Last updated:
Thu May 28 07:23:28 2015 GMT
  2014 FIRST Annual Conference in Boston - Register now

Security Watch
Kasun's Weblog
Sunbelt Blog
Mark O'Neill's Radio Weblog
Page Not Found - ASP.NET Weblogs
Page Not Found - ASP.NET Weblogs
Fermats Security Alerts
cybercrime/-security sightings
-- Sleeve notes of a sysadmin --
netstat -a
About Internet / Network Security
Kaspersky Lab Weblog
TrendLabs | Malware Blog - by Trend Micro
: 404 Not Found
Security Sauce
Crypto-World - news
Latest Analysis for All Threats
Security Notes
Security Response Weblog
An Information Security Place
Wendy's Blog: Legal Tags
Security Curve Weblog
John Palfrey
Educated Guesswork Your Web Site and Application Security Resource
Infosec Events
Burton Group Page Not Found
Fred Avolio's Musings
Rick Kingslan - Will Hack 4 Food
Information Security News Desk
Windows Shell/User (MSN & OneCare Too)
Errata Security
Information Security News Desk
Cheap Hack
Daemon on Security
torsten's .NET blog - Security
Static in the Ether
Larry's Insecurity Blog
SecuriTeam Blogs
The ICSI Networking Group Blog
Tim Rains' WebLog
-- Sleeve notes of a sysadmin --
Windows Incident Response
Cynical Security
MSDN: Security
Dan Anderson's Weblog
Federated Infrastructure : Security
The Antivirus Guy Blog
Paul's Down-Home Page: Exchange, messaging, collaboration, security, and more
Windows Security Logging and Other Esoterica
Latests Alerts From Websense Security Labs
Mark's Blog
Roger Thompson
The X Dot Com Inc. - 404 Wrong Page
Essential Computer Security
Kimberly L. Tripp: Improving *my* SQL skills through your questions! - Security
Andrew Carpenter
In-Security : Exploring Internet, Information and Infrastructure Security
Norwegian Honeynet Project
The Dark Visitor
Arun Perinkolam's Weblog
Xavier's Security Post
b l o g _ m a x i m u m
Vastly Important Notes
Page Not Found - ASP.NET Weblogs
F-Secure Antivirus Research Weblog
Anton Chuvakin, O'Reilly Network
Internet Security with Kirk
worm blog
Michael Howard's Web Log : Security
Alert Logic
LuFG Summerschool Applied IT Security
McAfee Avert Labs
Security and Technology for SMB's and SOHO's
Infosec Writers Latest Security Papers
blackhat for life
Aaron Margosis' "Non-Admin" WebLog
CyberSpeak's Podcast
Internet Security News and Analysis
Jim's Bloggyness
Technology Review Feed - TR Editors' Blog
Network Security
Krebs on Security
HD DVD / Randomness... : Security
The Security Skeptic
Hex blog
-- Sleeve notes of a sysadmin --
Glenn Brunette's Security Weblog
Robert Hensing's Blog
The Importance of...
Internet Insecurity
Phil Windley's Technometria
Financial Cryptography
InfoWorld Gripe Line | Ed Foster
eEye Digital Security - Research Blog
Stupid Security
Dancho Danchev's Blog - Mind Streams of Information Security Knowledge
Politically Motivated Computer Crime and Hacktivism
The Security Development Lifecycle
1 Raindrop
Page Not Found - ASP.NET Weblogs
404 - Not Found
Anil John - Security - A Revolution is the Solution
::PepperTech:: Security Management News Blog
Security Blanket Justin Mason's Weblog
Spam Filtering Techniques Security Weblog
Adobe Product Security Incident Response Team (PSIRT)
Attack Research
Draft Security Blog
Errata Security
Thomas Shinder Blog
CyberCrime & Doing Time
DoxPara Research
Security Fix
National Cyber Security - Blogs - Technology, Software Development, Project Management, Marketing News
Freedom to Tinker
infosec « Tag Feed
Information Manager Journal
Michael Howard's Web Log
SophosLabs blog
Martin Englund's Weblog
Vulnerability Analysis Blog
Roger's Information Security Blog
OpenPacket Blog
Small Business Server
disLEXia 3000 blog
Spire Security Viewpoint
darren_moffat@blog$ cat /dev/mem | grep /dev/urandom
The Day Before Zero
You Know What's Stupid? Everything I Don't Understand
StillSecure, After All These Years
CERIAS Weblogs
Casper Dik's Weblog
APB Infosec blog
darren_moffat@blog$ cat /dev/mem | grep /dev/urandom
IBM Internet Security Systems Frequency X Blog
Matasano Chargen
A Bro Blog
Security to the Core | Arbor Networks Security Blog
Sorry! We couldn't find your document
Greyhat of the World Unite...
When {Puffy} Meets ^RedDevil^
The Security Mentor
Solution Accelerators - Security & Compliance
ThreatFire Research Blog
A Day in the Life of an Information Security Investigator
Glenn Brunette's Security Weblog
Page Not Found - ASP.NET Weblogs
BufferOverrun : Security
George Ou
Dana Epp's ramblings at the Sanctuary
Tenable Network Security
Usable Security
Eugene Bobukh's WebLog
Sorry! We couldn't find your document
The Security Blanket
1 Raindrop
Security Blog
Andreas Sterbenz's Blog
Will Cox: Security
Speaking of Security, the RSA Blog and Podcast
Infosec Potpourri
Deb Shinder's MVP Blog
Abner Stories
New Directions in Security (Comments)
Information Research
Computing Research Policy Blog
The Microsoft Security Response Center Blog
Digital ID World Editors Corner
Security Garden
Panda Research Blog
Realtime Community | IT Compliance
Carnal0wnage Blog
Service Provider Journal
The Security Mentor
Sorry! We couldn't find your document
Larry Seltzer's Security Weblog
Page Not Found - ASP.NET Weblogs
Latest Blog Entires From WebSense Security Labs
Security Soapbox
Anti Rootkit Blog
Sam Gentile
Page Not Found - ASP.NET Weblogs
MZL & Novatech Traffic & Bandwidth Statistics News
Schneier on Security
Volatile Systems
Larry Osterman's WebLog : Security
Security Fix
Fabulous Adventures In Coding : Security
Emergent Chaos
Sergey Simakov blog
Fixing Email Weblog
Harry Waldron - Microsoft MVP Blog
Pinpoint Labs Blog
Casper Dik's Weblog
The Evil Empire
ADD / XOR / ROL Blog
Network Security Blog
fes' WebLog
Liudvikas Bukys
Solution Accelerators - Security & Compliance
Anti-Malware Engineering Team
Bowulf Infosec & Network Admin Blog
Caffeinated Security
ModSecurity Blog
.NET Security Blog
Wifi Security Project
Latest Blog Entires From WebSense Security Labs
The Security Skeptic
Bkis Blog
Wired: Threat Level
Kim Cameron's Identity Weblog
Steve Lamb's Blog : How to Articles
Bill Sommerfeld's Weblog
MVP Jubo Security Blog
The WiFi Zone
Nth world commentaries
trimMail's Email Battles
Lauren Weinstein's Blog
Network Security Blog
Security Manifest
May 28, 2015

