recentpopularlog in


« earlier   
RT : Tuesday, 18th December, 12 noon GMT is the deadline for applying for these two Lectureships in
CyberSecurity  from twitter
yesterday by psychemedia
Concealing Network Traffic via Google Translate | Running the Gauntlet
This translate proxying method is often used by the malware if their domain or IP is blocked. The malware uses either Google Translate, Bing Translator, or Yahoo! Babel Fish for this purpose

After the malware downloads the webpage, they can parse the embedded iframe to access the data in the page. This even allows the malware to access embedded HTML comments on the page if that is what they are after.
cybersecurity  proxy  malware  google 
yesterday by bwiese
You can bet will be at . Will you be at the premier event for 2019?…
CPX360  CyberSecurity  from twitter
3 days ago by phoneboy
You can bet Check Point CheckMates will be at . Will you be at the premier event for 2019?…
CPX360  CyberSecurity  from twitter
3 days ago by phoneboy
CDs, faxes make comeback as military file-sharing service taken offline - News - Stripes
turning to CDs, DVDs, postal mail and even fax machines.

Both the Navy and Marine Corps issued official guidance late last month saying optical discs are the only way to securely send large files that contain private information like Social Security numbers or medical data, after the military disabled the Army’s Aviation and Missile Research, Development and Engineering Center Safe Access File Exchange, or AMRDEC SAFE.
filesharing  dod  cybersecurity  army 
3 days ago by bwiese
DOD disables file sharing service due to 'security risks' | ZDNet
"The AMRDEC SAFE site was taken offline Nov. 1 as a preventative measure after government-internal agencies identified potential security risks," an AMRDEC spokesperson told ZDNet in an email.

In a statement on the AMRDEC SAFE portal, the agency said it was "uncertain if the site will be reinstated."

"AMRDEC does not manage any other secure file transfer sites, nor are we aware of any other government-run sites. In the interim, IT and mission-related questions should be directed to your specific organization to determine alternative methods for secure file exchange," said AMRDEC officials.
army  service  filesharing  cybersecurity  korea  dod 
3 days ago by bwiese
.@viettan breaks down Hanoi’s “Cybersecurity” Law
"Striking against peaceful expression, Vietnam’s National Assembly passed a cybersecurity law to increase regulation and control over online activity. While the Vietnamese government had previously issued decrees on the management of internet services and online content, the new cybersecurity law is the first to specify that foreign companies must store user data in Vietnam and be subject to domestic law. Similar to other laws and decrees, the language used in the cybersecurity law is vague and open to interpretation. Much like the current Vietnamese penal code, the cybersecurity law provides the police with sweeping authority to arrest people under the guise of 'national security.' Due to take into effect on January 1, 2019, the cybersecurity law will be enforced by the Ministry of Public Security and Ministry of Information and Communications." - Viet Tan
otf  vietnam  cybersecurity  law  policy  SoutheastAsia  asia  seasia  viettan 
4 days ago by dmcdev
5G Security Transparency - Anthony Rutkowski, Dec 2018
"Fortunately, open global industry collaboration is more active today than at any point in history — especially now for 5G security. It is that collaboration that also provides significant 5G security transparency today. That transparency is more essential than ever. "
CircleID  5G  security  cybersecurity 
4 days ago by pierredv
Warning: Encrypted WPA2 Wi-Fi Networks Are Still Vulnerable to Snooping
It’s quite easy for someone to monitor this encrypted traffic. All they need is:

The passphrase: Everyone with permission to connect to the Wi-Fi network will have this.
The association traffic for a new client: If someone is capturing the packets sent between the router and a device when it connects, they have everything they need to decrypt the traffic (assuming they also have the passphrase, of course). It’s also trivial to get this traffic via “deauth” attacks that forcibly disconnect a device from a Wi_Fi network and force it to reconnect, causing the association process to happen again.
Really, we can’t stress how simple this is. Wireshark has a built-in option to automatically decrypt WPA2-PSK traffic as long as you have the pre-shared key and have captured the traffic for the association process.
wpa2  cybersecurity  crypto 
5 days ago by bwiese

Copy this bookmark:

to read