Last updated:
Thu Oct 23 07:23:39 2014 GMT
  2014 FIRST Annual Conference in Boston - Register now


Blogroll
Information Security News Desk
Stupid Security
Security Sauce
netstat -a
Kimberly L. Tripp: Improving *my* SQL skills through your questions! - Security
bIPlog
NetSec
Security Curve Weblog
cybercrime/-security sightings
The ICSI Networking Group Blog
infosec « WordPress.com Tag Feed
The Dark Visitor
Errata Security
Nth world commentaries
Steve Lamb's Blog : How to Articles
GPL
blackhat for life
Page Not Found - ASP.NET Weblogs
MVP Jubo Security Blog
eEye Digital Security - Research Blog
The Security Mentor
Internet Security with Kirk
Roger Thompson
CERIAS Blog
Martin Englund's Weblog
Vulnerability Analysis Blog
GnuPG.org
Rick Kingslan - Will Hack 4 Food
Paul's Down-Home Page: Exchange, messaging, collaboration, security, and more
Bill Sommerfeld's Weblog
ThreatFire Research Blog
Daemon on Security
Emergent Chaos
Sorry! We couldn't find your document
antlab
F-Secure Antivirus Research Weblog
.NET Security Blog
Security Notes
Robert Hensing's Blog
The Microsoft Security Response Center Blog
Essential Computer Security
Solution Accelerators - Security & Compliance
Anil John - Security
Sergey Simakov blog
turnipsecurity
Page Not Found - ASP.NET Weblogs
Educated Guesswork
Alert Logic
Attack Research
Vodun.org
Page Not Found - ASP.NET Weblogs
Information Manager Journal
In-Security : Exploring Internet, Information and Infrastructure Security
John Palfrey
StillSecure, After All These Years
Mark's Blog
Network Security Blog
Error!
LuFG Summerschool Applied IT Security
OpenPacket Blog
torsten's .NET blog - Security
Infothought
Sorry! We couldn't find your document
Aaron Margosis' "Non-Admin" WebLog
Mark O'Neill's Radio Weblog
Greyhat of the World Unite...
Page Not Found - ASP.NET Weblogs
Usable Security
Security Soapbox
weblog.cemper.com - Technology, Software Development, Project Management, Marketing News
www.rootkit.com
Federated Infrastructure : Security
REblog
Security Fix
CERIAS Weblogs
Glenn Brunette's Security Weblog
darren_moffat@blog$ cat /dev/mem | grep /dev/urandom
Will Cox: Security
Anton Chuvakin, O'Reilly Network
honeyblog
CyberSpeak's Podcast
The Day Before Zero
Kim Cameron's Identity Weblog
The Security Mentor
Larry Osterman's WebLog : Security
NI3
Tenable Network Security
invulnerableit.com Blog
About Internet / Network Security
Panda Research Blog
OSVDB Blog
fes' WebLog
SYN|ACK
SophosLabs blog
Deb Shinder's MVP Blog
Security Blog
whattheflex
Wendy's Blog: Legal Tags
Napsterization
Wired: Threat Level
TaoSecurity
Andrew Carpenter
IBM Internet Security Systems Frequency X Blog
Internet Security News and Analysis
Security Watch
malwarecrawler.com
Dana Epp's ramblings at the Sanctuary
Liudvikas Bukys
nzight
The Security Skeptic
Spam Filtering Techniques
Norwegian Honeynet Project
Larry Seltzer's Security Weblog
Latest Blog Entires From WebSense Security Labs
BufferOverrun : Security
BlogInfoSec.com
worm blog
Realtime Community | IT Compliance
Network Security
Pinpoint Labs Blog
Hex blog
SecuriTeam Blogs
Compendium
Security Fix
Bkis Blog
PandaLabs
-- Sleeve notes of a sysadmin --
Phil Windley's Technometria
Security Response Weblog
CGISecurity.com: Your Web Site and Application Security Resource
The Security Blanket
Service Provider Journal
Cybercrime
Matasano Chargen
Lauren Weinstein's Blog
Vitalsecurity.org - A Revolution is the Solution
b l o g _ m a x i m u m
C.I.S.R.T.
The Evil Empire
ADD / XOR / ROL
Latest Blog Entires From WebSense Security Labs
Infosec Writers Latest Security Papers
APB Infosec blog
Krebs on Security
Jim's Bloggyness
Financial Cryptography
Ivan
InfoWorld Gripe Line | Ed Foster
Computing Research Policy Blog
Security Garden
Vastly Important Notes
KyleM.xwell
Freedom to Tinker
Andreas Sterbenz's Blog
trimMail's Email Battles
disLEXia 3000 blog
New Directions in Security (Comments)
Cynical Security
Fabulous Adventures In Coding : Security
Esphion
Page Not Found - ASP.NET Weblogs
1 Raindrop
Anti-Malware Engineering Team
Infosec Potpourri
Digital ID World Editors Corner
Volatile Systems
Inliniac
::PepperTech:: Security Management News Blog
Fermats Security Alerts
Crypto-World - news
Internet Insecurity
Michael Howard's Web Log
An Information Security Place
The X Dot Com Inc. - 404 Wrong Page
MZL & Novatech Traffic & Bandwidth Statistics News
Page Not Found - ASP.NET Weblogs
404 - Not Found
Open-Node.net Security Weblog
Bowulf Infosec & Network Admin Blog
Errata Security
CyberCrime & Doing Time
Speaking of Security, the RSA Blog and Podcast
-- Sleeve notes of a sysadmin --
MoMusings@Arachnid.homeip.net
: 404 Not Found
Windows Shell/User (MSN & OneCare Too)
Technology Review Feed - TR Editors' Blog
Verizonbusiness.com
Fixing Email Weblog
Adobe Product Security Incident Response Team (PSIRT)
mcwresearch.com
ModSecurity Blog
taint.org: Justin Mason's Weblog
ADD / XOR / ROL
chandanlog(3C)
Latests Alerts From Websense Security Labs
Anti Rootkit Blog
Information Security News Desk
Burton Group Page Not Found
darren_moffat@blog$ cat /dev/mem | grep /dev/urandom
Lasipalatsi
Sunbelt Blog
TrendLabs | Malware Blog - by Trend Micro
Casper Dik's Weblog
Security
Tim Rains' WebLog
Small Business Server
Windows Security Logging and Other Esoterica
Glenn Brunette's Security Weblog
Larry's Insecurity Blog
Roger's Information Security Blog
McAfee Avert Labs
The Security Development Lifecycle
Fred Avolio's Musings
MSDN: Security
Carnal0wnage Blog
National Cyber Security - Blogs
-- Sleeve notes of a sysadmin --
OSSEC Blog
Harry Waldron - Microsoft MVP Blog
Security to the Core | Arbor Networks Security Blog
websecurityblog
Kasun's Weblog
Thomas Shinder Blog
Eugene Bobukh's WebLog
Sam Gentile
HD DVD / Randomness... : Security
When {Puffy} Meets ^RedDevil^
Draft Security Blog
You Know What's Stupid? Everything I Don't Understand
Cheap Hack
Security Manifest
Volatility
The Importance of...
Solution Accelerators - Security & Compliance
Network Security Blog
Casper Dik's Weblog
The Security Skeptic
The Antivirus Guy Blog
Schneier on Security
Kaspersky Lab Weblog
Sorry! We couldn't find your document
e-Government@large
Logblog
Static in the Ether
Wifi Security Project
Abner Stories
Infosec Events
Politically Motivated Computer Crime and Hacktivism
Xavier's Security Post
A Day in the Life of an Information Security Investigator
securosis.com
A Bro Blog
Spire Security Viewpoint
DISOG
Michael Howard's Web Log : Security
Arun Perinkolam's Weblog
Security Blanket
Page Not Found - ASP.NET Weblogs
The WiFi Zone
Security and Technology for SMB's and SOHO's
Dan Anderson's Weblog
Latest Analysis for All Threats
George Ou
TheSecure.Net
DoxPara Research
1 Raindrop
Mal-Aware.org
@CyberForge
Information Research
Dancho Danchev's Blog - Mind Streams of Information Security Knowledge
BenEdelman.org
RedTeam
Windows Incident Response
Caffeinated Security
October 23, 2014


