Last updated:
Sat Oct 25 07:23:57 2014 GMT
  2014 FIRST Annual Conference in Boston - Register now


Blogroll
HD DVD / Randomness... : Security
Spire Security Viewpoint
disLEXia 3000 blog
Realtime Community | IT Compliance
Internet Security News and Analysis
Carnal0wnage Blog
CERIAS Blog
Page Not Found - ASP.NET Weblogs
Security
www.rootkit.com
Larry Seltzer's Security Weblog
Windows Shell/User (MSN & OneCare Too)
Andreas Sterbenz's Blog
The Security Mentor
Open-Node.net Security Weblog
Wired: Threat Level
Aaron Margosis' "Non-Admin" WebLog
Burton Group Page Not Found
ModSecurity Blog
taint.org: Justin Mason's Weblog
Draft Security Blog
torsten's .NET blog - Security
Matasano Chargen
Network Security Blog
.NET Security Blog
The Antivirus Guy Blog
SophosLabs blog
Infosec Events
Digital ID World Editors Corner
Page Not Found - ASP.NET Weblogs
Glenn Brunette's Security Weblog
Security to the Core | Arbor Networks Security Blog
Security Sauce
: 404 Not Found
Rick Kingslan - Will Hack 4 Food
antlab
Kasun's Weblog
mcwresearch.com
TrendLabs | Malware Blog - by Trend Micro
@CyberForge
The X Dot Com Inc. - 404 Wrong Page
A Day in the Life of an Information Security Investigator
Solution Accelerators - Security & Compliance
The Security Blanket
Sorry! We couldn't find your document
Bill Sommerfeld's Weblog
SYN|ACK
Windows Incident Response
Daemon on Security
Deb Shinder's MVP Blog
404 - Not Found
Glenn Brunette's Security Weblog
John Palfrey
worm blog
Latest Blog Entires From WebSense Security Labs
Thomas Shinder Blog
1 Raindrop
MoMusings@Arachnid.homeip.net
Volatility
Greyhat of the World Unite...
eEye Digital Security - Research Blog
Cynical Security
Phil Windley's Technometria
BenEdelman.org
whattheflex
Hex blog
Federated Infrastructure : Security
Nth world commentaries
Windows Security Logging and Other Esoterica
Tenable Network Security
Latest Blog Entires From WebSense Security Labs
Vitalsecurity.org - A Revolution is the Solution
Security Fix
GnuPG.org
Esphion
Steve Lamb's Blog : How to Articles
Solution Accelerators - Security & Compliance
PandaLabs
darren_moffat@blog$ cat /dev/mem | grep /dev/urandom
Crypto-World - news
Tim Rains' WebLog
KyleM.xwell
Panda Research Blog
Errata Security
C.I.S.R.T.
Stupid Security
TaoSecurity
Emergent Chaos
Pinpoint Labs Blog
CyberSpeak's Podcast
Liudvikas Bukys
Errata Security
Martin Englund's Weblog
MZL & Novatech Traffic & Bandwidth Statistics News
e-Government@large
Anti-Malware Engineering Team
Krebs on Security
Wendy's Blog: Legal Tags
George Ou
Sergey Simakov blog
The Dark Visitor
The Security Mentor
Casper Dik's Weblog
chandanlog(3C)
MSDN: Security
Security and Technology for SMB's and SOHO's
Logblog
The ICSI Networking Group Blog
Robert Hensing's Blog
Roger Thompson
Information Security News Desk
Network Security Blog
netstat -a
Page Not Found - ASP.NET Weblogs
Anti Rootkit Blog
Harry Waldron - Microsoft MVP Blog
The Microsoft Security Response Center Blog
Larry Osterman's WebLog : Security
Security Soapbox
Mark O'Neill's Radio Weblog
An Information Security Place
Sam Gentile
b l o g _ m a x i m u m
Network Security
Usable Security
Schneier on Security
Wifi Security Project
Fred Avolio's Musings
Ivan
Information Security News Desk
In-Security : Exploring Internet, Information and Infrastructure Security
Bkis Blog
Spam Filtering Techniques
Paul's Down-Home Page: Exchange, messaging, collaboration, security, and more
Compendium
Internet Security with Kirk
Security Curve Weblog
Internet Insecurity
OSSEC Blog
Mal-Aware.org
