Last updated:
Sun Dec 21 14:23:17 2014 GMT
  2014 FIRST Annual Conference in Boston - Register now

blackhat for life
Network Security
When {Puffy} Meets ^RedDevil^
Kimberly L. Tripp: Improving *my* SQL skills through your questions! - Security
Cheap Hack
Solution Accelerators - Security & Compliance
Jim's Bloggyness
Security and Technology for SMB's and SOHO's
Internet Insecurity
cybercrime/-security sightings
Burton Group Page Not Found
Security Curve Weblog
Infosec Events
Greyhat of the World Unite...
Sam Gentile
infosec « Tag Feed Your Web Site and Application Security Resource
DoxPara Research
Latest Blog Entires From WebSense Security Labs
Draft Security Blog
Security Soapbox
Abner Stories
An Information Security Place
Security Manifest
Politically Motivated Computer Crime and Hacktivism
Crypto-World - news
eEye Digital Security - Research Blog
Digital ID World Editors Corner
Robert Hensing's Blog
worm blog
Liudvikas Bukys
InfoWorld Gripe Line | Ed Foster
Infosec Writers Latest Security Papers
Roger's Information Security Blog
Bkis Blog
Michael Howard's Web Log
Eugene Bobukh's WebLog
.NET Security Blog
Roger Thompson
Wired: Threat Level
1 Raindrop
Pinpoint Labs Blog
Cynical Security
The Importance of...
Andrew Carpenter
Kaspersky Lab Weblog
The Security Skeptic
Errata Security
Sorry! We couldn't find your document
Anti-Malware Engineering Team
Infosec Potpourri
SophosLabs blog
MVP Jubo Security Blog
Windows Incident Response
Dana Epp's ramblings at the Sanctuary
Static in the Ether
Kasun's Weblog
The WiFi Zone
Casper Dik's Weblog - Technology, Software Development, Project Management, Marketing News
Spire Security Viewpoint
LuFG Summerschool Applied IT Security
The Antivirus Guy Blog
ThreatFire Research Blog
Page Not Found - ASP.NET Weblogs
A Bro Blog
Anton Chuvakin, O'Reilly Network
Stupid Security
About Internet / Network Security
Federated Infrastructure : Security
::PepperTech:: Security Management News Blog
Security Watch
Vastly Important Notes
darren_moffat@blog$ cat /dev/mem | grep /dev/urandom
Tenable Network Security
Volatile Systems
Page Not Found - ASP.NET Weblogs
b l o g _ m a x i m u m
The Dark Visitor
Security Garden
Essential Computer Security
Service Provider Journal
Daemon on Security
You Know What's Stupid? Everything I Don't Understand
Deb Shinder's MVP Blog
Nth world commentaries
The Security Blanket
The Security Mentor
The X Dot Com Inc. - 404 Wrong Page
Page Not Found - ASP.NET Weblogs
The Microsoft Security Response Center Blog
torsten's .NET blog - Security
Security Notes
404 - Not Found
HD DVD / Randomness... : Security
Page Not Found - ASP.NET Weblogs
Glenn Brunette's Security Weblog
Attack Research
Alert Logic
Sergey Simakov blog
F-Secure Antivirus Research Weblog
Xavier's Security Post
Fred Avolio's Musings
Wendy's Blog: Legal Tags
Internet Security News and Analysis
-- Sleeve notes of a sysadmin --
CyberSpeak's Podcast
John Palfrey
Financial Cryptography
Rick Kingslan - Will Hack 4 Food
Spam Filtering Techniques
Kim Cameron's Identity Weblog
Krebs on Security
Tim Rains' WebLog
Security Blanket
IBM Internet Security Systems Frequency X Blog
Technology Review Feed - TR Editors' Blog
Sorry! We couldn't find your document
Larry Osterman's WebLog : Security
Windows Security Logging and Other Esoterica
Speaking of Security, the RSA Blog and Podcast
APB Infosec blog
Andreas Sterbenz's Blog
Internet Security with Kirk
Fabulous Adventures In Coding : Security
New Directions in Security (Comments)
Paul's Down-Home Page: Exchange, messaging, collaboration, security, and more
Educated Guesswork
Sunbelt Blog
Information Security News Desk
Network Security Blog
In-Security : Exploring Internet, Information and Infrastructure Security
Will Cox: Security
ModSecurity Blog
National Cyber Security - Blogs
Small Business Server
Wifi Security Project
Latest Blog Entires From WebSense Security Labs
Sorry! We couldn't find your document
Bill Sommerfeld's Weblog
Dan Anderson's Weblog
Freedom to Tinker
Hex blog
Page Not Found - ASP.NET Weblogs
Information Security News Desk
Page Not Found - ASP.NET Weblogs
-- Sleeve notes of a sysadmin --
Network Security Blog
BufferOverrun : Security
StillSecure, After All These Years
Carnal0wnage Blog
Arun Perinkolam's Weblog
Casper Dik's Weblog
Michael Howard's Web Log : Security
Latest Analysis for All Threats
MZL & Novatech Traffic & Bandwidth Statistics News
CyberCrime & Doing Time
The Security Development Lifecycle
Security to the Core | Arbor Networks Security Blog
Fermats Security Alerts
The Day Before Zero
Anil John - Security
CERIAS Weblogs
Information Manager Journal
netstat -a
Adobe Product Security Incident Response Team (PSIRT)
Schneier on Security
The Evil Empire - A Revolution is the Solution
MSDN: Security
OpenPacket Blog
Mark's Blog
Lauren Weinstein's Blog
George Ou
Latests Alerts From Websense Security Labs
Phil Windley's Technometria
darren_moffat@blog$ cat /dev/mem | grep /dev/urandom
Dancho Danchev's Blog - Mind Streams of Information Security Knowledge
Harry Waldron - Microsoft MVP Blog
Emergent Chaos
1 Raindrop
Security Response Weblog
Matasano Chargen Blog
Information Research
The Security Mentor
SecuriTeam Blogs
Solution Accelerators - Security & Compliance
Aaron Margosis' "Non-Admin" WebLog
Larry's Insecurity Blog
Windows Shell/User (MSN & OneCare Too)
Computing Research Policy Blog
Usable Security Security Weblog
: 404 Not Found Justin Mason's Weblog
Larry Seltzer's Security Weblog
Norwegian Honeynet Project
Security Fix
Security Fix
The Security Skeptic
Security Blog
The ICSI Networking Group Blog
TrendLabs | Malware Blog - by Trend Micro
Page Not Found - ASP.NET Weblogs
Anti Rootkit Blog
Mark O'Neill's Radio Weblog
McAfee Avert Labs
Realtime Community | IT Compliance
Security Sauce
Vulnerability Analysis Blog
Glenn Brunette's Security Weblog
Fixing Email Weblog
A Day in the Life of an Information Security Investigator
-- Sleeve notes of a sysadmin --
trimMail's Email Battles
Bowulf Infosec & Network Admin Blog
disLEXia 3000 blog
Thomas Shinder Blog
fes' WebLog
Steve Lamb's Blog : How to Articles
Panda Research Blog
Errata Security
Martin Englund's Weblog
Caffeinated Security
December 21, 2014

