Last updated:
Thu Oct 23 07:23:39 2014 GMT
  2014 FIRST Annual Conference in Boston - Register now

Information Security News Desk
Stupid Security
Security Sauce
netstat -a
Kimberly L. Tripp: Improving *my* SQL skills through your questions! - Security
Security Curve Weblog
cybercrime/-security sightings
The ICSI Networking Group Blog
infosec « Tag Feed
The Dark Visitor
Errata Security
Nth world commentaries
Steve Lamb's Blog : How to Articles
blackhat for life
Page Not Found - ASP.NET Weblogs
MVP Jubo Security Blog
eEye Digital Security - Research Blog
The Security Mentor
Internet Security with Kirk
Roger Thompson
Martin Englund's Weblog
Vulnerability Analysis Blog
Rick Kingslan - Will Hack 4 Food
Paul's Down-Home Page: Exchange, messaging, collaboration, security, and more
Bill Sommerfeld's Weblog
ThreatFire Research Blog
Daemon on Security
Emergent Chaos
Sorry! We couldn't find your document
F-Secure Antivirus Research Weblog
.NET Security Blog
Security Notes
Robert Hensing's Blog
The Microsoft Security Response Center Blog
Essential Computer Security
Solution Accelerators - Security & Compliance
Anil John - Security
Sergey Simakov blog
Page Not Found - ASP.NET Weblogs
Educated Guesswork
Alert Logic
Attack Research
Page Not Found - ASP.NET Weblogs
Information Manager Journal
In-Security : Exploring Internet, Information and Infrastructure Security
John Palfrey
StillSecure, After All These Years
Mark's Blog
Network Security Blog
LuFG Summerschool Applied IT Security
OpenPacket Blog
torsten's .NET blog - Security
Sorry! We couldn't find your document
Aaron Margosis' "Non-Admin" WebLog
Mark O'Neill's Radio Weblog
Greyhat of the World Unite...
Page Not Found - ASP.NET Weblogs
Usable Security
Security Soapbox - Technology, Software Development, Project Management, Marketing News
Federated Infrastructure : Security
Security Fix
CERIAS Weblogs
Glenn Brunette's Security Weblog
darren_moffat@blog$ cat /dev/mem | grep /dev/urandom
Will Cox: Security
Anton Chuvakin, O'Reilly Network
CyberSpeak's Podcast
The Day Before Zero
Kim Cameron's Identity Weblog
The Security Mentor
Larry Osterman's WebLog : Security
Tenable Network Security Blog
About Internet / Network Security
Panda Research Blog
fes' WebLog
SophosLabs blog
Deb Shinder's MVP Blog
Security Blog
Wendy's Blog: Legal Tags
Wired: Threat Level
Andrew Carpenter
IBM Internet Security Systems Frequency X Blog
Internet Security News and Analysis
Security Watch
Dana Epp's ramblings at the Sanctuary
Liudvikas Bukys
The Security Skeptic
Spam Filtering Techniques
Norwegian Honeynet Project
Larry Seltzer's Security Weblog
Latest Blog Entires From WebSense Security Labs
BufferOverrun : Security
worm blog
Realtime Community | IT Compliance
Network Security
Pinpoint Labs Blog
Hex blog
SecuriTeam Blogs
Security Fix
Bkis Blog
-- Sleeve notes of a sysadmin --
Phil Windley's Technometria
Security Response Weblog Your Web Site and Application Security Resource
The Security Blanket
Service Provider Journal
Matasano Chargen
Lauren Weinstein's Blog - A Revolution is the Solution
b l o g _ m a x i m u m
The Evil Empire
Latest Blog Entires From WebSense Security Labs
Infosec Writers Latest Security Papers
APB Infosec blog
Krebs on Security
Jim's Bloggyness
Financial Cryptography
InfoWorld Gripe Line | Ed Foster
Computing Research Policy Blog
Security Garden
Vastly Important Notes
Freedom to Tinker
Andreas Sterbenz's Blog
trimMail's Email Battles
disLEXia 3000 blog
New Directions in Security (Comments)
Cynical Security
Fabulous Adventures In Coding : Security
Page Not Found - ASP.NET Weblogs
1 Raindrop
Anti-Malware Engineering Team
Infosec Potpourri
Digital ID World Editors Corner
Volatile Systems
::PepperTech:: Security Management News Blog
Fermats Security Alerts
Crypto-World - news
Internet Insecurity
Michael Howard's Web Log
An Information Security Place
The X Dot Com Inc. - 404 Wrong Page
MZL & Novatech Traffic & Bandwidth Statistics News
Page Not Found - ASP.NET Weblogs
404 - Not Found Security Weblog
Bowulf Infosec & Network Admin Blog
Errata Security
CyberCrime & Doing Time
Speaking of Security, the RSA Blog and Podcast
-- Sleeve notes of a sysadmin --
: 404 Not Found
Windows Shell/User (MSN & OneCare Too)
Technology Review Feed - TR Editors' Blog
Fixing Email Weblog
Adobe Product Security Incident Response Team (PSIRT)
ModSecurity Blog Justin Mason's Weblog
Latests Alerts From Websense Security Labs
Anti Rootkit Blog
Information Security News Desk
Burton Group Page Not Found
darren_moffat@blog$ cat /dev/mem | grep /dev/urandom
Sunbelt Blog
TrendLabs | Malware Blog - by Trend Micro
Casper Dik's Weblog
Tim Rains' WebLog
Small Business Server
Windows Security Logging and Other Esoterica
Glenn Brunette's Security Weblog
Larry's Insecurity Blog
Roger's Information Security Blog
McAfee Avert Labs
The Security Development Lifecycle
Fred Avolio's Musings
MSDN: Security
Carnal0wnage Blog
National Cyber Security - Blogs
-- Sleeve notes of a sysadmin --
Harry Waldron - Microsoft MVP Blog
Security to the Core | Arbor Networks Security Blog
Kasun's Weblog
Thomas Shinder Blog
Eugene Bobukh's WebLog
Sam Gentile
HD DVD / Randomness... : Security
When {Puffy} Meets ^RedDevil^
Draft Security Blog
You Know What's Stupid? Everything I Don't Understand
Cheap Hack
Security Manifest
The Importance of...
Solution Accelerators - Security & Compliance
Network Security Blog
Casper Dik's Weblog
The Security Skeptic
The Antivirus Guy Blog
Schneier on Security
Kaspersky Lab Weblog
Sorry! We couldn't find your document
Static in the Ether
Wifi Security Project
Abner Stories
Infosec Events
Politically Motivated Computer Crime and Hacktivism
Xavier's Security Post
A Day in the Life of an Information Security Investigator
A Bro Blog
Spire Security Viewpoint
Michael Howard's Web Log : Security
Arun Perinkolam's Weblog
Security Blanket
Page Not Found - ASP.NET Weblogs
The WiFi Zone
Security and Technology for SMB's and SOHO's
Dan Anderson's Weblog
Latest Analysis for All Threats
George Ou
DoxPara Research
1 Raindrop
Information Research
Dancho Danchev's Blog - Mind Streams of Information Security Knowledge
Windows Incident Response
Caffeinated Security
October 23, 2014

