The Lazy Genius

Security News & Brain Dumps from Xavier Ashe, a Bit9 Client Partner

Posts Tagged ‘Feedly’

Interesting Read: ParanoiDF – PDF Analysis & Password Cracking Tool

Posted by Xavier Ashe on August 13, 2014

As I browse the internet, I find security news that I find interesting. Here is one such article:

ParanoiDF – PDF Analysis & Password Cracking Tool

Original article from Darknet – The Darkside
Original article posted on August 13, 2014 at 11:15AM

Advertisements

Posted in Interesting Links | Tagged: , , , | Leave a Comment »

Interesting Read: Your PC or laptop may have a backdoor enabled by default, millions do

Posted by Xavier Ashe on August 13, 2014

As I browse the internet, I find security news that I find interesting. Here is one such article:

Your PC or laptop may have a backdoor enabled by default, millions do

Computrace software, which is enabled by default on millions of PCs, could allow attacker to remotely wipe the hard drive. Researchers described the "backdoor" in BIOS/UEFI, as well as how it can be exploited at Black Hat USA. Although the suggested threat mitigation is the deactive Computrace, that’s not always possible.

Original article from Computerworld Blogs – Security
Original article posted on August 13, 2014 at 10:03AM

Posted in Interesting Links | Tagged: , , , | Leave a Comment »

Interesting Read: How Hackable Is Your Car? Consult This Handy Chart

Posted by Xavier Ashe on August 6, 2014

As I browse the internet, I find security news that I find interesting. Here is one such article:

How Hackable Is Your Car? Consult This Handy Chart

Last year, when hackers Charlie Miller and Chris Valasek showed they could hijack the steering and brakes of a Ford Escape and a Toyota Prius with nothing but laptops connected to the cars, they raised two questions: Could hackers perform the same tricks wirelessly, or even over the Internet? And even more pressing: Is your […]



Original article from WIRED » Threat Level
Original article posted on August 06, 2014 at 06:30AM

Posted in Interesting Links | Tagged: , , , | Leave a Comment »

Interesting Read: Redefining “advanced persistent” adversaries?

Posted by Xavier Ashe on July 29, 2014

As I browse the internet, I find security news that I find interesting. Here is one such article:

Redefining “advanced persistent” adversaries?

Since the beginning of 2013, the popular press has documented many major information security intrusions and attacks. These stories have included veiled hints that the amount of sophistication suggests the intrusions are perpetrated by “advanced persistent” adversaries who must be sponsored by nation-states. Dell SecureWorks Counter Threat Unit™ (CTU) researchers have drawn a different conclusion based on evidence left behind from recent persistent intrusions in well-secured organizations.

Original article from Research Blog | Dell SecureWorks http://ift.tt/1tY5jxA
Original article posted on July 29, 2014 at 12:03PM

Posted in Interesting Links | Tagged: , , | Leave a Comment »

Interesting Read: Attackers Exploiting Flaws in Elasticsearch to Use Amazon’s Cloud Service for DDoS Attacks (July 28, 2014)

Posted by Xavier Ashe on July 29, 2014

As I browse the internet, I find security news that I find interesting. Here is one such article:

Attackers Exploiting Flaws in Elasticsearch to Use Amazon’s Cloud Service for DDoS Attacks (July 28, 2014)

Attackers have discovered a way to use Amazon cloud services to launch distributed denial-of-service (DDoS) attacks on other websites by exploiting flaws in Elasticsearch, an open-source analytics application…….

Original article from SANS NewsBites http://ift.tt/1lSC6Pp
Original article posted on July 29, 2014 at 02:36PM

Posted in Interesting Links | Tagged: , , | Leave a Comment »

Interesting Read: Android busted for carrying Fake ID: OS doesn’t check who really made that ‘Adobe’ plugin

Posted by Xavier Ashe on July 29, 2014

As I browse the internet, I find security news that I find interesting. Here is one such article:

Android busted for carrying Fake ID: OS doesn’t check who really made that ‘Adobe’ plugin

Versions 2.1 to 4.4 affected – is your gadget patched?

Google Android allows malware to masquerade as legit, trusted apps thanks to weaknesses in the way the operating system checks digital certificates of authenticity.…

from The Register – Security http://ift.tt/1rZEgmc
posted on July 29, 2014 at 05:43PM via IFTTT

Posted in Interesting Links | Tagged: , , , | Leave a Comment »

 
%d bloggers like this: