deoxy · news / SECURITY  cache

 Home · About · Category · CloudToday · Digest · MyNews · Search

ACLU Privacy & Technology
Mon Aug 19 16:43:03 2013 GMT

  • ACLU of Maine Responds to Governor’s Executive Order on Drones
  • NSA Casts Massive Dragnet Over Americans' International Communications
  • Mobile App Code of Conduct an Important Step Forward
  • ACLU Releases Documents on License Plate Scanners From Some 300 Police Departments Nationwide
  • ACLU-NC Releases Details of Automatic License Plate Reader Investigation
  • Maine Enacts Privacy Legislation for Cell Phones and Cameras
  • Senate Reaffirms Vote for Cell Phone Tracking Bill
  • New Law Requires Warrants for Cell Phone Tracking
  • ACLU of Florida Calls for Warrant Requirement Following Breach of Florida Prescription Database
  • ACLU of Florida Calls for Federal Officials to Investigate Leak of 3,300 Floridians’ Prescript...
  • Data Breaches
    Fri Aug 29 07:44:55 2014 GMT
      » FEEDSITE

  • J.P Morgan Chase
  • Dairy Queen
  • Imhoff & Associates, PC
  • Milpitas Knights PAL Youth Football
  • The Hand Care Center/Shoulder and Elbow Institute
  • Long Beach Internal Medical Group
  • Geekface LLC
  • BioReference Laboratories, Inc./CareEvolve, Inc.
  • US Investigations Services (USIS)
  • ManagedMed Inc (A Psychological Corporation)
  • Cedars-Sinai Medical Center, Los Angeles
  • The UPS Store
  • Community Health Systems
  • MeetMe, Inc.
  • Albertsons/AB Acquisitions LLC
  • Supervalue
  • Orthopaedic Specialty Institute Medical Group
  • Freedom Management Group, LLC dba The Natural
  • Papers, Please!
    Wed Aug 27 22:45:10 2014 GMT
      » FEEDSITE

  • “I don’t want a unitary, unfakeable identity.”
  • Passenger tracking = “Happy Flow” at Aruba Airport
  • FOIA appeals reveal problems with PNR data
  • Sai v. TSA: A case study in TSA secrecy
  • Lawsuit challenges “watchlisting” of Michigan Muslims
  • Another brick in the (falling) REAL-ID wall
  • One million people are on watchlists, but all travelers are being watched
  • US government’s witchhunting manual made public
  • Is it a “state secret” that the no-fly list is unfair?
  • Court rules “no-fly” review procedures lack due process
  • Personal Security
    Wed Aug 27 10:46:28 2014 GMT
      » FEEDSITE

  • 7 Point Routine to Fortify Your iPhone Security
  • How Is A 5 GHz WI-Fi Better than 2.5 Ghz One?
  • 6 Most Common Smart Phone Users’ Security Mistakes
  • Apple Patented A New Location Tracking Technology Which Does Not Need G.P.S
  • Latentgesture Technology Might Be A Revolution For Smart Phone Security
  • Mini Camera To Take Surveillance. A Step Further Or New Threat?
  • The DeepFace project by Facebook
  • The Advent Of Anti- Spy Technology: Is It Really Possible To Completely Ward Off The Menace?
  • 5G Network In South Korea
  • Vulnerability Of Mobile Banking Apps
  • Register: Security
    Fri Aug 29 07:48:14 2014 GMT
      » FEEDSITE

  • Ice cream headache as black hat hacks sack Dairy Queen
  • ANZACs make pinkie-promise to end Indonesia spying
  • Feds salute plucky human ROBOT-FIGHTERS
  • Racing Post escapes ICO fine after leaking info of 677K punters
  • Russia-based hackers prime suspects in JPMorgan mega-breach
  • Researchers camouflage haxxor traps with fake application traffic
  • Netflix releases home-grown DDoS detectors
  • Oz fed police in PDF redaction SNAFU
  • Scratched PC-dispatch patch patched, hatched in batch rematch
  • Ouch... right in the VIDEO GAME: Lizard Squad attacks XBox, Twitch
  • Securobods warn of wide open backdoor in Netis/Netcore routers
  • PCI Council wants YOU to give it things to DO
  • Goog says patch⁵⁰ your Chrome
  • Show Mother Russia you love her: Click HERE and AHHH NYET!
  • ‪‪Email list hack flap at 'sleep with a stranger' site Couchsurfing‬
  • Researcher details how malware gives AV the slip
  • Attack flogged through shiny-clicky social media buttons
  • Three quarters of South Korea popped in online gaming raids
    Mon Jun 11 16:47:27 2012 GMT
      » FEEDSITE

