Sunday, January 11, 2009
Around The Horn vol.1,6
Alerts
10:31 PM (11 hours ago)
The Frustration of Phishing Attacks, (Sun, Jan 11th)
from SANS Internet Storm Center, InfoCON: green
Normal 0 false false false EN-US X-NONE ...(more)...
Security News
11:29 PM (10 hours ago)
Atheros Turns Cell Phone Into Access Point
from PC World Latest Technology News
Chip maker Atheros is working on a technology that will be able to turn a mobile phone into an access point.
Jan 10, 2009 (18 hours ago)
Microsoft Makes Windows 7 Beta Available
from PC World Latest Technology News
Microsoft has made the Windows 7 beta available for download SaturdayMicrosoft has made the Windows 7 beta available for...
Jan 6, 2009 (5 days ago)
Twitter Hacker Says Admin Password Was 'Happiness'
from Wired Top Stories by Kim Zetter
In an interview with Wired.com, an 18-year-old hacker with a history of celebrity pranks admits to Monday's hijacking of multiple high-profile Twitter accounts, including President-Elect Barack Obama's and the official feed for Fox News.
-- Aurora Report says sleeping in is good, finally a day of rest.
Subscribe to:
Post Comments (Atom)
My Blog List
-
-
'Outer Range' Season 2 on Prime Video: Release Date and Time - CNET - Josh Brolin stars as Wyoming rancher Royal Abbott in season 2 of the sci-fi series.4 hours ago
-
'Outer Range' Season 2 on Prime Video: Release Date and Time - CNET - Josh Brolin stars as Wyoming rancher Royal Abbott in season 2 of the sci-fi series.4 hours ago
-
'Cyberattack' shutters Christie's website days before $840M art mega-auction - Going once, going twice, going offline Christie's website remains offline as of Monday after a "technology security issue" shut it down Thursday night – j...9 hours ago
-
How Did Authorities Identify the Alleged Lockbit Boss? - Last week, the United States joined the U.K. and Australia in sanctioning and charging a Russian man named Dmitry Yuryevich Khoroshev as the leader of the ...17 hours ago
-
Anybody knows that this URL is about? Maybe Balena API request?, (Wed, Feb 7th) - Yesterday, I noticed a new URL in our honeypots: /v5/device/heartbeat. But I have no idea what this URL may be associated with. Based on some googleing, I ...3 months ago
-
Best EDR Of The Market (BEOTM) – Endpoint Detection and Response Testing Tool - BestEDROfTheMarket is a naive user-mode EDR (Endpoint Detection and Response) tool designed to serve as a testing ground4 months ago
-
My Last Email with W. Richard Stevens - In the fall of 1998 I joined the AFCERT. I became acquainted with the amazing book *TCP/IP Illustrated, Volume 1: The Protocols* by W. Richard Stevens...10 months ago
-
Comic for March 12, 2023 - Dilbert readers - Please visit Dilbert.com to read this feature. Due to changes with our feeds, we are now making this RSS feed a link to Dilbert.com.1 year ago
-
87% of Container Images in Production Have Critical or High-Severity Vulnerabilities - At the inaugural CloudNativeSecurityCon, DevSecOps practitioners discussed how to shore up the software supply chain.1 year ago
-
Vulnerability Summary for the Week of November 29, 2021 - Original release date: December 6, 2021 High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source & Patch Info abb -- rtu50...2 years ago
-
AA21-336A: APT Actors Exploiting CVE-2021-44077 in Zoho ManageEngine ServiceDesk Plus - Original release date: December 2, 2021 Summary *This joint Cybersecurity Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (AT...2 years ago
-
20 years of CGISecurity: What appsec looked like in the year 2000 - Just realized that 20 years have passed since I started this site to learn more about web security threats. What 'appsec' looked like in 2000 OWASP didn't ...3 years ago
-
Ransomware: Why one city chose to the pay the ransom after falling victim - Posted by InfoSec News on Aug 12 https://www.zdnet.com/article/ransomware-why-one-city-chose-to-the-pay-the-ransom-after-falling-victim/ By Danny Palmer Z...3 years ago
-
What the newly released Checkra1n jailbreak means for iDevice security - There are reasons to embrace it. There are reasons to be wary of it. Here's the breakdown.4 years ago
-
Privacy and Mobile Device Apps - Original release date: July 9, 2019 | Last revised: November 15, 2019 What are the risks associated with mobile device apps? Applications (apps) on your sm...4 years ago
-
44CON 2018 - 12th-14th September, London (UK) - Posted by Steve on Feb 28 44CON 2018 is the UK's best annual Security Conference and Training event. The conference spans 2.5 days with training on the 1...6 years ago
-
Cryptopp Crypto++ 5.6.4 octets Remote Code Execution Vulnerability - Crypto++ (aka cryptopp and libcrypto++) 5.6.4 contained a bug in its ASN.1 BER decoding routine. The library will allocate a memory block based on the leng...6 years ago
-
V2V Communications security considerations - The future of vehicles, road infrastructure and driving are changing. We are progressing with vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) ...7 years ago
-
vTech – ignorance is no defence (and neither are weasel words) - This morning, Troy Hunt published a blog post alerting to a recent change in the Terms & Conditions published by children’s toy manufacturer vTech. The cha...8 years ago
-
DOJ probing claims U.S. drug agency 'collaborated' with NSA on intelligence - The U.S. Justice Dept. said it was "looking into the issues" raised by an Reuters story, that one of its law enforcement agencies collaborated with the NSA...10 years ago
-
-
-
-
-
-
-
-
-
No comments:
Post a Comment