background preloader

NeWeb Security

Facebook Twitter

Data Protection. Legal Issues in Cyber Security 2015. Legal issues in Cyber Security. Major security hole allows Apple passwords to be reset with only email address, date of birth (update) Apple yesterday rolled out two-step verification, a security measure that promises to further shield Apple ID and iCloud accounts from being hijacked.

Unfortunately, today a new exploit has been discovered that affects all customers who haven't yet enabled the new feature. It allows anyone with your email address and date of birth to reset your password — using Apple's own tools. We've been made aware of a step-by-step tutorial (which remains available as of this writing) that explains in detail how to take advantage of the vulnerability. The exploit involves pasting in a modified URL while answering the DOB security question on Apple's iForgot page. It's a process just about anyone could manage, and The Verge has confirmed the glaring security hole firsthand. Out of security concerns, we will not be linking to the website in question.

Needless to say, if you haven't enabled two-step verification for your Apple account, we urge you to waste no time in doing so. LulzSec. Background and history Some in the security community contended that the group raised awareness of the widespread lack of effective security against hackers.[17] They were credited with inspiring LulzRaft, a group implicated in several high-profile website hacks in Canada.[18] Former members and associates LulzSec consisted of seven core members.[22] The online handles of these seven were established through various attempts by other hacking groups to release personal information of group members on the internet, leaked IRC logs published byThe Guardian, and through confirmation from the group itself.[27] Other members still may be active as to this time, they have not yet been identified. Ideology An ASCII graphic used by the group in its Chinga La Migra torrent,[42] an associated statement,[43] and also appearing in press coverage.[44] The group's latest attacks have had a more political tone.

Initial targets The group's first attacks came in May 2011. Corporate attacks Denied attacks See also. PSafe Home - Breaking News on Behance. Segurança, Confiança e Tranquilidade para a Vida Digital dos Brasileiros. The Guardian Project | Mobile Apps and Code You Can Trust. EncryptAllthethimgs.net. NeWeb.

Cryptix

Privacy Groups Pan Cameron’s Encryption Proposals as Unworkable. Cameron wants to ban encryption – he can say goodbye to digital Britain | Jam... On Monday David Cameron managed a rare political treble: he proposed a policy that is draconian, stupid and economically destructive. The prime minister made comments widely interpreted as proposing a ban on end-to-end encryption in messages – the technology that protects online communications, shopping, banking, personal data and more. “[I]n our country, do we want to allow a means of communication between people which we cannot read?” , the prime minister asked rhetorically. To most people in a supposed liberal democracy, the answer would surely be “yes”: the right to privacy runs right in parallel to our right for free expression. This means that even in principle Cameron’s approach is darkly paradoxical: the attack on Paris was an attack on free expression – but it’s the government that intends to land the killing blow.

Terrorists must not be allowed to disrupt our way of life, we’re often told in the wake of atrocities. Most messaging apps are global, and not built in the UK. The top 10 data breaches of the past 12 months. Most Internet users are accustomed to changing their online passwords regularly. They limit their shopping to sites with a trusted security certificate, and use companies like PayPal for safe transactions. But the last year has demonstrated that even the most cautious user is vulnerable to data breaches that can lead to fraud and identity theft. Luckily, timely disclosure about these breaches is becoming more standard for the organizations affected, enabling users to act quickly to change their passwords and check their credit reports. However, with data breaches becoming more common, the best Internet users can hope for is that these quick security fixes, plus a new password, will be enough to protect them in the future.

Here are the top ten data and security breaches of the past twelve months—the year some have called the year of the stolen password. 1. The Heartbleed encryption bug is probably the biggest and best-known breach of the last 12 months (if not the last few years). 2. 3. Staples Estimates Hackers Breached 1.16 Million Credit Cards. In North Korea, hackers are a handpicked, pampered elite. Cyber Security. Cyberspace Privacy. NeWeb Privacy.

Internet tools. NeWeb Modules. Web World Things. Dead Drops. Ethical Hacking. Ethical Hacking. Cybersecurity. 9 Tips to Stay Safe on Public Wi-Fi. Your bank calls you to verify your recent $750 bill at an out-of-state Taco Bell, but you haven’t left town in weeks. You quickly contest the charge and request a new credit card, but when you check your wallet the compromised card is still there. You try to think of shady ATMs or recent cashiers, but nothing comes to mind. Nothing, except the online purchase you made while browsing the Internet at your local coffee shop. The number of free public Wi-Fi hotspots is growing, but not every hotspot can provide the protection of a private home network. 1. You may share your music library, printers or files, or even allow remote login from other computers on your Wi-Fi network in the privacy of your own home.