Millions Of Android Phones In China Have Backdoor
infosec « Tag Feed

An Android backdoor is the topic of one of two advisories this week on mobile threats. from Dark Rea

Ask a nerd
Errata Security

One should probably consult a lawyer on legal questions. Likewise, lawyers should probably consult nerds on technical questions. I point this out because of this

December 20, 2014

Crossing the Streams in Suricata

At it’s core, Suricata is a packet processor. It reads packets and pushes them through a configurable pipeline. The 2nd most important processing unit in Suricata is the flow. In Suricata we use the term flow for the bidirectional flows …

'Grinch' Bug May Affect Most Linux Systems
infosec « Tag Feed

But newly discovered vulnerability not as urgent as previous open-source bug disclosures. from Dark

ICANN Hacked Including Root DNS Systems
infosec « Tag Feed

from Darknet – The Darkside via IFTTT

Yes, ICANN keep your data safe...oops, sorry, no I can't - 60 Sec Security [VIDEO]
SophosLabs blog

Time for the latest episode of our weekly 60 Second Security video! The news, in just one minute...enjoy.New Year's Resolution: Be better at blogging
You Know What's Stupid? Everything I Don't Understand

Manufacturers Backdoor Found on Popular Chinese Android Smartphone
infosec « Tag Feed

Chinese smartphones from Coolpad contain a backdoor, dubbed CoolReaper by Palo Alto researchers, is

Is the polkit Grinch Going to Steal your Christmas?, (Wed, Dec 17th)
infosec « Tag Feed

Alert Logic published a widely publizised blog outlining a common configuration problem with Polk

Sony hack was the work of SPECTRE
Errata Security

The problem with hacking is that people try to understand it through analogies with things they understand. They try to fit new information into old stories/tropes they are familiar with. This doesn't work -- hacking needs to be understood in its own term

all content is copyright its respective owner or owners.

the technology behind infosec daily is partially copyright © 2003-2008 jose nazario.