Last updated:
Fri Jul 25 01:24:58 2014 GMT
  2014 FIRST Annual Conference in Boston - Register now


Blogroll
Liudvikas Bukys
Solution Accelerators - Security & Compliance
Panda Research Blog
Ivan
Fabulous Adventures In Coding : Security
cybercrime/-security sightings
Norwegian Honeynet Project
antlab
Burton Group Page Not Found
Matasano Chargen
Aaron Margosis' "Non-Admin" WebLog
darren_moffat@blog$ cat /dev/mem | grep /dev/urandom
InfoWorld Gripe Line | Ed Foster
The Importance of...
Dana Epp's ramblings at the Sanctuary
Security Blanket
Bkis Blog
Infosec Events
Draft Security Blog
Larry Osterman's WebLog : Security
Dan Anderson's Weblog
Paul's Down-Home Page: Exchange, messaging, collaboration, security, and more
www.rootkit.com
Error!
Network Security Blog
CGISecurity.com: Your Web Site and Application Security Resource
Crypto-World - news
Tenable Network Security
Network Security Blog
Inliniac
Deb Shinder's MVP Blog
fes' WebLog
Infosec Writers Latest Security Papers
DISOG
A Day in the Life of an Information Security Investigator
Hex blog
HD DVD / Randomness... : Security
Spire Security Viewpoint
Adobe Product Security Incident Response Team (PSIRT)
Greyhat of the World Unite...
e-Government@large
Latests Alerts From Websense Security Labs
You Know What's Stupid? Everything I Don't Understand
Information Security News Desk
Internet Security News and Analysis
MZL & Novatech Traffic & Bandwidth Statistics News
Page Not Found - ASP.NET Weblogs
Mark O'Neill's Radio Weblog
Carnal0wnage Blog
Jim's Bloggyness
Stupid Security
DoxPara Research
Page Not Found - ASP.NET Weblogs
Latest Blog Entires From WebSense Security Labs
The Security Mentor
Michael Howard's Web Log : Security
@CyberForge
Technology Review Feed - TR Editors' Blog
turnipsecurity
Page Not Found - ASP.NET Weblogs
ThreatFire Research Blog
Eugene Bobukh's WebLog
Federated Infrastructure : Security
Fermats Security Alerts
SecuriTeam Blogs
IBM Internet Security Systems Frequency X Blog
OSSEC Blog
Casper Dik's Weblog
Martin Englund's Weblog
Will Cox: Security
LuFG Summerschool Applied IT Security
Sergey Simakov blog
Vulnerability Analysis Blog
Security Garden
An Information Security Place
The Day Before Zero
Information Security News Desk
BufferOverrun : Security
MoMusings@Arachnid.homeip.net
Anti-Malware Engineering Team
Vastly Important Notes
Freedom to Tinker
Security
Anton Chuvakin, O'Reilly Network
: 404 Not Found
b l o g _ m a x i m u m
Emergent Chaos
Solution Accelerators - Security & Compliance
infosec « WordPress.com Tag Feed
The Microsoft Security Response Center Blog
invulnerableit.com Blog
Realtime Community | IT Compliance
Wendy's Blog: Legal Tags
.NET Security Blog
MSDN: Security
Security Curve Weblog
Nth world commentaries
Napsterization
The Evil Empire
securosis.com
Sorry! We couldn't find your document
Compendium
netstat -a
The Security Mentor
Errata Security
Robert Hensing's Blog
A Bro Blog
Schneier on Security
Andreas Sterbenz's Blog
Latest Blog Entires From WebSense Security Labs
CERIAS Blog
Static in the Ether
Phil Windley's Technometria
Xavier's Security Post
-- Sleeve notes of a sysadmin --
Daemon on Security
honeyblog
mcwresearch.com
Financial Cryptography
Roger's Information Security Blog
Volatility
chandanlog(3C)
Kim Cameron's Identity Weblog
Security Notes
Attack Research
Sunbelt Blog
Security Fix
Cheap Hack
websecurityblog
Volatile Systems
Mal-Aware.org
Security Soapbox
Page Not Found - ASP.NET Weblogs