  • Cisco Zine: How to create self-signed certificates
  • Cisco Zine: Unicast flooding due to asymmetric routing
  • Acros Security: Adobe Reader X (10.1.2) msiexec.exe Planting
  • Cisco Zine: Twelve Cisco vulnerabilities
  • Marco Ramilli's Blog: CVE-2012-0507
  • Cisco Zine: How to perform SSH RSA User Authentication
  • Offensive Security: FreePBX Exploit Phone Home
  • Cisco Zine: Cisco Linksys WVC200 Wireless-G PTZ Internet Video Camera buffer overflow
  • arstechnica: How Anonymous plans to use DNS as a weapon
  • arstechnica: Doxed: how Sabu was outed by former Anons long before his arrest
  • Marco Ramilli's Blog: Steganography Tools - a non exhaustive survey
  • arstechnica: Stakeout: how the FBI tracked and busted a Chicago Anon
  • The Register: Researchers find MYSTERY programming language in Duqu Trojan
  • Cisco Zine: Cisco Linksys WAG54GS CSRF Change Admin Password
  • Marco Ramilli's Blog: An interesting tool for your SwissKnife
  • Daily Mail: Turning the tables on Big Brother: Now internet users can watch who is spying on them
  • arstechnica: Malicious backdoor in open-source messaging apps not spotted for 3 months
  • Wired: Goldman Sachs Code-Theft Conviction Reversed
  • SANS Internet Storm Center
    Fri Aug 29 01:45:52 2014 GMT
      » FEEDSITE

  • Infocon: green
  • ISC StormCast for Friday, August 29th 2014, (Fri, Aug...
  • False Positive or Not? Difficult to Analyze Javascript, (Fri, Aug 29th)
  • ISC StormCast for Thursday, August 28th 2014, (Thu, A...
  • One More Day of Trolling in POS Memory, (Wed, Aug 27th)
  • Microsoft has modified and re-released MS14-045 - / https:/...
  • ISC StormCast for Wednesday, August 27th 2014, (Wed, ...
  • ISC StormCast for Tuesday, August 26th 2014, (Tue, Au...
  • Point of Sale Terminal Protection - "Fortress PCI at the Mall", (Tue, Aug 26th)
  • Trolling Memory for Credit Cards in POS / PCI Environments, (Tue, Aug 26th)
  • UDP port 1900 DDoS traffic, (Mon, Aug 25th)
    Fri Aug 15 01:48:36 2014 GMT
      » FEEDSITE

  • Drupal Invitation Access Bypass Vulnerability
  • GNOME Display Manager Locally Denial Of Service Vulnerability
  • Linux Kernel Denial Of Service Or Unauthorized Privilege Gain Vulnerability
  • PHP-Fusion Unauthorized Backup Access Vulnerabilities
  • RSA BSAFE SSL-J SSLSocket Malformed Handshake Remote DoS Vulnerability
  • Sophos Anti-Virus Global Object Manipulation Local DoS Vulnerability
  • Router Advertisement Daemon Unauthorized Privilege Vulnerability
  • Android OpenSSL PRNG Vulnerability
  • Technicolor TC7200 /goform/system/GatewaySettings.bin System Backup Remote Disclosure Vulnerability
  • IBM Content Navigator URL Action Modification Unauthorized Configuration Database Deletion Vulnerab...
  • Atlassian JIRA Importers Plugin Remote Traversal File Creation Vulnerability
  • Cisco Unified Computing System Central Software Crafted Local-Mgmt Context Copy Command Handling Loc...
  • Cisco Unified Communications Manager (CUCM) Log4jinit Application Unauthenticated Remote Access Vuln...
  • Command School Student Management System /sw/add_topic.php Topic Creation CSRF Vulnerability
  • Jenkins Main/java/hudson/model/ Remote Cause Node Stored XSS Vulnerability
  • Cisco Intrusion Prevention System (IPS) Jumbo Frame Handling Analysis Engine Remote DoS Vulnerability
  • Apple QuickTime Movie File Dref Atom Handling Memory Corruption Vulnerability
  • Base SAS Program File Handling Buffer Overflow Vulnerability
  • Security Alert
    Tue May 7 16:45:20 2013 GMT
      » FEEDSITE

