We received the following vulnerability advisory for a remote code execution vuln identified and ...(more)...
As part of most vulnerability assessments and penetration tests against a website, we almost alwa ...(more)...
ISC StormCast for Monday, October 20th 2014 http://isc.sans.edu/podcastdetail.html?id=4199, (Mon, Oct 20th) Mon, 20 Oct 2014 04:57:55 GMT
This past week Microsoft April 911 Outage Affected 3.5 Percent of U.S. Population Wed, 22 Oct 2014 19:47:22 +0000
A catastrophic failure in the emergency call management infrastructure cascaded into an incident that left 11 million out of reach of 911 dispatchers for six hours.
If you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.
We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.
Please reserve top level comments for those posting open positions.
You can see an example of acceptable posts by perusing past hiring threads.
Feedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
The Log Jammer blends into a natural setting to cut off that constant remote communication---to force people to experience the place they're in.
The post This Fake Log Jams Your Phone So You’ll Shut Up and Enjoy Nature appeared first on WIRED.
The FBI may get all the love (and movies), but the US Marshals Service is America’s oldest federal law enforcement agency. Brian Finke spent nearly four years embedded with the marshals, chronicling their daily lives with intimate, revealing images that peer into an often dangerous world. “I felt like it was my own version of the […]
The post Intimate Images of US Marshals From an Embedded Photographer appeared first on WIRED.
Apple's latest operating system OS X Yosemite pushes the limits of data collection tolerance: its desktop search tool Spotlight uploads your search terms in real time to Apple's remote servers, by default. Fortunately for Apple's angry users, however, this is one privacy invasion that's easy to cut short.
The post How to Stop Apple From Snooping on Your OS X Yosemite Searches appeared first on WIRED.
While revelations from Edward Snowden about the National Security Agency’s massive database of phone records have sparked a national debate about its constitutionality, another secretive database has gone largely unnoticed and without scrutiny. The database, which affects unknown numbers of people, contains phone records that at least five police agencies in southeast Virginia have been […]
The post Virginia Police Have Been Secretively Stockpiling Private Phone Records appeared first on WIRED.
Americans may have a Florida drug dealer to thank for expanding our right to privacy. Police departments around the country have been collecting phone metadata from telecoms and using a sophisticated spy tool to track people through their mobile phones—often without obtaining a warrant. But a new ruling out of Florida has curbed the activity […]
The post Cops Need a Warrant to Grab Your Cell Tower Data, Florida Court Rules appeared first on WIRED.
On Friday afternoon Kickstarter suspended the crowdfunding campaign for Anonabox, an initiative to sell a tiny, $45 router that would run all the user's online traffic over the anonymity network Tor.
The post Kickstarter Freezes Anonabox Privacy Router Project for Misleading Funders appeared first on WIRED.
The Tor-enabled router project known as Anonabox successfully tapped into thousands of Internet users' desire for simpler privacy tech. Unfortunately, it wasn't ready for the scrutiny that success brought with it.
The post Privacy Router Anonabox Gets $600K in Crowdfunding—And Huge Backlash appeared first on WIRED.
As a journalist, Laura Poitras was the quiet mastermind behind the publication of Edward Snowden’s unprecedented NSA leak. As a filmmaker, her new movie Citizenfour makes clear she’s one of the most important directors working in documentary today. And when it comes to security technology, she’s a serious geek.
The post Laura Poitras on the Crypto Tools That Made Her Snowden Film Possible appeared first on WIRED.
On a day when system administrators were already taxed addressing several security updates released by Microsoft, Oracle, and Adobe, there is now word of a new security hole discovered in a basic protocol used for encrypting web traffic. Its name is POODLE, which stands for Padding Oracle on Downgraded Legacy Encryption, and it was discovered […]
The post There Is a New Security Vulnerability Named POODLE, and It Is Not Cute appeared first on WIRED.
A cyberespionage campaign believed to be based in Russia has been targeting government leaders and institutions for nearly five years, according to researchers with iSight Partners who have examined code used in the attacks. The campaign, dubbed “Sandworm” is believed to have been running since 2009, and used a wide-reaching zero-day exploit uncovered by the […]
The post Russian ‘Sandworm’ Hack Has Been Spying on Foreign Governments for Years appeared first on WIRED.