malwarecrawler.com
Napsterization
DoxPara Research
Vulnerability Analysis Blog
Anton Chuvakin, O'Reilly Network
Page Not Found - ASP.NET Weblogs
Security Manifest
Fermats Security Alerts
Bowulf Infosec & Network Admin Blog
The WiFi Zone
Inliniac
Security Fix
websecurityblog
invulnerableit.com Blog
Infosec Writers Latest Security Papers
Lauren Weinstein's Blog
Anil John - Security
CGISecurity.com: Your Web Site and Application Security Resource
darren_moffat@blog$ cat /dev/mem | grep /dev/urandom
BlogInfoSec.com
Vodun.org
Educated Guesswork
Fabulous Adventures In Coding : Security
Essential Computer Security
Alert Logic
The Day Before Zero
Kaspersky Lab Weblog
Jim's Bloggyness
infosec « WordPress.com Tag Feed
Cybercrime
weblog.cemper.com - Technology, Software Development, Project Management, Marketing News
Service Provider Journal
Security Blog
F-Secure Antivirus Research Weblog
trimMail's Email Battles
Computing Research Policy Blog
Latests Alerts From Websense Security Labs
Security Notes
nzight
TheSecure.Net
Michael Howard's Web Log
The Security Skeptic
Information Research
cybercrime/-security sightings
StillSecure, After All These Years
Fixing Email Weblog
The Security Development Lifecycle
Attack Research
Sorry! We couldn't find your document
Static in the Ether
Technology Review Feed - TR Editors' Blog
New Directions in Security (Comments)
1 Raindrop
Larry's Insecurity Blog
Eugene Bobukh's WebLog
Andrew Carpenter
Page Not Found - ASP.NET Weblogs
Sunbelt Blog
Abner Stories
Infosec Potpourri
Kim Cameron's Identity Weblog
Freedom to Tinker
ADD / XOR / ROL
RedTeam
Security Watch
-- Sleeve notes of a sysadmin --
APB Infosec blog
ThreatFire Research Blog
bIPlog
Financial Cryptography
Vastly Important Notes
REblog
Caffeinated Security
securosis.com
Dana Epp's ramblings at the Sanctuary
OSVDB Blog
-- Sleeve notes of a sysadmin --
blackhat for life
Michael Howard's Web Log : Security
Speaking of Security, the RSA Blog and Podcast
You Know What's Stupid? Everything I Don't Understand
Page Not Found - ASP.NET Weblogs
Latest Analysis for All Threats
CERIAS Weblogs
Security Response Weblog
Politically Motivated Computer Crime and Hacktivism
Lasipalatsi
OpenPacket Blog
Mark's Blog
Dancho Danchev's Blog - Mind Streams of Information Security Knowledge
National Cyber Security - Blogs
The Importance of...
::PepperTech:: Security Management News Blog
Page Not Found - ASP.NET Weblogs
Information Manager Journal
Infothought
A Bro Blog
BufferOverrun : Security
fes' WebLog
McAfee Avert Labs
The Evil Empire
Security Garden
DISOG
CyberCrime & Doing Time
When {Puffy} Meets ^RedDevil^
GPL
MVP Jubo Security Blog
Kimberly L. Tripp: Improving *my* SQL skills through your questions! - Security
-- Sleeve notes of a sysadmin --
Dan Anderson's Weblog
Volatile Systems
Roger's Information Security Blog
About Internet / Network Security
Cheap Hack
LuFG Summerschool Applied IT Security
Verizonbusiness.com
NetSec
Adobe Product Security Incident Response Team (PSIRT)
InfoWorld Gripe Line | Ed Foster
ADD / XOR / ROL
Will Cox: Security
SecuriTeam Blogs
Sorry! We couldn't find your document
turnipsecurity
Casper Dik's Weblog
honeyblog
Xavier's Security Post
NI3
IBM Internet Security Systems Frequency X Blog
Small Business Server
The Security Skeptic
Security Blanket
Arun Perinkolam's Weblog
Norwegian Honeynet Project
Error!
October 25, 2014


Connections for Business and Volico Hosting Partner to Accelerate Customer ... - TheHostingNews.com (press release) (blog)
infosec « WordPress.com Tag Feed

