Last updated:
Sat Oct 25 07:23:57 2014 GMT
  2014 FIRST Annual Conference in Boston - Register now

HD DVD / Randomness... : Security
Spire Security Viewpoint
disLEXia 3000 blog
Realtime Community | IT Compliance
Internet Security News and Analysis
Carnal0wnage Blog
Page Not Found - ASP.NET Weblogs
Larry Seltzer's Security Weblog
Windows Shell/User (MSN & OneCare Too)
Andreas Sterbenz's Blog
The Security Mentor Security Weblog
Wired: Threat Level
Aaron Margosis' "Non-Admin" WebLog
Burton Group Page Not Found
ModSecurity Blog Justin Mason's Weblog
Draft Security Blog
torsten's .NET blog - Security
Matasano Chargen
Network Security Blog
.NET Security Blog
The Antivirus Guy Blog
SophosLabs blog
Infosec Events
Digital ID World Editors Corner
Page Not Found - ASP.NET Weblogs
Glenn Brunette's Security Weblog
Security to the Core | Arbor Networks Security Blog
Security Sauce
: 404 Not Found
Rick Kingslan - Will Hack 4 Food
Kasun's Weblog
TrendLabs | Malware Blog - by Trend Micro
The X Dot Com Inc. - 404 Wrong Page
A Day in the Life of an Information Security Investigator
Solution Accelerators - Security & Compliance
The Security Blanket
Sorry! We couldn't find your document
Bill Sommerfeld's Weblog
Windows Incident Response
Daemon on Security
Deb Shinder's MVP Blog
404 - Not Found
Glenn Brunette's Security Weblog
John Palfrey
worm blog
Latest Blog Entires From WebSense Security Labs
Thomas Shinder Blog
1 Raindrop
Greyhat of the World Unite...
eEye Digital Security - Research Blog
Cynical Security
Phil Windley's Technometria
Hex blog
Federated Infrastructure : Security
Nth world commentaries
Windows Security Logging and Other Esoterica
Tenable Network Security
Latest Blog Entires From WebSense Security Labs - A Revolution is the Solution
Security Fix
Steve Lamb's Blog : How to Articles
Solution Accelerators - Security & Compliance
darren_moffat@blog$ cat /dev/mem | grep /dev/urandom
Crypto-World - news
Tim Rains' WebLog
Panda Research Blog
Errata Security
Stupid Security
Emergent Chaos
Pinpoint Labs Blog
CyberSpeak's Podcast
Liudvikas Bukys
Errata Security
Martin Englund's Weblog
MZL & Novatech Traffic & Bandwidth Statistics News
Anti-Malware Engineering Team
Krebs on Security
Wendy's Blog: Legal Tags
George Ou
Sergey Simakov blog
The Dark Visitor
The Security Mentor
Casper Dik's Weblog
MSDN: Security
Security and Technology for SMB's and SOHO's
The ICSI Networking Group Blog
Robert Hensing's Blog
Roger Thompson
Information Security News Desk
Network Security Blog
netstat -a
Page Not Found - ASP.NET Weblogs
Anti Rootkit Blog
Harry Waldron - Microsoft MVP Blog
The Microsoft Security Response Center Blog
Larry Osterman's WebLog : Security
Security Soapbox
Mark O'Neill's Radio Weblog
An Information Security Place
Sam Gentile
b l o g _ m a x i m u m
Network Security
Usable Security
Schneier on Security
Wifi Security Project
Fred Avolio's Musings
Information Security News Desk
In-Security : Exploring Internet, Information and Infrastructure Security
Bkis Blog
Spam Filtering Techniques
Paul's Down-Home Page: Exchange, messaging, collaboration, security, and more
Internet Security with Kirk
Security Curve Weblog
Internet Insecurity
DoxPara Research
Vulnerability Analysis Blog
Anton Chuvakin, O'Reilly Network
Page Not Found - ASP.NET Weblogs
Security Manifest
Fermats Security Alerts
Bowulf Infosec & Network Admin Blog
The WiFi Zone
Security Fix
websecurityblog Blog
Infosec Writers Latest Security Papers
Lauren Weinstein's Blog
Anil John - Security Your Web Site and Application Security Resource
darren_moffat@blog$ cat /dev/mem | grep /dev/urandom
Educated Guesswork
Fabulous Adventures In Coding : Security
Essential Computer Security
Alert Logic
The Day Before Zero
Kaspersky Lab Weblog
Jim's Bloggyness
infosec « Tag Feed
Cybercrime - Technology, Software Development, Project Management, Marketing News
Service Provider Journal
Security Blog
F-Secure Antivirus Research Weblog
trimMail's Email Battles
Computing Research Policy Blog
Latests Alerts From Websense Security Labs
Security Notes
Michael Howard's Web Log
The Security Skeptic
Information Research
cybercrime/-security sightings
StillSecure, After All These Years
Fixing Email Weblog
The Security Development Lifecycle
Attack Research
Sorry! We couldn't find your document
Static in the Ether
Technology Review Feed - TR Editors' Blog
New Directions in Security (Comments)
1 Raindrop
Larry's Insecurity Blog
Eugene Bobukh's WebLog
Andrew Carpenter
Page Not Found - ASP.NET Weblogs
Sunbelt Blog
Abner Stories
Infosec Potpourri
Kim Cameron's Identity Weblog
Freedom to Tinker
Security Watch
-- Sleeve notes of a sysadmin --
APB Infosec blog
ThreatFire Research Blog
Financial Cryptography
Vastly Important Notes
Caffeinated Security
Dana Epp's ramblings at the Sanctuary
-- Sleeve notes of a sysadmin --
blackhat for life
Michael Howard's Web Log : Security
Speaking of Security, the RSA Blog and Podcast
You Know What's Stupid? Everything I Don't Understand
Page Not Found - ASP.NET Weblogs
Latest Analysis for All Threats
CERIAS Weblogs
Security Response Weblog
Politically Motivated Computer Crime and Hacktivism
OpenPacket Blog
Mark's Blog
Dancho Danchev's Blog - Mind Streams of Information Security Knowledge
National Cyber Security - Blogs
The Importance of...
::PepperTech:: Security Management News Blog
Page Not Found - ASP.NET Weblogs
Information Manager Journal
A Bro Blog
BufferOverrun : Security
fes' WebLog
McAfee Avert Labs
The Evil Empire
Security Garden
CyberCrime & Doing Time
When {Puffy} Meets ^RedDevil^
MVP Jubo Security Blog
Kimberly L. Tripp: Improving *my* SQL skills through your questions! - Security
-- Sleeve notes of a sysadmin --
Dan Anderson's Weblog
Volatile Systems
Roger's Information Security Blog
About Internet / Network Security
Cheap Hack
LuFG Summerschool Applied IT Security
Adobe Product Security Incident Response Team (PSIRT)
InfoWorld Gripe Line | Ed Foster
Will Cox: Security
SecuriTeam Blogs
Sorry! We couldn't find your document
Casper Dik's Weblog
Xavier's Security Post
IBM Internet Security Systems Frequency X Blog
Small Business Server
The Security Skeptic
Security Blanket
Arun Perinkolam's Weblog
Norwegian Honeynet Project
October 25, 2014

