Last updated:
Thu May 28 07:23:28 2015 GMT
  2014 FIRST Annual Conference in Boston - Register now


Blogroll
Security Watch
Kasun's Weblog
Sunbelt Blog
Mark O'Neill's Radio Weblog
Page Not Found - ASP.NET Weblogs
Page Not Found - ASP.NET Weblogs
Fermats Security Alerts
cybercrime/-security sightings
CERIAS Blog
-- Sleeve notes of a sysadmin --
netstat -a
About Internet / Network Security
Kaspersky Lab Weblog
TrendLabs | Malware Blog - by Trend Micro
: 404 Not Found
Security Sauce
Crypto-World - news
Latest Analysis for All Threats
Security Notes
Security Response Weblog
Security
An Information Security Place
Wendy's Blog: Legal Tags
Security Curve Weblog
John Palfrey
BenEdelman.org
Educated Guesswork
CGISecurity.com: Your Web Site and Application Security Resource
Infosec Events
Burton Group Page Not Found
Fred Avolio's Musings
Verizonbusiness.com
Rick Kingslan - Will Hack 4 Food
Information Security News Desk
Windows Shell/User (MSN & OneCare Too)
Errata Security
Information Security News Desk
Cheap Hack
Daemon on Security
torsten's .NET blog - Security
Static in the Ether
Larry's Insecurity Blog
websecurityblog
SecuriTeam Blogs
nzight
The ICSI Networking Group Blog
GPL
Tim Rains' WebLog
-- Sleeve notes of a sysadmin --
Windows Incident Response
honeyblog
Cynical Security
MSDN: Security
Dan Anderson's Weblog
Federated Infrastructure : Security
The Antivirus Guy Blog
Paul's Down-Home Page: Exchange, messaging, collaboration, security, and more
Windows Security Logging and Other Esoterica
Latests Alerts From Websense Security Labs
Mark's Blog
Roger Thompson
The X Dot Com Inc. - 404 Wrong Page
Essential Computer Security
Kimberly L. Tripp: Improving *my* SQL skills through your questions! - Security
TaoSecurity
Andrew Carpenter
In-Security : Exploring Internet, Information and Infrastructure Security
Norwegian Honeynet Project
The Dark Visitor
Arun Perinkolam's Weblog
OSVDB Blog
Xavier's Security Post
b l o g _ m a x i m u m
Lasipalatsi
Vastly Important Notes
Page Not Found - ASP.NET Weblogs
F-Secure Antivirus Research Weblog
TheSecure.Net
Anton Chuvakin, O'Reilly Network
Internet Security with Kirk
worm blog
Compendium
Michael Howard's Web Log : Security
Alert Logic
LuFG Summerschool Applied IT Security
McAfee Avert Labs
Security and Technology for SMB's and SOHO's
Infosec Writers Latest Security Papers
blackhat for life
Aaron Margosis' "Non-Admin" WebLog
CyberSpeak's Podcast
Internet Security News and Analysis
Jim's Bloggyness
Technology Review Feed - TR Editors' Blog
Network Security
Krebs on Security
HD DVD / Randomness... : Security
The Security Skeptic
Hex blog
-- Sleeve notes of a sysadmin --
Glenn Brunette's Security Weblog
Volatility
Robert Hensing's Blog
The Importance of...
Internet Insecurity
Mal-Aware.org
GnuPG.org
Phil Windley's Technometria
Financial Cryptography
SYN|ACK
InfoWorld Gripe Line | Ed Foster
eEye Digital Security - Research Blog
Error!
Stupid Security
ADD / XOR / ROL
Dancho Danchev's Blog - Mind Streams of Information Security Knowledge
@CyberForge
Politically Motivated Computer Crime and Hacktivism
The Security Development Lifecycle
1 Raindrop
Page Not Found - ASP.NET Weblogs
404 - Not Found
mcwresearch.com
Anil John - Security
Vitalsecurity.org - A Revolution is the Solution
::PepperTech:: Security Management News Blog
PandaLabs
Security Blanket
taint.org: Justin Mason's Weblog
Spam Filtering Techniques
Open-Node.net Security Weblog
Adobe Product Security Incident Response Team (PSIRT)
Attack Research
Draft Security Blog
malwarecrawler.com
Errata Security
Thomas Shinder Blog
CyberCrime & Doing Time
DoxPara Research
NetSec
Security Fix
National Cyber Security - Blogs
weblog.cemper.com - Technology, Software Development, Project Management, Marketing News
Freedom to Tinker
infosec « WordPress.com Tag Feed
NI3
Information Manager Journal
Michael Howard's Web Log
turnipsecurity
SophosLabs blog
C.I.S.R.T.
Martin Englund's Weblog
Vulnerability Analysis Blog
Roger's Information Security Blog
OpenPacket Blog
Small Business Server
disLEXia 3000 blog
Spire Security Viewpoint
darren_moffat@blog$ cat /dev/mem | grep /dev/urandom
The Day Before Zero
OSSEC Blog
You Know What's Stupid? Everything I Don't Understand
Napsterization
e-Government@large
StillSecure, After All These Years
CERIAS Weblogs
Casper Dik's Weblog
APB Infosec blog
darren_moffat@blog$ cat /dev/mem | grep /dev/urandom
Logblog
IBM Internet Security Systems Frequency X Blog
Infothought
Matasano Chargen
A Bro Blog
Security to the Core | Arbor Networks Security Blog
Sorry! We couldn't find your document
Greyhat of the World Unite...
Esphion
When {Puffy} Meets ^RedDevil^
The Security Mentor
Solution Accelerators - Security & Compliance
ThreatFire Research Blog
A Day in the Life of an Information Security Investigator
Glenn Brunette's Security Weblog
Page Not Found - ASP.NET Weblogs
BufferOverrun : Security
George Ou
Dana Epp's ramblings at the Sanctuary
Tenable Network Security
Usable Security
Eugene Bobukh's WebLog
Sorry! We couldn't find your document
The Security Blanket
1 Raindrop
chandanlog(3C)
BlogInfoSec.com
Security Blog
Andreas Sterbenz's Blog
Will Cox: Security
Inliniac
Speaking of Security, the RSA Blog and Podcast
Infosec Potpourri
Deb Shinder's MVP Blog
Abner Stories
New Directions in Security (Comments)
Information Research
Computing Research Policy Blog
securosis.com
The Microsoft Security Response Center Blog
DISOG
Digital ID World Editors Corner
Security Garden
Panda Research Blog
Realtime Community | IT Compliance
Carnal0wnage Blog
Service Provider Journal
The Security Mentor
Ivan
Sorry! We couldn't find your document
Larry Seltzer's Security Weblog
Page Not Found - ASP.NET Weblogs
Latest Blog Entires From WebSense Security Labs
REblog
Security Soapbox
Anti Rootkit Blog
bIPlog
Sam Gentile
Page Not Found - ASP.NET Weblogs
MZL & Novatech Traffic & Bandwidth Statistics News
www.rootkit.com
Schneier on Security
Volatile Systems
Larry Osterman's WebLog : Security
Security Fix
Fabulous Adventures In Coding : Security
Emergent Chaos
Sergey Simakov blog
Fixing Email Weblog
Harry Waldron - Microsoft MVP Blog
Pinpoint Labs Blog
Casper Dik's Weblog
The Evil Empire
ADD / XOR / ROL
invulnerableit.com Blog
antlab
whattheflex
Network Security Blog
fes' WebLog
RedTeam
Liudvikas Bukys
Solution Accelerators - Security & Compliance
Anti-Malware Engineering Team
Bowulf Infosec & Network Admin Blog
Caffeinated Security
ModSecurity Blog
.NET Security Blog
Wifi Security Project
KyleM.xwell
Latest Blog Entires From WebSense Security Labs
The Security Skeptic
Bkis Blog
MoMusings@Arachnid.homeip.net
Wired: Threat Level
Kim Cameron's Identity Weblog
Steve Lamb's Blog : How to Articles
Bill Sommerfeld's Weblog
Vodun.org
MVP Jubo Security Blog
The WiFi Zone
Nth world commentaries
trimMail's Email Battles
Lauren Weinstein's Blog
Network Security Blog
Security Manifest
Cybercrime
May 28, 2015