Data protection may be stumbling block for guidance guarantee - Money Marketing
infosec « Tag Feed

Money Marketing Data protection may be stumbling block for guidance guaranteeMoney MarketingHe adds:

Cloud adoption trends in European organizations
infosec « Tag Feed

In Europe, the number of cloud services in use by the average company increased 23 percent, rising f

Named Top 50 InfoSec Blogs You Should Be Reading
Roger's Information Security Blog

DigitalGuardian has named this blog as one of the Top 50 Infosec Blogs you should be reading. DigitalGuardianbyVerdasys offers an interesting solution in the DLP area as well asadvanced threat protection. Definitely worth checking out. The post

October 22, 2014

Online Harassment Prevalent, Often by Strangers, Pew Study Finds
You Know What's Stupid? Everything I Don't Understand

Date published: 
Bitcoin may be volatile but has value beyond price point
You Know What's Stupid? Everything I Don't Understand

Date published: 
FUSION Rise Up Conference
You Know What's Stupid? Everything I Don't Understand

New CVE-2014-4114 Attacks Seen One Week After Fix
TrendLabs | Malware Blog - by Trend Micro

Despite the availability of fixes related to the Sandworm vulnerability (CVE-2014-4114), we are still seeing new attacks related to this flaw. These attacks contain a new routine that could prevent detection. A New Evasion Technique In our analysis of the