Connections for Business and Volico Hosting Partner to Accelerate Customer ... - (press release) (blog)
infosec « Tag Feed (press release) (blog) Connections for Business and Volico Hosting Partner to Acc

Data generated by connected devices should be considered personal, says data ... - Computing
infosec « Tag Feed

Computing Data generated by connected devices should be considered personal, says data Comput

October 24, 2014

Stop the Ebola Witch-Hunt!
Lauren Weinstein's Blog

telnetd rulez: Cisco Ironport WSA Telnetd Remote Code Execution Vulnerability, (Wed, Oct 22nd)
infosec « Tag Feed

Glafkos sent us his vulnerability advisory for a remote code execution vuln hed identified and re

Credit Card Fraud Tips to spot Credit Card Skimmers
Harry Waldron - Microsoft MVP Blog


European Data Protection Watchdog Provides Recommendations For Google's ... - Mondaq News Alerts (registration)
infosec « Tag Feed

European Data Protection Watchdog Provides Recommendations For Google’s …Mondaq News Ale

Pale Moon Version 25.0.2 Released
Security Garden

Insecure Protocol Puts 1.2M SOHO Devices At Risk
infosec « Tag Feed

Enterprises should take care to prohibit NAT-PMP traffic on untrusted network interfaces. from Dark

Hackers who threaten national security could face life sentences
SophosLabs blog

Where damage to human welfare or national security is deemed serious enough, the proposed amendment to the UK's Computer Misuse Act 1990 could mean life in jail for hackers, and some experts believe the changes could be used to target whistleblowers.

Operation Pawn Storm: Putting Outlook Web Access Users at Risk
TrendLabs | Malware Blog - by Trend Micro

In our recently released report, Operation Pawn Storm, we talked about an operation that involved three attack scenarios.For this post, we will talk about the third scenario:phishing emails that redirect victims to fake Outlook Web Access login pages. Wha

A Tale of Two Powerpoint Vulnerabilities
F-Secure Antivirus Research Weblog

It's been already a week after the announcement of the CVE-2014-4114 vulnerability, and the tally of the exploiters have only increased.

There are even files where the metadata has remained the same, which clearly shows that they have been copi

Intel Introduces Data Protection Technology For Transactions - Retail Solutions Online (press release)
infosec « Tag Feed

Retail Solutions Online (press release) Intel Introduces Data Protection Technology For Transactions

Now Everyone Wants to Sell You a Magical Anonymity Router. Choose Wisely
Wired: Threat Level

Now Everyone Wants to Sell You a Magical Anonymity Router. Choose Wisely

Maintaining your privacy online, like investing in stocks

How to kill a troll
SophosLabs blog

A new Pew study confirms what we already know: online harassment is a widespread disease afflicting the internet. Ignoring trolls and hoping they'll go away is actually quite effective, survey respondents said. Then again, how about fighting back, inste

Twitter invites us to say goodbye to passwords, use Digits instead
SophosLabs blog

Twitter's new credentials handling scheme is called Digits, and it's hoping that mobile app developers use it to enable their users to sign in with their phone numbers as identifiers, along with one-time passwords SMSed to the phones. Has the "Sandworm" zero-day exploit burrowed back to the surface?
SophosLabs blog

You may have noticed that Microsoft recently published a Security Advisory that sounds a lot like the "Sandworm" vulnerability all over again. Paul Ducklin explains...Attackers change home routes' DNS setting via malicious code injected in ads
infosec « Tag Feed

Sucuri Security researchers have unearthed a malvertising campaign aimed at changing the DNS setting

Do we really need strong passwords?
SophosLabs blog

The idea that computer users should use long, complex passwords is one of computer security's sacred cows. But is is really necessary? Mark Stockley investigates...60% of Android attacks use financial malware
infosec « Tag Feed

Malicious programs targeting Android-based devices in order to steal money were used in 60 percent o

2FA: Google offers physical alternative to verification codes
infosec « Tag Feed

Google is offering an alternative second factor for its two-step account verification option, one th

all content is copyright its respective owner or owners.

the technology behind infosec daily is partially copyright © 2003-2008 jose nazario.