Astoria Advanced Tor Client Designed to Avoid NSA Attacks
infosec « WordPress.com Tag Feed

In response to the threat of intelligence agencies like NSA and GCHQ, Security researchers from Amer


Google Brillo OS New Android-based OS for Internet of Things
infosec « WordPress.com Tag Feed

Internet of Things is the future, and every big tech companies are trying to become an integral part


Trend Micro Discovers Apache Vulnerability that Allows One-Click Modification of Android Apps
TrendLabs | Malware Blog - by Trend Micro

Weve discovered a vulnerability in the Apache Cordova app framework that allows attackers to modify the behavior of apps just by clicking a URL. The extent of the modifications can range from causing nuisance for app users to crashing the apps completely.

May 27, 2015


Lazy Coordinated Attacks Against Old Vulnerabilities, (Fri, May 22nd)
infosec « WordPress.com Tag Feed

Typically we try to device attackers into different groups, all t …(more)… from SANS Int


Two Factor Authentication Challenges and new approaches for 2015
Harry Waldron - Microsoft MVP Blog

[…]


Windows 10 Security updates move to daily basis rather than once per month
Harry Waldron - Microsoft MVP Blog

[…]


Facebook Profile photo best practices to safeguard privacy
Harry Waldron - Microsoft MVP Blog

[…]


Smartphone Privacy Lookout security 2015 research report
Harry Waldron - Microsoft MVP Blog

[…]


Ransomware Locker Sleeper variant activated on May 25 2015
Harry Waldron - Microsoft MVP Blog

[…]


