recentpopularlog in

po : security   708

« earlier  
Introducing Firefox Send, Providing Free File Transfers while Keeping your Personal Information Private - The Mozilla Blog
Firefox Send, send.firefox.com, is a free encrypted file transfer service that allows users to safely and simply share files from any browser.
tools  filesharing  file.sharing  dropbox  firefox  security  mozilla  privacy  collaboration  encryption 
6 days ago by po
Triton is the world’s most murderous malware, and it’s spreading - MIT Technology Review
The rogue code can disable safety systems designed to prevent catastrophic industrial accidents. It was discovered in the Middle East, but the hackers behind it are now targeting companies in North America and other parts of the world, too.
archive  security  malware 
12 days ago by po
Open Source Password Management Solutions | Bitwarden
Bitwarden is a free and open source password management solution for individuals, teams, and business organizations.
password.management  opensores  security  hosted 
26 days ago by po
Vulnerable By Design ~ VulnHub
VulnHub provides materials allowing anyone to gain practical hands-on experience with digital security, computer applications and network administration tasks.
infosec  training  security  adversaries  tutorials  howto  exploits  guides  interesting 
5 weeks ago by po
Okta | Always On
The Okta Identity Cloud provides secure identity management with Single Sign-On, Multi-factor Authentication, Lifecycle Management (Provisioning), and more.
authentication.service  authentication  identity.management  sso  saas  infosec  opsec  security 
6 weeks ago by po
How to Find Hidden Cameras and Spy Bugs (The Professional Way) - Sentel Tech Security
How to Find Hidden Cameras and Spy Bugs (The Professional Way) is an in depth guide on how to find and identify hidden cameras, GPS trackers, and secret audio bugs. The guide uses techniques that anyone can use, along with some low cost detectors that will find most any covert bug
surveillanceware  surveillance  spyware  hidden.device  privacy  security  physical.security  cameras  guide  detection  infrared  rfi 
8 weeks ago by po
FiloSottile/mkcert: A simple zero-config tool to make locally trusted development certificates with any names you'd like.
A simple zero-config tool to make locally trusted development certificates with any names you'd like. - FiloSottile/mkcert
security  tools  ssl  https  localhost  tls  certificates  pki  root.stores  golang  testing 
9 weeks ago by po
Amazon gibt intime Alexa-Sprachdateien preis | heise online
Durch einen Fehler von Amazon.de fielen rund 1700 Alexa-Sprachaufzeichnungen in die Hände eines Unbefugten.
amazon  alexa  infosec  security  surveillance.capitalism  audio  privacy  panopticon  gdpr 
december 2018 by po
OpenBSM auditing on Mac OS X | Der Flounder
Way back in 10.3.x, Apple submitted Mac OS X and Mac OS X Server to the National Information Assurance Partnership for Common Criteria certification. Common Criteria certification means that the the covered hardware and software has been tested and evaluated to make sure that it meets an established set of requirements for security and data…
osx  auditing  security  infosec  tools 
december 2018 by po
GitHub - theupdateframework/notary: Notary is a project that allows anyone to have trust over arbitrary collections of data
Notary is a project that allows anyone to have trust over arbitrary collections of data - theupdateframework/notary

Data signing, basically.
Looks like it still requires a secure channel for keys.
Which makes me wonder why they're not using pki or even pubic keys. (I may be misunderstanding the architecture.)
aws  containers  trust  data  docker  security  infosec  storage  tools  web.of.trust  tuf 
december 2018 by po
Secret Pass » Linux Magazine
Pass is a simple shell script that helps you manage and synchronize passwords using Git.
passwords  linux  tools  security  git 
december 2018 by po
BeyondTrust on Vimeo
BeyondTrust is the worldwide leader in Privilege-Centric Security, offering the most seamless and straightforward approach to preventing data breaches related to…
videos  infosec  security  jay.beale  linux 
december 2018 by po
Jay Beale (@jaybeale) | Twitter
The latest Tweets from Jay Beale (@jaybeale). @InGuardians Co-Founder, Bastille Linux, Book Series Editor, Author, Columnist, Speaker/Trainer, IT Security. InGuardians Seattle
twitter  security  funny  infrastructure 
december 2018 by po
Marriott just announced a data breach affecting 500 million people — Quartz
The hotel chain revealed a hack of its Starwood reservation system, potentially affecting a staggering 500 million people who booked stays since 2014.
mariott  breaches  infosec  fail  security  hotels 
november 2018 by po
Facebook executive grilled by unprecedented group of lawmakers from 9 countries - CBS News
The hearing comes just days after a British Member of Parliament seized a cache of documents​ that Facebook has spent months fighting to keep sealed
facebook  corruption  unsurprising  fail  russia  infosec  api  security  breaches  vectors 
november 2018 by po
GitHub - danielmiessler/SecLists: SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, f
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. - danielmiessler/SecLists
penetration.testing  pentest  security  infosec  lists  tools  fuzzing  testing  attack.vectors 
november 2018 by po
Amazon Inspector - Amazon Web Services (AWS)
Amazon Inspector from Amazon Web Services (AWS)
aws  security 
november 2018 by po
Amazon GuardDuty – Intelligent Threat Detection - AWS
Amazon GuardDuty offers continuous monitoring of your AWS accounts and workloads to protect against malicious or unauthorized activities. GuardDuty alerts you to activity patterns associated with account compromise and instance compromise, such as unusual API calls.
aws  security 
november 2018 by po
CIS Benchmark on AWS - Quick StartNIST on AWS - Quick Start
Learn about the Quick Start architecture and details for deploying security configurations for CIS AWS Foundations Benchmark in the AWS Cloud.
aws  security 
november 2018 by po
GitHub - MorteNoir1/virtualbox_e1000_0day: VirtualBox E1000 Guest-to-Host Escape
VirtualBox E1000 Guest-to-Host Escape. Contribute to MorteNoir1/virtualbox_e1000_0day development by creating an account on GitHub.
virtualbox  0day  vulnerabilities  infosec  security  exploit 
november 2018 by po
Tunnelblick | Free open source OpenVPN VPN client server software for Mac OS X and macOS
Tunnelblick | Free open source OpenVPN VPN client server software for Mac OS X and macOS
osx  openvpn  vpn  client  opensores  tools  infosec  security  gui 
november 2018 by po
Video analysis of Android banking Trojan found on Google Play - Lukas Stefanko
This Trojan lures victims into inserting their login credentials for social media, mobile banking and cryptocurrency apps.
android  security  malware  failboat 
november 2018 by po
Intel CPUs fall to new hyperthreading exploit that pilfers crypto keys | Ars Technica
Side-channel leak in Skylake and Kaby Lake chips probably affects AMD CPUs, too.
intel  cpu  fail  amd  infosec  security 
november 2018 by po
If you're worried about online privacy, you no longer have an excuse — Quartz
The fact that email addresses are the cornerstone of this identity scheme should give everyone pause.
The industry should be moving away from email, not toward it.
And yet, here we are.
panopticon  surveillance.capitalism  privacy  secrecy  infosec  security  email  digital.identity 
october 2018 by po
« earlier      
per page:    204080120160

Copy this bookmark:





to read