Good Reads For Information Security Domain

For February 2016

OpenSSL Releases Security Advisory for Several Vulnerabilities

Drupal Releases Critical Security Advisory for Multiple Vulnerabilities

Google Project Zero: The Definitive Guide on Win32 to NT Path Conversion

Angler Attempts to Slip The Hook

Nissan Leaf hackable through insecure APIs

OpenSSL CVE-2016-0799: heap corruption via BIO_printf

Judge Says Apple Doesn’t Have to Unlock iPhone in Case Similar to San Bernardino

Getting Domain Admin with Kerberos Unconstrained Delegation

For August 2014

Microsoft Patch Tuesday for August 2014

Adobe Patch Tuesday for August 2014

Security flaw allows to bypass PayPal two-factor authentication

WordPress and Drupal Denial Of Service Vulnerability

BlackHat 2014: Mobile Point of Sale Devices at Risk from Hackers

Blackphone: Inside a Secure Smart Phone

FinFisher Government Spy Software Secrets Revealed by Hackers

Attackers Used Multiple Zero-Days to Hit Spy Agencies in Cyber-Espionage Campaign

Synology devices hit with “Synolocker” ransomware

Automakers Openly Challenged To Bake In Security

Mozilla posts plan for certificate revocation checking

Some “Experts” Say Planes Cannot be Digitally Hijacked

US Federal Communications Commission Quizzes Wireless Providers About Speed Throttling Decisions

NIST Aims to Improve Industrial Control System Security with Testbed

Federal Judge Says Law Enforcement Can Access Entire eMail Account in Investigation

Verifying Preferred SSL/TLS Ciphers with nmap

Nest Thermostat Hack

Cryptowall Spreading via Yahoo! Ads

Xiaomi Phones Call Home With User Data

Exploiting Web Applications Using XSRF

Incident Response with Triage-IR

Blackphone Hacked

Oracle Data Redaction Easily Bypassed

For July 2014

MailPoet Vulnerability Exploited in the Wild – Breaking Thousands of WordPress Sites

Firefox 31 and Firefox ESR 24

Attackers abusing Internet Explorer to enumerate software and detect security products

Hacker worms his way into WSJ computer systems

Mayhem – a hidden threat for *nix web servers

New Back Door Trojan Program is No Fool

Far East Targeted by Drive by Download Attack

METRO.US Website Compromised to Serve Malicious Code

Black Hat Preview – Android crypto blunder exposes users to highly privileged malware

[Honeypot Alert] WordPress XML-RPC Brute Force Scanning

Changes in the Asprox Botnet

Neverquest Banking Trojan Updated to Include More Than 30 Financial Institutions in Japan

Snifula Banking Trojan Back to Target Japanese Regional Financial Institutions

Don’t Overestimate EMV Protections, Underestimate Card Thief Sophistication

How Thieves Can Hack and Disable Your Home Alarm System

Researchers Develop ‘BlackForest’ To Collect, Correlate Threat Intelligence

For March 2014

Microsoft issues Fix it for critical IE 0-day exploited in attacks

New Adobe Flash Player Zero-day Exploit Leads to PlugX

Major Apple security flaw: Patch issued, users open to MITM attacks

Android WebView Exploit, 70% Devices Vulnerable

Banking trojan hit a large number of Islamic Mobile Banking Customers

Cisco Announces OpenAppID – the Next Open Source ‘Game Changer’ in Cybersecurity

GnuTLS: Incorrect error handling in certificate verification

Hackers take control of 300,000 home routers

Hello, a new specifically covered exploit kit

Microsoft is using popups to warn XP users of impending end-of-support

VPN flaw makes Android Jelly Bean and KitKat susceptible to hijacking

Medical Device Security: The Hurdles – Analysis of the Pain Points and the Progress

Snort Alpha with OpenAppID, a quick introduction to getting started

For Feb 2014

Scanning for Symantec Endpoint Manager

Mysterious ‘Moon’ worm spreads into many Linksys routers ­ and hunts new victims

MSIE 0-day Exploit CVE-2014-0322 – Possibly Targeting French Aerospace Association

Fake SSL Certificates Uncovered: The Tip of the Iceberg and Weaponized Trust

HTTP NTLM Information Disclosure

Introducing ClamAV community signatures

Microsoft Update Tuesday: February 2014, huge fix for Internet Explorer

Careto: Covering unavailable samples

Corkow – the lesser-known Bitcoin-curious cousin of the Russian banking Trojan family

Microsoft to discontinue use of MD5 hashed digital certificates

How old data can come back to haunt you

Microsoft introduces multifactor authentication for all Office 365 users


Keep reading…

Tagged with: , ,
  • Very rapidly this website will be famous amid all blogging and site-building
    people, due to it’s fastidious posts