of its network may have resulted in the theft of credit and debit card account numbers from up to 200 of its stores. Meanwhile, a related data breach affected another 800 stores for which Supe


US wont release Russian MPs son being held on PoS hacking charges
SophosLabs blog

A US federal court has refused to release Roman Seleznev, arrested in the Maldives under suspicion of rigging retail PoS systems to rip off credit card details. Prosecutors say he was caught with over 2 million stolen cards on his laptop and that he'd bee


The Security of al Qaeda Encryption Software
Schneier on Security


Hiding A Bitcoin Mining Botnet In The Cloud
infosec « WordPress.com Tag Feed

from Darknet – The Darkside http://bit.ly/1qcIfHz via IFTTT


Counterfeit Legal Notices continue to spread malware
CyberCrime & Doing Time

Counterfeit legal notices continue to spread malware Today a friend mentioned that they had seen several ASProx messages being distributed by domains that looked like law firm names warning of court appearances. I was a bit surprised that this was new


Google Fixes 12 Vulnerabilities in Chrome 36
infosec « WordPress.com Tag Feed

Google patched its Chrome browser this week, fixing 12 vulnerabilities including both a serious info


all content is copyright its respective owner or owners.

the technology behind infosec daily is partially copyright © 2003-2008 jose nazario.