Last updated:
Fri Oct 31 13:23:30 2014 GMT
  2014 FIRST Annual Conference in Boston - Register now


Blogroll
Deb Shinder's MVP Blog
InfoWorld Gripe Line | Ed Foster
Larry Osterman's WebLog : Security
New Directions in Security (Comments)
Vodun.org
Sunbelt Blog
Vulnerability Analysis Blog
Page Not Found - ASP.NET Weblogs
Bill Sommerfeld's Weblog
Cynical Security
CyberSpeak's Podcast
Sorry! We couldn't find your document
Steve Lamb's Blog : How to Articles
weblog.cemper.com - Technology, Software Development, Project Management, Marketing News
disLEXia 3000 blog
Roger Thompson
Security Garden
The WiFi Zone
Mark's Blog
Jim's Bloggyness
worm blog
Eugene Bobukh's WebLog
NI3
Vastly Important Notes
The X Dot Com Inc. - 404 Wrong Page
Page Not Found - ASP.NET Weblogs
Infosec Events
Glenn Brunette's Security Weblog
www.rootkit.com
Larry's Insecurity Blog
CGISecurity.com: Your Web Site and Application Security Resource
Page Not Found - ASP.NET Weblogs
Xavier's Security Post
Anil John - Security
Wifi Security Project
SYN|ACK
Michael Howard's Web Log : Security
CyberCrime & Doing Time
ModSecurity Blog
chandanlog(3C)
KyleM.xwell
Panda Research Blog
taint.org: Justin Mason's Weblog
Windows Shell/User (MSN & OneCare Too)
Martin Englund's Weblog
The Dark Visitor
HD DVD / Randomness... : Security
IBM Internet Security Systems Frequency X Blog
Cybercrime
Adobe Product Security Incident Response Team (PSIRT)
Tim Rains' WebLog
REblog
Kimberly L. Tripp: Improving *my* SQL skills through your questions! - Security
Carnal0wnage Blog
Rick Kingslan - Will Hack 4 Food
Latest Blog Entires From WebSense Security Labs
Page Not Found - ASP.NET Weblogs
Caffeinated Security
The Importance of...
Robert Hensing's Blog
Compendium
SophosLabs blog
Casper Dik's Weblog
Liudvikas Bukys
Thomas Shinder Blog
Internet Security News and Analysis
torsten's .NET blog - Security
Network Security Blog
Fabulous Adventures In Coding : Security
BlogInfoSec.com
Lauren Weinstein's Blog
About Internet / Network Security
Network Security
Internet Insecurity
b l o g _ m a x i m u m
Small Business Server
PandaLabs
Security Fix
OSSEC Blog
Infosec Writers Latest Security Papers
Security Sauce
Internet Security with Kirk
You Know What's Stupid? Everything I Don't Understand
MSDN: Security
Security Curve Weblog
Volatility
Speaking of Security, the RSA Blog and Podcast
Politically Motivated Computer Crime and Hacktivism
nzight
Error!
John Palfrey
The Evil Empire
Logblog
netstat -a
Vitalsecurity.org - A Revolution is the Solution
StillSecure, After All These Years
websecurityblog
Aaron Margosis' "Non-Admin" WebLog
-- Sleeve notes of a sysadmin --
Freedom to Tinker
Norwegian Honeynet Project
Larry Seltzer's Security Weblog
Security
Glenn Brunette's Security Weblog
The Security Skeptic
Technology Review Feed - TR Editors' Blog
ADD / XOR / ROL
e-Government@large
Realtime Community | IT Compliance
The Antivirus Guy Blog
The Security Mentor
BufferOverrun : Security
Verizonbusiness.com
Federated Infrastructure : Security
-- Sleeve notes of a sysadmin --
The Day Before Zero
Mark O'Neill's Radio Weblog
CERIAS Weblogs
Fred Avolio's Musings
Page Not Found - ASP.NET Weblogs
A Day in the Life of an Information Security Investigator
securosis.com
In-Security : Exploring Internet, Information and Infrastructure Security
Will Cox: Security
Latests Alerts From Websense Security Labs
Security Soapbox
malwarecrawler.com
cybercrime/-security sightings
blackhat for life
