Last updated:
Fri Oct 31 13:23:30 2014 GMT
  2014 FIRST Annual Conference in Boston - Register now

Deb Shinder's MVP Blog
InfoWorld Gripe Line | Ed Foster
Larry Osterman's WebLog : Security
New Directions in Security (Comments)
Sunbelt Blog
Vulnerability Analysis Blog
Page Not Found - ASP.NET Weblogs
Bill Sommerfeld's Weblog
Cynical Security
CyberSpeak's Podcast
Sorry! We couldn't find your document
Steve Lamb's Blog : How to Articles - Technology, Software Development, Project Management, Marketing News
disLEXia 3000 blog
Roger Thompson
Security Garden
The WiFi Zone
Mark's Blog
Jim's Bloggyness
worm blog
Eugene Bobukh's WebLog
Vastly Important Notes
The X Dot Com Inc. - 404 Wrong Page
Page Not Found - ASP.NET Weblogs
Infosec Events
Glenn Brunette's Security Weblog
Larry's Insecurity Blog Your Web Site and Application Security Resource
Page Not Found - ASP.NET Weblogs
Xavier's Security Post
Anil John - Security
Wifi Security Project
Michael Howard's Web Log : Security
CyberCrime & Doing Time
ModSecurity Blog
Panda Research Blog Justin Mason's Weblog
Windows Shell/User (MSN & OneCare Too)
Martin Englund's Weblog
The Dark Visitor
HD DVD / Randomness... : Security
IBM Internet Security Systems Frequency X Blog
Adobe Product Security Incident Response Team (PSIRT)
Tim Rains' WebLog
Kimberly L. Tripp: Improving *my* SQL skills through your questions! - Security
Carnal0wnage Blog
Rick Kingslan - Will Hack 4 Food
Latest Blog Entires From WebSense Security Labs
Page Not Found - ASP.NET Weblogs
Caffeinated Security
The Importance of...
Robert Hensing's Blog
SophosLabs blog
Casper Dik's Weblog
Liudvikas Bukys
Thomas Shinder Blog
Internet Security News and Analysis
torsten's .NET blog - Security
Network Security Blog
Fabulous Adventures In Coding : Security
Lauren Weinstein's Blog
About Internet / Network Security
Network Security
Internet Insecurity
b l o g _ m a x i m u m
Small Business Server
Security Fix
Infosec Writers Latest Security Papers
Security Sauce
Internet Security with Kirk
You Know What's Stupid? Everything I Don't Understand
MSDN: Security
Security Curve Weblog
Speaking of Security, the RSA Blog and Podcast
Politically Motivated Computer Crime and Hacktivism
John Palfrey
The Evil Empire
netstat -a - A Revolution is the Solution
StillSecure, After All These Years
Aaron Margosis' "Non-Admin" WebLog
-- Sleeve notes of a sysadmin --
Freedom to Tinker
Norwegian Honeynet Project
Larry Seltzer's Security Weblog
Glenn Brunette's Security Weblog
The Security Skeptic
Technology Review Feed - TR Editors' Blog
Realtime Community | IT Compliance
The Antivirus Guy Blog
The Security Mentor
BufferOverrun : Security
Federated Infrastructure : Security
-- Sleeve notes of a sysadmin --
The Day Before Zero
Mark O'Neill's Radio Weblog
CERIAS Weblogs
Fred Avolio's Musings
Page Not Found - ASP.NET Weblogs
A Day in the Life of an Information Security Investigator
In-Security : Exploring Internet, Information and Infrastructure Security
Will Cox: Security
Latests Alerts From Websense Security Labs
Security Soapbox
cybercrime/-security sightings