In-Security : Exploring Internet, Information and Infrastructure Security
CyberSpeak's Podcast
Lauren Weinstein's Blog
Anil John - Security
Page Not Found - ASP.NET Weblogs
TaoSecurity
Harry Waldron - Microsoft MVP Blog
Krebs on Security
Open-Node.net Security Weblog
StillSecure, After All These Years
McAfee Avert Labs
Kasun's Weblog
Service Provider Journal
Sorry! We couldn't find your document
Latest Analysis for All Threats
ADD / XOR / ROL
Cybercrime
TrendLabs | Malware Blog - by Trend Micro
Page Not Found - ASP.NET Weblogs
ModSecurity Blog
whattheflex
Windows Security Logging and Other Esoterica
SophosLabs blog
The X Dot Com Inc. - 404 Wrong Page
Casper Dik's Weblog
The Antivirus Guy Blog
The Security Blanket
darren_moffat@blog$ cat /dev/mem | grep /dev/urandom
RedTeam
Alert Logic
Michael Howard's Web Log
Security Manifest
taint.org: Justin Mason's Weblog
Infothought
Security Blog
APB Infosec blog
Glenn Brunette's Security Weblog
Spam Filtering Techniques
Larry Seltzer's Security Weblog
nzight
Lasipalatsi
About Internet / Network Security
When {Puffy} Meets ^RedDevil^
1 Raindrop
Essential Computer Security
Security Fix
OSVDB Blog
Kimberly L. Tripp: Improving *my* SQL skills through your questions! - Security
ADD / XOR / ROL
Sam Gentile
Tim Rains' WebLog
Bill Sommerfeld's Weblog
malwarecrawler.com
The WiFi Zone
Larry's Insecurity Blog
trimMail's Email Battles
KyleM.xwell
Politically Motivated Computer Crime and Hacktivism
-- Sleeve notes of a sysadmin --
Security Response Weblog
CyberCrime & Doing Time
Page Not Found - ASP.NET Weblogs
Pinpoint Labs Blog
MVP Jubo Security Blog
New Directions in Security (Comments)
Fred Avolio's Musings
-- Sleeve notes of a sysadmin --
The Dark Visitor
Anti Rootkit Blog
Security Watch
Infosec Potpourri
Abner Stories
Educated Guesswork
TheSecure.Net
Fixing Email Weblog
Digital ID World Editors Corner
Verizonbusiness.com
Security and Technology for SMB's and SOHO's
Internet Insecurity
weblog.cemper.com - Technology, Software Development, Project Management, Marketing News
Security to the Core | Arbor Networks Security Blog
Mark's Blog
Small Business Server
worm blog
Esphion
Network Security
The ICSI Networking Group Blog
C.I.S.R.T.
NI3
NetSec
The Security Skeptic
Computing Research Policy Blog
torsten's .NET blog - Security
Sorry! We couldn't find your document
CERIAS Weblogs
GnuPG.org
The Security Development Lifecycle
Security Sauce
GPL
Usable Security
eEye Digital Security - Research Blog
Caffeinated Security
404 - Not Found
Windows Shell/User (MSN & OneCare Too)
bIPlog
Speaking of Security, the RSA Blog and Podcast
Windows Incident Response
Glenn Brunette's Security Weblog
blackhat for life
1 Raindrop
The Security Skeptic
Roger Thompson
National Cyber Security - Blogs
Andrew Carpenter
REblog
Dancho Danchev's Blog - Mind Streams of Information Security Knowledge
Information Research
OpenPacket Blog
Internet Security with Kirk
SYN|ACK
Vodun.org
Cynical Security
Thomas Shinder Blog
Logblog
Bowulf Infosec & Network Admin Blog
Vitalsecurity.org - A Revolution is the Solution
PandaLabs
disLEXia 3000 blog
Rick Kingslan - Will Hack 4 Food
Wired: Threat Level
Kaspersky Lab Weblog
Steve Lamb's Blog : How to Articles
BlogInfoSec.com
::PepperTech:: Security Management News Blog
Errata Security
Information Manager Journal
George Ou
BenEdelman.org
John Palfrey
F-Secure Antivirus Research Weblog
Wifi Security Project
Arun Perinkolam's Weblog
July 24, 2014