TaoSecurity
Lasipalatsi
The Microsoft Security Response Center Blog
1 Raindrop
Information Research
Greyhat of the World Unite...
OpenPacket Blog
darren_moffat@blog$ cat /dev/mem | grep /dev/urandom
TrendLabs | Malware Blog - by Trend Micro
honeyblog
APB Infosec blog
Sorry! We couldn't find your document
Infosec Potpourri
Stupid Security
Page Not Found - ASP.NET Weblogs
TheSecure.Net
MoMusings@Arachnid.homeip.net
BenEdelman.org
Wendy's Blog: Legal Tags
GPL
bIPlog
Bkis Blog
OSVDB Blog
mcwresearch.com
Spire Security Viewpoint
SecuriTeam Blogs
Information Security News Desk
Alert Logic
Draft Security Blog
National Cyber Security - Blogs
Arun Perinkolam's Weblog
Dana Epp's ramblings at the Sanctuary
NetSec
whattheflex
Emergent Chaos
Security Notes
Infothought
C.I.S.R.T.
Errata Security
infosec « WordPress.com Tag Feed
Cheap Hack
Security Blanket
trimMail's Email Battles
Tenable Network Security
eEye Digital Security - Research Blog
Educated Guesswork
DoxPara Research
Security to the Core | Arbor Networks Security Blog
.NET Security Blog
Paul's Down-Home Page: Exchange, messaging, collaboration, security, and more
@CyberForge
Latest Analysis for All Threats
Michael Howard's Web Log
Solution Accelerators - Security & Compliance
Anti-Malware Engineering Team
Abner Stories
The Security Development Lifecycle
Kaspersky Lab Weblog
Essential Computer Security
Information Manager Journal
Service Provider Journal
Burton Group Page Not Found
Kasun's Weblog
Information Security News Desk
Roger's Information Security Blog
Latest Blog Entires From WebSense Security Labs
LuFG Summerschool Applied IT Security
Page Not Found - ASP.NET Weblogs
Ivan
Daemon on Security
Windows Security Logging and Other Esoterica
An Information Security Place
Sorry! We couldn't find your document
Security Watch
::PepperTech:: Security Management News Blog
darren_moffat@blog$ cat /dev/mem | grep /dev/urandom
Dancho Danchev's Blog - Mind Streams of Information Security Knowledge
The Security Blanket
Fermats Security Alerts
GnuPG.org
The Security Mentor
Usable Security
Matasano Chargen
McAfee Avert Labs
Open-Node.net Security Weblog
MVP Jubo Security Blog
turnipsecurity
Andreas Sterbenz's Blog
Financial Cryptography
Napsterization
Anton Chuvakin, O'Reilly Network
When {Puffy} Meets ^RedDevil^
Computing Research Policy Blog
antlab
Mal-Aware.org
Inliniac
Hex blog
RedTeam
Errata Security
F-Secure Antivirus Research Weblog
Fixing Email Weblog
: 404 Not Found
Security Response Weblog
Windows Incident Response
Static in the Ether
George Ou
Network Security Blog
Anti Rootkit Blog
A Bro Blog
Harry Waldron - Microsoft MVP Blog
Security Manifest
Security Fix
Sergey Simakov blog
Pinpoint Labs Blog
Security and Technology for SMB's and SOHO's
invulnerableit.com Blog
MZL & Novatech Traffic & Bandwidth Statistics News
Andrew Carpenter
Bowulf Infosec & Network Admin Blog
ThreatFire Research Blog
Esphion
Wired: Threat Level
The ICSI Networking Group Blog
CERIAS Blog
Casper Dik's Weblog
ADD / XOR / ROL
Volatile Systems
-- Sleeve notes of a sysadmin --
Attack Research
Sam Gentile
404 - Not Found
Digital ID World Editors Corner
Solution Accelerators - Security & Compliance
Security Blog
Phil Windley's Technometria
Schneier on Security
Kim Cameron's Identity Weblog
fes' WebLog
Dan Anderson's Weblog
DISOG
The Security Skeptic
Nth world commentaries
1 Raindrop
Spam Filtering Techniques
Crypto-World - news
Krebs on Security
October 31, 2014