blackhat for life
The Microsoft Security Response Center Blog
1 Raindrop
Information Research
Greyhat of the World Unite...
OpenPacket Blog
darren_moffat@blog$ cat /dev/mem | grep /dev/urandom
TrendLabs | Malware Blog - by Trend Micro
APB Infosec blog
Sorry! We couldn't find your document
Infosec Potpourri
Stupid Security
Page Not Found - ASP.NET Weblogs
Wendy's Blog: Legal Tags
Bkis Blog
Spire Security Viewpoint
SecuriTeam Blogs
Information Security News Desk
Alert Logic
Draft Security Blog
National Cyber Security - Blogs
Arun Perinkolam's Weblog
Dana Epp's ramblings at the Sanctuary
Emergent Chaos
Security Notes
Errata Security
infosec « Tag Feed
Cheap Hack
Security Blanket
trimMail's Email Battles
Tenable Network Security
eEye Digital Security - Research Blog
Educated Guesswork
DoxPara Research
Security to the Core | Arbor Networks Security Blog
.NET Security Blog
Paul's Down-Home Page: Exchange, messaging, collaboration, security, and more
Latest Analysis for All Threats
Michael Howard's Web Log
Solution Accelerators - Security & Compliance
Anti-Malware Engineering Team
Abner Stories
The Security Development Lifecycle
Kaspersky Lab Weblog
Essential Computer Security
Information Manager Journal
Service Provider Journal
Burton Group Page Not Found
Kasun's Weblog
Information Security News Desk
Roger's Information Security Blog
Latest Blog Entires From WebSense Security Labs
LuFG Summerschool Applied IT Security
Page Not Found - ASP.NET Weblogs
Daemon on Security
Windows Security Logging and Other Esoterica
An Information Security Place
Sorry! We couldn't find your document
Security Watch
::PepperTech:: Security Management News Blog
darren_moffat@blog$ cat /dev/mem | grep /dev/urandom
Dancho Danchev's Blog - Mind Streams of Information Security Knowledge
The Security Blanket
Fermats Security Alerts
The Security Mentor
Usable Security
Matasano Chargen
McAfee Avert Labs Security Weblog
MVP Jubo Security Blog
Andreas Sterbenz's Blog
Financial Cryptography
Anton Chuvakin, O'Reilly Network
When {Puffy} Meets ^RedDevil^
Computing Research Policy Blog
Hex blog
Errata Security
F-Secure Antivirus Research Weblog
Fixing Email Weblog
: 404 Not Found
Security Response Weblog
Windows Incident Response
Static in the Ether
George Ou
Network Security Blog
Anti Rootkit Blog
A Bro Blog
Harry Waldron - Microsoft MVP Blog
Security Manifest
Security Fix
Sergey Simakov blog
Pinpoint Labs Blog
Security and Technology for SMB's and SOHO's Blog
MZL & Novatech Traffic & Bandwidth Statistics News
Andrew Carpenter
Bowulf Infosec & Network Admin Blog
ThreatFire Research Blog
Wired: Threat Level
The ICSI Networking Group Blog
Casper Dik's Weblog
Volatile Systems
-- Sleeve notes of a sysadmin --
Attack Research
Sam Gentile
404 - Not Found
Digital ID World Editors Corner
Solution Accelerators - Security & Compliance
Security Blog
Phil Windley's Technometria
Schneier on Security
Kim Cameron's Identity Weblog
fes' WebLog
Dan Anderson's Weblog
The Security Skeptic
Nth world commentaries
1 Raindrop
Spam Filtering Techniques
Crypto-World - news
Krebs on Security
October 31, 2014