The Role of Smartphones in the Internet of Everything
TrendLabs | Malware Blog - by Trend Micro

Ever since the mobile boom, smartphones have become an integral part of our lives, enough that theyve become virtually indispensable in todays fast-paced world. Not only do they serve to connect us to our friends and loved ones wherever they


File system ops, testing phase 2
Windows Incident Response

As I mentioned in my previous post on this topic, there were two other tests that I wanted to conduct with respect to file system operations and the effects an


Facebook scams now lead to exploit kits
infosec « WordPress.com Tag Feed

The Facebook scam is a familiar phenomenon to every user of the popular social network, and most of


Interest for SSL and PKI on the rise
infosec « WordPress.com Tag Feed

The surge in the number of data breaches and recent security bugs such as Heartbleed has generated s


1H 2014 Spam Attacks and Trends
TrendLabs | Malware Blog - by Trend Micro

In the first half of the year, the spam volume increased by 60% compared to the data last 1H 2013. We can attribute these to several factors: the prevalence of DOWNAD and the steady boom of malware-related emails with spam-sending capabilities (such as MY


500,000-per-day SMS spammer gets just 4,000 fine
infosec « WordPress.com Tag Feed

An Indian call-centre operator has been fined by a London court for breaching Data Protection laws,


Trio of Flaws Found in OleumTech Wireless Monitoring System
infosec « WordPress.com Tag Feed

Researchers have identified several remotely exploitable vulnerabilities in a wireless remote monito


How Hackers Hid a Money-Mining Botnet in Amazons Cloud
Wired: Threat Level

Hackers have long used malware to enslave armies of unwitting PCs, but security researchers Rob Ragan and Oscar Salazar had a different thought: Why steal computing power from innocent victims when theres so much free processing power out there for


eBay's StubHub ransacked for over $1 million, international crime ring arrested
SophosLabs blog

US police have indicted six people across four countries on charges of defrauding eBay's StubHub for over $1 million in pilfered tickets for things like Jay-Z and Justin Timberlake concerts. eBay says its servers weren't broken into; rather, password reus


Hacker claims breach of Wall Street Journal and Vice
SophosLabs blog

W0rm's been quite busy and has already pulled this on CNET, and likewise is again offering to sell user data and server credentials for one Bitcoin.


Android app market pirates busted by FBI
SophosLabs blog

Six Americans charged with large-scale piracy of Android apps. But what about their "customers"? Is there really an increased risk of malware from unlawfully acquired apps?


How Nigerian cyber criminals have evolved
infosec « WordPress.com Tag Feed

Cyber criminals in Nigeria have evolved common malware campaigns to infiltrate businesses that have


Diving Deep into Mayhem
F-Secure Antivirus Research Weblog

Malware targeting Linux servers has been increasingly hitting the headlines over the past year. In this post we will present research on an advanced and highly versatile malware operation targeting Linux and FreeBSD servers. We have named the malware fami


New search engine Indexeus unmasks malicious hackers
infosec « WordPress.com Tag Feed

Indexeus is a database of stolen names and passwords, many doxed from the hackers whove thems

July 23, 2014


http://www.symantec.com/connect/blogs/fake-us-anti-spam-law-used-latest-phishing-campaign
None


SSCC 157 - Routers, Browsers, Zombies and Sysadmins [PODCAST]
SophosLabs blog

Here it is...this week's Chet Chat security podcast. In this episode: fixing routers, trusting browsers, killing zombies and showing TLC to sysadmins. [Honeypot Alert] Wordpress XML-RPC Brute Force Scanning
ModSecurity Blog