Astoria Advanced Tor Client Designed to Avoid NSA Attacks
infosec « Tag Feed

In response to the threat of intelligence agencies like NSA and GCHQ, Security researchers from Amer

Google Brillo OS New Android-based OS for Internet of Things
infosec « Tag Feed

Internet of Things is the future, and every big tech companies are trying to become an integral part

Trend Micro Discovers Apache Vulnerability that Allows One-Click Modification of Android Apps
TrendLabs | Malware Blog - by Trend Micro

Weve discovered a vulnerability in the Apache Cordova app framework that allows attackers to modify the behavior of apps just by clicking a URL. The extent of the modifications can range from causing nuisance for app users to crashing the apps completely.

May 27, 2015

Lazy Coordinated Attacks Against Old Vulnerabilities, (Fri, May 22nd)
infosec « Tag Feed

Typically we try to device attackers into different groups, all t …(more)… from SANS Int

Two Factor Authentication Challenges and new approaches for 2015
Harry Waldron - Microsoft MVP Blog


Windows 10 Security updates move to daily basis rather than once per month
Harry Waldron - Microsoft MVP Blog


Facebook Profile photo best practices to safeguard privacy
Harry Waldron - Microsoft MVP Blog


Smartphone Privacy Lookout security 2015 research report
Harry Waldron - Microsoft MVP Blog


Ransomware Locker Sleeper variant activated on May 25 2015
Harry Waldron - Microsoft MVP Blog


More Evidence of mSpy Apathy Over Breach
Krebs on Security

Mobile spyware maker mSpy has expended a great deal of energy denying and then later downplaying a breach involving data stolen from tens of thousands of mobile devices running its software. Unfortunately for victims of this breach, mSpy's lackadaisical r

Account Recovery Security Questions Not Very Secure
infosec « Tag Feed

An analysis of millions of answers to security questions show many are predictable and easily guessa