Infographic: The Many Faces of Today's Hackers
infosec « Tag Feed

How many of these hacker personas are you dueling with in your organization? from Dark Reading: http

CurrentC gets user email addresses pickpocketed
SophosLabs blog

CurrentC is a competitor to Apple Pay and Google Wallet. Should we worry about it getting its fingers into our bank accounts, given the recent data breach?

How bots and zombies work, and why you should care
SophosLabs blog

You probably have a firewall that blocks inbound network connections by default. So how come cybercrooks can send commands to your computer if it's infected with a bot or zombie?

Don't wear your Google Glass or other wearables when watching a movie
SophosLabs blog

Two trade groups have officially adopted a zero-tolerance policy against all wearable recording devices being on during showtime.

Forget trick-or-treating Kill a Zombie this Halloween
SophosLabs blog

The crooks can't have a botnet without the bots to join it. So let's take their bots away! Killing computer zombies is the perfect sort of altruism: you help the global internet community simply by helping yourself.

Setting HoneyTraps with ModSecurity: Adding Fake Cookies
ModSecurity Blog

This blog post continues with the topic of setting "HoneyTraps" within your web applications to catch attackers. Please review the previous posts for more examples: Project Honeypot Integration Unused Web Ports Adding Fake robots.txt Entries Adding Fake H

Orgs choose network performance over security
infosec « Tag Feed

An alarming number of organizations are disabling advanced firewall features in order to avoid signi

How to Tell Data Leaks from Publicity Stunts
infosec « Tag Feed

In an era when new consumer data breaches are disclosed daily, fake claims about data leaks are sadl

Hacking Trademarks for Free Culture
You Know What's Stupid? Everything I Don't Understand

October 30, 2014

Chip & PIN vs. Chip & Signature
Krebs on Security

The Obama administration recently issued an executive order requiring that federal agencies migrate to more secure chip-and-PIN based credit cards for all federal employees that are issued payment cards. The move marks a departure from the far more preval

Over one-third of all enterprise data leakage policy violations occur on mobile devices
infosec « Tag Feed

Nearly half of all cloud app activities and more than one-third of all data leakage policy violation

Pirate Bay Founder Convicted on Hacking Charges
Wired: Threat Level

Pirate Bay Founder Convicted on Hacking Charges

The founder of the file-sharing site Pirate Bay was found guilty today in Denma

Hackers Are Using Gmail Drafts to Update Their Malware and Steal Data
infosec « Tag Feed

In his career-ending extramarital affair that came to light in 2012, General David Petraeus used a s

Epidemic of medical data breaches leaking our most sensitive information
SophosLabs blog

Health data is considered among the most private of information, but continues to leak out in a dazzling range of ways.Millions of Drupal websites at risk from failure to patch
SophosLabs blog

You should assume that your Drupal 7 website has been compromised if you didn't patch it within 7 hours of the release of Drupal 7.32 on 15 October 2014.US CERT warning Backoff POS agent impacts over 1000 businesses
Harry Waldron - Microsoft MVP Blog


ISC StormCast for Wednesday, October 29th 2014, (Wed, Oct 29th)
infosec « Tag Feed

…(more)… from SANS Internet Storm Center, InfoCON: green via IFTTT

3 ways to make your Gmail account safer
SophosLabs blog

Following on from our detailed guide to securing your webmail, here's a quick breakdown of how to make the most important fixes, for users of Google's Gmail.3 ways to make your account safer
infosec « Tag Feed

Following up on our detailed guide to securing your webmail, here’s a quick breakdown of how t

Snapchat escapes Australian cyberbullying crackdown, for now
SophosLabs blog

Australia's cyberbullying crackdown won't see the country putting any legal muscle into forcing "smaller" social media firms like Snapchat to take down harassing content, a Parliament spokesman said on Tuesday. White House networks hacked
SophosLabs blog

Attackers broke into unclassified White House computer networks in the past 2-3 weeks. It's far from surprising, one unnamed official said, given that it's a "constant battle" between the government, trying to secure its sensitive systems, and bad actors

Crooks use stolen magnetic payment card info to make fraudulent chip-enabled transactions
infosec « Tag Feed

The chip and PIN payment card system – or EMV – is considered to be more secure than the

ShellshockRelated Attacks Continue, Targets SMTP Servers
TrendLabs | Malware Blog - by Trend Micro

A new Shellshock attack targeting SMTP servers was discovered by Trend Micro. Attackers used email to deliver the exploit. If the exploit code is executed successfully on a vulnerable SMTP server, an IRC bot known as JST Perl IrcBot will be downloaded and

Intel launches online data protection solution for retail -
infosec « Tag Feed

Intel launches online data protection solution for retailFibre2fashion.comThe Intel Data Protection

all content is copyright its respective owner or owners.

the technology behind infosec daily is partially copyright © 2003-2008 jose nazario.