There are news reports of new Wordpress XML-PRC brute force attacks being seen in the wild. The SANS Internet Storm Center also has a Diary entry showing similar data. We have captured similar attacks in our web honeypots so we wanted to share more data w


Undocumented iOS Features left Hidden Backdoors Open in 600 Million Apple Devices
infosec « WordPress.com Tag Feed

from The Hacker News http://bit.ly/1sJcj3N via IFTTT


Security Reviews: The Heuristics Zoo, Part 1/2
Eugene Bobukh's WebLog


Smart Grid Attack Scenarios
TrendLabs | Malware Blog - by Trend Micro

This is the third (and last) in a series of posts looking at the threats surrounding smart grids and smart meters. In the first post, we introduced smart meters, smart grids, and showed why these can pose risks. In the second post, we looked at the risks


Whitepaper: BYOD security that works
infosec « WordPress.com Tag Feed

Today’s emerging security technologies for cloud and mobile give IT organizations more control


Everything can be a bomb
Errata Security

Security Vulnerability in the Tails OS
Schneier on Security


Feds: Hackers Ran Concert Ticket Racket
Krebs on Security

A Russian man detained in Spain is facing extradition to the United States on charges of running an international cyber crime ring that allegedly stole more than $10 million in electronic tickets from e-tickets vendor StubHub.


IBM Fixes Code Execution, Cookie-Stealing Vulnerabilities in Switches
infosec « WordPress.com Tag Feed

IBM recently patched a handful of vulnerabilities in some of its KVM switches that if exploited, cou


Google given 18 months to change its handling of user data
SophosLabs blog

The Italian Data Protection Commissioner has given Google 18 months to change the way it treats and stores user data.Russia adopts restrictive changes to its data privacy law - Lexology (registration)
infosec « WordPress.com Tag Feed

Russia adopts restrictive changes to its data privacy lawLexology (registration)Most of all, it is s


How Thieves Can Hack and Disable Your Home Alarm System
Wired: Threat Level

When it comes to the security of the Internet of Things, a lot of the attention has focused on the dangers of the connected toaster, fridge and thermostat. But a more insidious security threat lies with devices that aren’t even on the internet: wire


"Rickmote" box Rickrolls Chromecast, forcibly earworms hapless victims
SophosLabs blog

Never gonna give you up, Never gonna let you down, Never gonna run around and desert you.Car hackers build anti-car-hacking gadget
SophosLabs blog

Besides yet more white-knuckled car-jacking stunts, security researchers Charlie Miller and Chris Valasek also plan to unveil at next month's Black Hat conference a prototype device meant to foil the type of hacks they've been throwing at cars.


Firefox 31 has arrived - 11 bulletins, 3 critical, 0 visual surprises
SophosLabs blog

Firefox 31 is out. So is its updated conservative older brother, the Extended Support Release, now at 24.7. And Firefox's email-oriented cousin Thunderbird gets updated, too.iSpy? Researcher exposes backdoor in iPhones and iPads
SophosLabs blog

A "backdoor" that Apple built into iOS for developers can be used to spy on iPhones and iPads by governments, law enforcement, or cyber criminals, according to forensics researcher Jonathan Zdziarski. EFF invites hackers to test, secure its Open Wireless Router
infosec « WordPress.com Tag Feed

The Electronic Frontier Foundation (EFF) has released Open Wireless Router, an experimental alpha re


on trust, Trust, trusted, trustworthy and other words of power
Financial Cryptography

Follows is the clearest exposition of the doublethink surrounding the word 'trust' that I've seen so far. This post by Jerry Leichter on Crypto list doesn't actually solve the definitional issue, but it does map out the minefield nicely. Trustworthy? On J


PhoneWatch office in Kilkenny creates 15 jobs - Siliconrepublic.com
infosec « WordPress.com Tag Feed

Siliconrepublic.com PhoneWatch office in Kilkenny creates 15 jobsSiliconrepublic.comsiliconrepublic.


all content is copyright its respective owner or owners.

the technology behind infosec daily is partially copyright © 2003-2008 jose nazario.