More Evidence of mSpy Apathy Over Breach
Krebs on Security

Mobile spyware maker mSpy has expended a great deal of energy denying and then later downplaying a breach involving data stolen from tens of thousands of mobile devices running its software. Unfortunately for victims of this breach, mSpy's lackadaisical r


Account Recovery Security Questions Not Very Secure
infosec « WordPress.com Tag Feed

An analysis of millions of answers to security questions show many are predictable and easily guessa


Hack Brief: Theres a New iPhone Text Message Attack
Wired: Threat Level

Hack Brief: Theres a New iPhone Text Message Attack

It turns out pranksters can crash an iPhone merely by texting it the exac


Answers on how to get started in Security
Carnal0wnage Blog

I got hit up on twitter and email about how to get started in security by someone.  The question was pretty generic and since I didn't even receive a thanks back from the guy I'm sharing it with everyone else/archiving it in case I'm asked again in t


1 in 5 experts believe artificial intelligence will pose an 'existential threat'
SophosLabs blog

A significant minority of experts working in the field of Artificial Intelligence (AI), about 18%, believe that AI will one day pose an 'existential threat' to humanity.5 tips to improve your Linux desktop security
SophosLabs blog

Linux-based operating systems aren't invulnerable. Here are five easy steps you can take to enhance your Linux security...Cyber Threat Analysis: A Call for Clarity
infosec « WordPress.com Tag Feed

The general public deserves less hyperbole and more straight talk from Dark Reading: http://ubm.io/1


Parliamentary insiders clean up MPs' Wikipedia pages
SophosLabs blog

Gone are the sex scandals, excessive use of chauffeur driven cars, and lavish expenses used to spiff up MPs' homes.Leadership Success achieved through Lessons Learned approach
Harry Waldron - Microsoft MVP Blog

[…]


Facebook WhatsAPP may allow business messaging directly to users
Harry Waldron - Microsoft MVP Blog

[…]


Water in the Fuel Battling OWASPs' Nest
1 Raindrop

Belgium has contributed a lot to the infosec world, for example Rijndael and a great conference- SecAppDev. Plus Hercule Poirot. Its commonplace now for people to say they want to "build security in", but its worth noting that saying build security in is


IC3 urges social media users to beware: scams and fraud are surging
infosec « WordPress.com Tag Feed

12% of the 269,422 complaints received in 2014 had a social media aspect, be it doxing, clickjacking


Get into Infosec Europe 2015 for free, hear great talks!
SophosLabs blog

Get a free pass to Infosec Europe (2/3/4 June 2015) and stop by at our stand to say hello. Attend our free talks...no paid actors, no sales pitches and no canned product demos: we're giving educational presentations that we hope will both entertain and e


Hackers compromise 100,000 IRS tax accounts with pre-stolen data
SophosLabs blog

The Internal Revenue Service has confirmed that attackers accessed 100,000 taxpayers' accounts using personal data stolen elsewhere.Terrorist Risks by City, According to Actual Data
Schneier on Security


Windows Live ID scam targets personal information
infosec « WordPress.com Tag Feed

Kaspersky Lab experts are warning of a new scam that uses Windows Live ID as bait to catch personal


Phones' accelerometers allow you to be tracked on the metro
SophosLabs blog

No GPS or cell towers triangulation necessary. All it takes is learning the world's unique metro routes, then listening as phones jiggle along. Assessing The Computer Network Operation (CNO) Capabilities of the Islamic Republic of Iran - Complimentary Report
Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Brace yourselves. An excerpt from the Executive Summary: "Today's growing cyber warfare arms race, prompts for systematic, structured, andmultidisciplinary enriched processes to be utilized, in order to anticipate/neutralize andproperly attribute an a


ISC StormCast for Friday, May 22nd 2015 http://bit.ly/1AiCcgk, (Fri, May 22nd)
infosec « WordPress.com Tag Feed

…(more)… from SANS Internet Storm Center, InfoCON: green http://bit.ly/1BfbKPw via IFTTT


Some notes about Wassenaar
Errata Security

So #wassenaar has infected your timeline for the past several days. I thought I'd explain what the big deal is.

What's a Wassenaar?


It's a town in Europe wh


Chrome Lure Used in Facebook Attack despite Googles New Policy
TrendLabs | Malware Blog - by Trend Micro

Just how effective is it for cybercriminals to keep using Google Chrome and Facebook to infect their victims with malware? Weve already seen both platforms be used as parts of malicious social engineering schemes. Both Google and Facebook are aware of thi


Anatomy of a LOGJAM - another TLS vulnerability, and what to do about it
infosec « WordPress.com Tag Feed

We’ve had BEAST, Lucky Thirteen, BREACH, BEAST, POODLE, Heartbleed and FREAK…now, it


Silk Road Prosecutors Ask Judge to Send a Message In Ulbricht Sentencing
Wired: Threat Level

Silk Road Prosecutors Ask Judge to ‘Send a Message’ In Ulbricht Sentencing

Prosecutors are determined to mak


all content is copyright its respective owner or owners.

the technology behind infosec daily is partially copyright © 2003-2008 jose nazario.