Hack Brief: Theres a New iPhone Text Message Attack
Wired: Threat Level

Hack Brief: Theres a New iPhone Text Message Attack

It turns out pranksters can crash an iPhone merely by texting it the exac

Answers on how to get started in Security
Carnal0wnage Blog

I got hit up on twitter and email about how to get started in security by someone.  The question was pretty generic and since I didn't even receive a thanks back from the guy I'm sharing it with everyone else/archiving it in case I'm asked again in t

1 in 5 experts believe artificial intelligence will pose an 'existential threat'
SophosLabs blog

A significant minority of experts working in the field of Artificial Intelligence (AI), about 18%, believe that AI will one day pose an 'existential threat' to humanity.5 tips to improve your Linux desktop security
SophosLabs blog

Linux-based operating systems aren't invulnerable. Here are five easy steps you can take to enhance your Linux security...Cyber Threat Analysis: A Call for Clarity
infosec « Tag Feed

The general public deserves less hyperbole and more straight talk from Dark Reading:

Parliamentary insiders clean up MPs' Wikipedia pages
SophosLabs blog

Gone are the sex scandals, excessive use of chauffeur driven cars, and lavish expenses used to spiff up MPs' homes.Leadership Success achieved through Lessons Learned approach
Harry Waldron - Microsoft MVP Blog


Facebook WhatsAPP may allow business messaging directly to users
Harry Waldron - Microsoft MVP Blog


Water in the Fuel Battling OWASPs' Nest
1 Raindrop

Belgium has contributed a lot to the infosec world, for example Rijndael and a great conference- SecAppDev. Plus Hercule Poirot. Its commonplace now for people to say they want to "build security in", but its worth noting that saying build security in is

IC3 urges social media users to beware: scams and fraud are surging
infosec « Tag Feed

12% of the 269,422 complaints received in 2014 had a social media aspect, be it doxing, clickjacking

Get into Infosec Europe 2015 for free, hear great talks!
SophosLabs blog

Get a free pass to Infosec Europe (2/3/4 June 2015) and stop by at our stand to say hello. Attend our free paid actors, no sales pitches and no canned product demos: we're giving educational presentations that we hope will both entertain and e

Hackers compromise 100,000 IRS tax accounts with pre-stolen data
SophosLabs blog

The Internal Revenue Service has confirmed that attackers accessed 100,000 taxpayers' accounts using personal data stolen elsewhere.Terrorist Risks by City, According to Actual Data
Schneier on Security

Windows Live ID scam targets personal information
infosec « Tag Feed

Kaspersky Lab experts are warning of a new scam that uses Windows Live ID as bait to catch personal

Phones' accelerometers allow you to be tracked on the metro
SophosLabs blog

No GPS or cell towers triangulation necessary. All it takes is learning the world's unique metro routes, then listening as phones jiggle along. Assessing The Computer Network Operation (CNO) Capabilities of the Islamic Republic of Iran - Complimentary Report
Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Brace yourselves. An excerpt from the Executive Summary: "Today's growing cyber warfare arms race, prompts for systematic, structured, andmultidisciplinary enriched processes to be utilized, in order to anticipate/neutralize andproperly attribute an a

ISC StormCast for Friday, May 22nd 2015, (Fri, May 22nd)
infosec « Tag Feed

…(more)… from SANS Internet Storm Center, InfoCON: green via IFTTT

Some notes about Wassenaar
Errata Security

So #wassenaar has infected your timeline for the past several days. I thought I'd explain what the big deal is.

What's a Wassenaar?

It's a town in Europe wh

Chrome Lure Used in Facebook Attack despite Googles New Policy
TrendLabs | Malware Blog - by Trend Micro

Just how effective is it for cybercriminals to keep using Google Chrome and Facebook to infect their victims with malware? Weve already seen both platforms be used as parts of malicious social engineering schemes. Both Google and Facebook are aware of thi

Anatomy of a LOGJAM - another TLS vulnerability, and what to do about it
infosec « Tag Feed

We’ve had BEAST, Lucky Thirteen, BREACH, BEAST, POODLE, Heartbleed and FREAK…now, it

Silk Road Prosecutors Ask Judge to Send a Message In Ulbricht Sentencing
Wired: Threat Level

Silk Road Prosecutors Ask Judge to ‘Send a Message’ In Ulbricht Sentencing

Prosecutors are determined to mak

all content is copyright its respective owner or owners.

the technology behind infosec daily is partially copyright © 2003-2008 jose nazario.