Infographic: The Many Faces of Today's Hackers
infosec « WordPress.com Tag Feed

How many of these hacker personas are you dueling with in your organization? from Dark Reading: http


CurrentC gets user email addresses pickpocketed
SophosLabs blog

CurrentC is a competitor to Apple Pay and Google Wallet. Should we worry about it getting its fingers into our bank accounts, given the recent data breach?


How bots and zombies work, and why you should care
SophosLabs blog

You probably have a firewall that blocks inbound network connections by default. So how come cybercrooks can send commands to your computer if it's infected with a bot or zombie?


Don't wear your Google Glass or other wearables when watching a movie
SophosLabs blog

Two trade groups have officially adopted a zero-tolerance policy against all wearable recording devices being on during showtime.


Forget trick-or-treating Kill a Zombie this Halloween
SophosLabs blog

The crooks can't have a botnet without the bots to join it. So let's take their bots away! Killing computer zombies is the perfect sort of altruism: you help the global internet community simply by helping yourself.


Setting HoneyTraps with ModSecurity: Adding Fake Cookies
ModSecurity Blog

This blog post continues with the topic of setting "HoneyTraps" within your web applications to catch attackers. Please review the previous posts for more examples: Project Honeypot Integration Unused Web Ports Adding Fake robots.txt Entries Adding Fake H


Orgs choose network performance over security
infosec « WordPress.com Tag Feed

An alarming number of organizations are disabling advanced firewall features in order to avoid signi


How to Tell Data Leaks from Publicity Stunts
infosec « WordPress.com Tag Feed

In an era when new consumer data breaches are disclosed daily, fake claims about data leaks are sadl


Hacking Trademarks for Free Culture
You Know What's Stupid? Everything I Don't Understand

October 30, 2014


Chip & PIN vs. Chip & Signature
Krebs on Security

The Obama administration recently issued an executive order requiring that federal agencies migrate to more secure chip-and-PIN based credit cards for all federal employees that are issued payment cards. The move marks a departure from the far more preval


Over one-third of all enterprise data leakage policy violations occur on mobile devices
infosec « WordPress.com Tag Feed

Nearly half of all cloud app activities and more than one-third of all data leakage policy violation


Pirate Bay Founder Convicted on Hacking Charges
Wired: Threat Level

Pirate Bay Founder Convicted on Hacking Charges

The founder of the file-sharing site Pirate Bay was found guilty today in Denma


Hackers Are Using Gmail Drafts to Update Their Malware and Steal Data
infosec « WordPress.com Tag Feed

In his career-ending extramarital affair that came to light in 2012, General David Petraeus used a s


Epidemic of medical data breaches leaking our most sensitive information
SophosLabs blog

Health data is considered among the most private of information, but continues to leak out in a dazzling range of ways.Millions of Drupal websites at risk from failure to patch
SophosLabs blog

You should assume that your Drupal 7 website has been compromised if you didn't patch it within 7 hours of the release of Drupal 7.32 on 15 October 2014.US CERT warning Backoff POS agent impacts over 1000 businesses
Harry Waldron - Microsoft MVP Blog

[…]


ISC StormCast for Wednesday, October 29th 2014 http://bit.ly/1u552NE, (Wed, Oct 29th)
infosec « WordPress.com Tag Feed

…(more)… from SANS Internet Storm Center, InfoCON: green http://bit.ly/1wEcJXV via IFTTT


3 ways to make your Gmail account safer
SophosLabs blog

Following on from our detailed guide to securing your webmail, here's a quick breakdown of how to make the most important fixes, for users of Google's Gmail.3 ways to make your Outlook.com account safer
infosec « WordPress.com Tag Feed

Following up on our detailed guide to securing your webmail, here’s a quick breakdown of how t


Snapchat escapes Australian cyberbullying crackdown, for now
SophosLabs blog

Australia's cyberbullying crackdown won't see the country putting any legal muscle into forcing "smaller" social media firms like Snapchat to take down harassing content, a Parliament spokesman said on Tuesday. White House networks hacked
SophosLabs blog

Attackers broke into unclassified White House computer networks in the past 2-3 weeks. It's far from surprising, one unnamed official said, given that it's a "constant battle" between the government, trying to secure its sensitive systems, and bad actors


Crooks use stolen magnetic payment card info to make fraudulent chip-enabled transactions
infosec « WordPress.com Tag Feed

The chip and PIN payment card system – or EMV – is considered to be more secure than the


ShellshockRelated Attacks Continue, Targets SMTP Servers
TrendLabs | Malware Blog - by Trend Micro

A new Shellshock attack targeting SMTP servers was discovered by Trend Micro. Attackers used email to deliver the exploit. If the exploit code is executed successfully on a vulnerable SMTP server, an IRC bot known as JST Perl IrcBot will be downloaded and


Intel launches online data protection solution for retail - Fibre2fashion.com
infosec « WordPress.com Tag Feed

Intel launches online data protection solution for retailFibre2fashion.comThe Intel Data Protection


all content is copyright its respective owner or owners.

the technology behind infosec daily is partially copyright © 2003-2008 jose nazario.