TheHostingNews.com (press release) (blog) Connections for Business and Volico Hosting Partner to Acc


Data generated by connected devices should be considered personal, says data ... - Computing
infosec « WordPress.com Tag Feed

Computing Data generated by connected devices should be considered personal, says data Comput

October 24, 2014


Stop the Ebola Witch-Hunt!
Lauren Weinstein's Blog


telnetd rulez: Cisco Ironport WSA Telnetd Remote Code Execution Vulnerability, (Wed, Oct 22nd)
infosec « WordPress.com Tag Feed

Glafkos sent us his vulnerability advisory for a remote code execution vuln hed identified and re


Credit Card Fraud Tips to spot Credit Card Skimmers
Harry Waldron - Microsoft MVP Blog

[…]


European Data Protection Watchdog Provides Recommendations For Google's ... - Mondaq News Alerts (registration)
infosec « WordPress.com Tag Feed

European Data Protection Watchdog Provides Recommendations For Google’s …Mondaq News Ale


Pale Moon Version 25.0.2 Released
Security Garden


Insecure Protocol Puts 1.2M SOHO Devices At Risk
infosec « WordPress.com Tag Feed

Enterprises should take care to prohibit NAT-PMP traffic on untrusted network interfaces. from Dark


Hackers who threaten national security could face life sentences
SophosLabs blog

Where damage to human welfare or national security is deemed serious enough, the proposed amendment to the UK's Computer Misuse Act 1990 could mean life in jail for hackers, and some experts believe the changes could be used to target whistleblowers.


Operation Pawn Storm: Putting Outlook Web Access Users at Risk
TrendLabs | Malware Blog - by Trend Micro

In our recently released report, Operation Pawn Storm, we talked about an operation that involved three attack scenarios.For this post, we will talk about the third scenario:phishing emails that redirect victims to fake Outlook Web Access login pages. Wha


A Tale of Two Powerpoint Vulnerabilities
F-Secure Antivirus Research Weblog

It's been already a week after the announcement of the CVE-2014-4114 vulnerability, and the tally of the exploiters have only increased.

There are even files where the metadata has remained the same, which clearly shows that they have been copi


Intel Introduces Data Protection Technology For Transactions - Retail Solutions Online (press release)
infosec « WordPress.com Tag Feed

Retail Solutions Online (press release) Intel Introduces Data Protection Technology For Transactions


Now Everyone Wants to Sell You a Magical Anonymity Router. Choose Wisely
Wired: Threat Level

Now Everyone Wants to Sell You a Magical Anonymity Router. Choose Wisely

Maintaining your privacy online, like investing in stocks


How to kill a troll
SophosLabs blog

A new Pew study confirms what we already know: online harassment is a widespread disease afflicting the internet. Ignoring trolls and hoping they'll go away is actually quite effective, survey respondents said. Then again, how about fighting back, inste


Twitter invites us to say goodbye to passwords, use Digits instead
SophosLabs blog

Twitter's new credentials handling scheme is called Digits, and it's hoping that mobile app developers use it to enable their users to sign in with their phone numbers as identifiers, along with one-time passwords SMSed to the phones. Has the "Sandworm" zero-day exploit burrowed back to the surface?
SophosLabs blog

You may have noticed that Microsoft recently published a Security Advisory that sounds a lot like the "Sandworm" vulnerability all over again. Paul Ducklin explains...Attackers change home routes' DNS setting via malicious code injected in ads
infosec « WordPress.com Tag Feed

Sucuri Security researchers have unearthed a malvertising campaign aimed at changing the DNS setting


Do we really need strong passwords?
SophosLabs blog

The idea that computer users should use long, complex passwords is one of computer security's sacred cows. But is is really necessary? Mark Stockley investigates...60% of Android attacks use financial malware
infosec « WordPress.com Tag Feed

Malicious programs targeting Android-based devices in order to steal money were used in 60 percent o


2FA: Google offers physical alternative to verification codes
infosec « WordPress.com Tag Feed

Google is offering an alternative second factor for its two-step account verification option, one th


all content is copyright its respective owner or owners.

the technology behind infosec daily is partially copyright © 2003-2008 jose nazario.