  • Don’t fall for the Facebook privacy notice hoax
  • With shopping scams on the rise, watch for these threats
  • US teens lead the way for shady, risky online behavior
  • Here's how to secure your email and avoid becoming a ‘Petraeus’
  • Attention shoppers: Patch IE now before you shop online
  • Out of date, vulnerable browsers put users at risk
  • Study finds 25 percent of Android apps to be a security risk
  • Windows 8 raises the bar for PC security
  • Webroot SecureAnywhere 2013 adds protection for Mac OS X
  • Kaspersky Lab announces a brand-new OS focused on security
  • Microsoft plans patch for critical flaw in Word next Tuesday
  • Microsoft pushes out critical security updates for Internet Explorer
  • What you need to know about the Internet Explorer zero-day attacks
  • Microsoft confirms patch for Flash in IE10 coming soon
  • The FBI’s Next Generation Identification program could spot faces in a crowded street
  • Get ready: Microsoft is raising the bar for encryption keys
  • Apple device IDs hacked: What you need to know
  • Plan X: DARPA’s Cyberwar
  • SecurityFocus Vulns
    Thu Aug 28 19:46:11 2014 GMT
      » FEEDSITE

  • Vuln: IBM PowerVC 'api-paste.ini' Multiple Insecure File Permissions Vulnerabilities
  • Vuln: Cisco 1800 Series CVE-2014-3347 Denial of Service Vulnerability
  • Vuln: Linux Kernel 'mac80211/sta_info.c' NULL Pointer Dereference Denial of Service Vulnerab...
  • Vuln: Linux Kernel 'drivers/net/wireless/ath/ath9k/xmit.c' Denial of Service Vulnerability
  • Bugtraq: Re: SaaS Marketing platform Hubspot export vulnerability
  • Bugtraq: [SECURITY] [DSA 3014-1] squid3 security update
  • Bugtraq: SEC Consult SA-20140828-0 :: F5 BIG-IP Reflected Cross-Site Scripting
  • Bugtraq: Aerohive Hive Manager and Hive OS Multiple Vulnerabilities
  • More rss feeds from SecurityFocus
  • US-CERT National Cyber Alert
    Mon Feb 25 20:43:59 2013 GMT
      » FEEDSITE

  • TA13-051A: Oracle Java Multiple Vulnerabilities
  • SB13-049: Vulnerability Summary for the Week of February 11, 2013
  • TA13-043B: Microsoft Updates for Multiple Vulnerabilities
  • TA13-043A: Adobe Updates for Multiple Vulnerabilities
  • SB13-042: Vulnerability Summary for the Week of February 4, 2013
  • SB13-035: Vulnerability Summary for the Week of January 28, 2013
  • TA13-032A: Oracle Java 7 Multiple Vulnerabilities
  • SB13-028: Vulnerability Summary for the Week of January 21, 2013
  • SB13-021: Vulnerability Summary for the Week of January 14, 2013
  • Virus Warnings
    Thu Aug 28 19:48:31 2014 GMT
      » FEEDSITE

  • OSX.Freezer
  • Backdoor.Ratenjay!gen3
  • Backdoor.Preft
  • Downloader.Ponik!gen8
  • Trojan.Tubrosa
  • OSX.Laoshu
  • Trojan.Rincux
  • Trojan.FakeAV!gen130
  • W32.Changeup!gen50
  • Backdoor.Darkmoon.G
  • Exp.CVE-2014-0546
  • Backdoor.Miras
  • W32.Changeup!gen49
  • Trojan.Cryptolocker.H
  • Infostealer.Ragua
  • Backdoor.Necurs!gen7
  • Trojan.Cryptdef!gen3
  • W32.Changeup!gen48
  • Wired Security
    Fri Mar 28 23:47:45 2014 GMT
      » FEEDSITE

  • Microsoft Curtails Email Snooping After Leak Controversy
  • Forget the NSA. Tech Companies May Be Reading Your Email Too
  • Facebook Fights Back Against the NSA Spy Machine
  • How Google Can Repel the Attack of the NSA Quantum Computer
  • Zuckerberg Phones Obama for Answers About NSA Spying
  • Only Your Heartbeat Can Unlock This Bitcoin Wallet
  • The NSA Is Building a Quantum Computer? We Already Knew That
  • Clash of the Titans! Inside Microsoft’s Battle to Foil the NSA
  • Swedes Shame the NSA With Gingerbread Data Center Spy Movie
  • Once You Use Bitcoin You Can’t Go ‘Back’ — And That’s Its Fatal Flaw
  • You Are Being Watched
    Sun Oct 24 23:08:06 2010 GMT
      » FEEDSITE

  • San Francisco Surveillance Cameras Don’t Reduce Violent Crime
  • Let's face it, soon Big Brother will have no trouble recognising you
  • Finding a Way to Review Surveillance Tape in Bulk
  • Obama Stimulus Buys $8M in Airport Spy Cameras
  • CCTV in the spotlight: one crime solved for every 1,000 cameras
  • UK Public to monitor CCTV from home
  • UK Traffic Cameras Used to Harass Peaceful Protestors

     deoxy · news / SECURITY  cache

     Home · About · Category · CloudToday · Digest · MyNews · Search