Data protection may be stumbling block for guidance guarantee - Money Marketing
infosec « WordPress.com Tag Feed

Money Marketing Data protection may be stumbling block for guidance guaranteeMoney MarketingHe adds:


Cloud adoption trends in European organizations
infosec « WordPress.com Tag Feed

In Europe, the number of cloud services in use by the average company increased 23 percent, rising f


Named Top 50 InfoSec Blogs You Should Be Reading
Roger's Information Security Blog

DigitalGuardian has named this blog as one of the Top 50 Infosec Blogs you should be reading. DigitalGuardianbyVerdasys offers an interesting solution in the DLP area as well asadvanced threat protection. Definitely worth checking out. The post

October 22, 2014


Online Harassment Prevalent, Often by Strangers, Pew Study Finds
You Know What's Stupid? Everything I Don't Understand

Date published: 
Bitcoin may be volatile but has value beyond price point
You Know What's Stupid? Everything I Don't Understand

Date published: 
FUSION Rise Up Conference
You Know What's Stupid? Everything I Don't Understand


New CVE-2014-4114 Attacks Seen One Week After Fix
TrendLabs | Malware Blog - by Trend Micro

Despite the availability of fixes related to the Sandworm vulnerability (CVE-2014-4114), we are still seeing new attacks related to this flaw. These attacks contain a new routine that could prevent detection. A New Evasion Technique In our analysis of the