Last Call: Open Memory Forensics Workshop 2014

As previously mentioned, the registration for the Open Memory Forensics Workshop (OMFW) 2014 closes on Oct 24. If you are interested in attending, there are a few seat remaining. Examples

RegRipper v2.8 is now on GitHub
Windows Incident Response

Ireland tops leader board during Europe Code Week -
infosec « Tag Feed Ireland tops leader board during Europe Code WeekSiliconrepublic.comSkip Navigat

FBI Study over 500,000,000 accounts exposed in past 12 months
Harry Waldron - Microsoft MVP Blog


Wanted: Testers For The Greatest Android App Ever
F-Secure Antivirus Research Weblog

Okay… so the greatest Android app "ever" is a bit of friendly hyperbole. But still, it's a really is a great app. What app? Well, F-Secure Freedome of course (currently available for

BSidesDC 2014 Wrap Up
infosec « Tag Feed

BSidesDC holds a special place for me as I am one of the organizers of the conference. This year I s

Physicists build 'Holy Grail' tractor beam -
infosec « Tag Feed Physicists build ‘Holy Grail’ tractor beamSiliconrepublic.comSkip Na

Google Accounts Now Support Security Keys
Krebs on Security

People who use Gmail and other Google services now have an extra layer of security available when logging into Google accounts. The company today incorporated into these services the open Universal 2nd Factor (U2F) standard, a physical USB-based second fa

How to Stop Apple From Snooping on Your OS X Yosemite Searches
infosec « Tag Feed

Apple’s latest operating system OS X Yosemite pushes the limits of data collection tolerance:

This Fake Log Jams Your Phone So Youll Shut Up andEnjoy Nature
Wired: Threat Level

This Fake Log Jams Your Phone So You’ll Shut Up andEnjoy Nature

The Log Jammer blends into a natural setting to cut off that constant remot

Woman charged with planting spyware on cop's phone
SophosLabs blog

A woman has been charged after eavesdropping on "sensitive law enforcement communications" by tapping the mobile phone of her police officer ex.OS X Yosemite Wi-Fi problems - can you help us solve them?
SophosLabs blog

Most early adopters of OS X Yosemite are enjoying a refreshingly clean new look with a bunch of updated applications. But for a few, it's a Wi-Fi network merry-go-round...Operation Pawn Storm: The Red in SEDNIT
TrendLabs | Malware Blog - by Trend Micro

Pawn Stormis an active economic and political cyber-espionage operation targeting a wide range of entities, mostly those related to the military, governments, andmedia. Specific targets include: Military agencies, embassies, and defense contractors in the

Hackers make companies' phones call premium-rate numbers, earn billions
infosec « Tag Feed

Attackers hacking into companies’ phone network, using it to place mass phone calls to premium

Is your phone line a '6-figure liability waiting to happen'?
SophosLabs blog

Premium-rate service scams are sticking businesses - particularly small ones using local carriers - with outrageous phone bills, to the tune of $4.73 billion globally for 2013. Many businesses aren't even aware that they can be stuck paying the bill (or f

Netflix forges video entertainment partnership with Vodafone -
infosec « Tag Feed Netflix forges video entertainment partnership with VodafoneSiliconrepublic.comS

Interview on "Taste of Premier" about Security Guidance for Windows 8.1, Windows Server 2012 R2 and IE 11
Solution Accelerators - Security & Compliance

Microsoft Windows Hit By New Zero-Day Attack
TrendLabs | Malware Blog - by Trend Micro

Microsoft has disclosed that anew zero-day vulnerability is present in Windows, and is exploited via Microsoft Office files. According to Microsoft Security Advistory 3010060, the vulnerability is present in all supported versions of Windows except Window

Attitude, Knowledge, Opinion and Expertise; an information security career map?
infosec « Tag Feed

I was talking to one of my colleagues a few days ago who joined our team a little under a year ago.

TorrentLocker Run Hits Italian Targets
TrendLabs | Malware Blog - by Trend Micro

We recently observed a new ransomware variant, TorrentLocker, that was targeted at nearly 4,000 Italian organizations and enterprises. TorrentLocker is similar to an earlier ransomware family (CryptoLocker), and alsoencrypts various files and forces users

all content is copyright its respective owner or owners.

the technology behind infosec daily is partially copyright © 2003-2008 jose nazario.