Last Call: Open Memory Forensics Workshop 2014
Volatility

As previously mentioned, the registration for the Open Memory Forensics Workshop (OMFW) 2014 closes on Oct 24. If you are interested in attending, there are a few seat remaining. Examples


RegRipper v2.8 is now on GitHub
Windows Incident Response

Ireland tops leader board during Europe Code Week - Siliconrepublic.com
infosec « WordPress.com Tag Feed

Siliconrepublic.com Ireland tops leader board during Europe Code WeekSiliconrepublic.comSkip Navigat


FBI Study over 500,000,000 accounts exposed in past 12 months
Harry Waldron - Microsoft MVP Blog

[…]


Wanted: Testers For The Greatest Android App Ever
F-Secure Antivirus Research Weblog

Okay… so the greatest Android app "ever" is a bit of friendly hyperbole. But still, it's a really is a great app. What app? Well, F-Secure Freedome of course (currently available for http://www.symantec.com/connect/blogs/attackers-circumvent-patch-windows-sandworm-vulnerability
None


BSidesDC 2014 Wrap Up
infosec « WordPress.com Tag Feed

BSidesDC holds a special place for me as I am one of the organizers of the conference. This year I s


Physicists build 'Holy Grail' tractor beam - Siliconrepublic.com
infosec « WordPress.com Tag Feed

Siliconrepublic.com Physicists build ‘Holy Grail’ tractor beamSiliconrepublic.comSkip Na


Google Accounts Now Support Security Keys
Krebs on Security

People who use Gmail and other Google services now have an extra layer of security available when logging into Google accounts. The company today incorporated into these services the open Universal 2nd Factor (U2F) standard, a physical USB-based second fa


How to Stop Apple From Snooping on Your OS X Yosemite Searches
infosec « WordPress.com Tag Feed

Apple’s latest operating system OS X Yosemite pushes the limits of data collection tolerance:


This Fake Log Jams Your Phone So Youll Shut Up andEnjoy Nature
Wired: Threat Level

This Fake Log Jams Your Phone So You’ll Shut Up andEnjoy Nature

The Log Jammer blends into a natural setting to cut off that constant remot


Woman charged with planting spyware on cop's phone
SophosLabs blog

A woman has been charged after eavesdropping on "sensitive law enforcement communications" by tapping the mobile phone of her police officer ex.OS X Yosemite Wi-Fi problems - can you help us solve them?
SophosLabs blog

Most early adopters of OS X Yosemite are enjoying a refreshingly clean new look with a bunch of updated applications. But for a few, it's a Wi-Fi network merry-go-round...Operation Pawn Storm: The Red in SEDNIT
TrendLabs | Malware Blog - by Trend Micro

Pawn Stormis an active economic and political cyber-espionage operation targeting a wide range of entities, mostly those related to the military, governments, andmedia. Specific targets include: Military agencies, embassies, and defense contractors in the


Hackers make companies' phones call premium-rate numbers, earn billions
infosec « WordPress.com Tag Feed

Attackers hacking into companies’ phone network, using it to place mass phone calls to premium


Is your phone line a '6-figure liability waiting to happen'?
SophosLabs blog

Premium-rate service scams are sticking businesses - particularly small ones using local carriers - with outrageous phone bills, to the tune of $4.73 billion globally for 2013. Many businesses aren't even aware that they can be stuck paying the bill (or f


Netflix forges video entertainment partnership with Vodafone - Siliconrepublic.com
infosec « WordPress.com Tag Feed

Siliconrepublic.com Netflix forges video entertainment partnership with VodafoneSiliconrepublic.comS


Interview on "Taste of Premier" about Security Guidance for Windows 8.1, Windows Server 2012 R2 and IE 11
Solution Accelerators - Security & Compliance


Microsoft Windows Hit By New Zero-Day Attack
TrendLabs | Malware Blog - by Trend Micro

Microsoft has disclosed that anew zero-day vulnerability is present in Windows, and is exploited via Microsoft Office files. According to Microsoft Security Advistory 3010060, the vulnerability is present in all supported versions of Windows except Window


Attitude, Knowledge, Opinion and Expertise; an information security career map?
infosec « WordPress.com Tag Feed

I was talking to one of my colleagues a few days ago who joined our team a little under a year ago.


TorrentLocker Run Hits Italian Targets
TrendLabs | Malware Blog - by Trend Micro

We recently observed a new ransomware variant, TorrentLocker, that was targeted at nearly 4,000 Italian organizations and enterprises. TorrentLocker is similar to an earlier ransomware family (CryptoLocker), and alsoencrypts various files and forces users


all content is copyright its respective owner or owners.

the technology behind infosec daily is partially copyright © 2003-2008 jose nazario.