If you’re using a Windows PC, you’ll want to start by opening the advanced sharing settings of the Homegroup section of the Network and Internet settings in the Control Panel. 2. The most secure way to browse on a public network is to use a virtual private network. 3. 4. 5. 6. 7. 8. 9. How to Crack a Wi-Fi Network. | Arrow Webzine. 1.Back Track Today we’re going to run down, step-by-step, how to crack a Wi-Fi network with WEP security turned on. Dozens of tutorials on how to crack WEP are already all over the internet using this method.

Seriously—Google it. This ain’t what you’d call “news.” But what is surprising is that someone like me, with minimal networking experience, can get this done with free software and a cheap Wi-Fi adapter. Unless you’re a computer security and networking ninja, chances are you don’t have all the tools on hand to get this job done. . * A compatible wireless adapter—This is the biggest requirement. . * A BackTrack 3 Live CD. . * A nearby WEP-enabled Wi-Fi network. . * Patience with the command line. To crack WEP, you’ll need to launch Konsole, BackTrack’s built-in command line. First run the following to get a list of your network interfaces: The only one I’ve got there is labeled ra0.

Now, run the following four commands. {*style:<i>airmon-ng stop (interface) ifconfig (interface) down </i>*} 3. Most Common Passwords. Roleplay. Learn to play songs by ear! Free Ear Training. [Video Tutorial] How to build google chrome extensions Update: See my analysis of the most common passwords from singles.org and other hacked databases. Most people are clueless as to how accounts are hacked and their passwords reflect that. If you find anything in common with the most common passwords below you have a weak password. Most Common Passwords 123456, 123, 123123, 01234, 2468, 987654, etc123abc, abc123, 246abcFirst NameFavorite BandFavorite Songfirst letter of given name then surnameqwerty, asdf, and other keyboard rollsFavorite cartoon or movie characterFavorite sport, or sports starCountry of originCity of originAll numbersSome word in the dictionaryCombining 2 dictionary wordsany of the above spelled backwardsaaa, eee, llll, 999999, and other repeat combinations Common Extensions Some sites force you to have passwords with both numbers and letters.

My opinion on an Ideal password Words in the Dictionary Numbers Share: YouTube. 3 Best Resources To Find Known Sites With Spyware & Viruses. Malware causes worldwide economic damage in the multi-billion dollar range and even though users are ever more aware of good security practices, it continues to be a head-to-head race between malicious software and the defense against it. Many users catch malware through browsing online. Thus not visiting known sites with spyware and viruses in the first place is an effective way to keep the computer safe. This articles shows you 3 resources that will lower your risk of visiting malicious sites by accident. Although you can search online domain lists for unsafe websites, a browser plugin is by far the most convenient way to automatically identify and avoid malicious websites.

Web Of Trust (WOT) Type: Browser plugin, website Service: website ratings based on user experience and domain listings Supports: Firefox, Google Chrome, Internet Explorer, Safari, Opera, Bookmarklet WOT does more than alert users about potential spyware and viruses. LinkExtend Type: browser toolbar Supports: Firefox. 7 Ways to Stop NSA Spying on Your Smartphone – Tom's Guide. Recently uncovered PowerPoint slides used by the National Security Agency and its British equivalent indicate that the spy agencies have been intercepting personal data sent by "leaky" smartphone apps. The New York Times, the Guardian and ProPublica all reported that documents provided by former NSA contractor Edward Snowden showed that the agency and Britain's GCHQ collected data transmitted "in the clear" by "Angry Birds," Facebook, Flickr, Flixster, Google Maps, LinkedIn, Photobucket and Twitter. In addition to the vast amount of personal data being transmitted unencrypted across open cellular networks by the apps themselves, the agencies were reportedly able to get even more intrusive information — including a person's religion, sexual orientation and marital status — from third-party advertising networks that placed ads in smartphone apps.

MORE: 30 Best Apps for Rooted Android Phones None of this spying is difficult, or surprising. 1. 2. 3. 4. 5. 6. 7. Zero-day exploits: Should the hacker gray market be regulated? Courtesy Adriel Desautels. Behind computer screens from France to Fort Worth, Texas, elite hackers hunt for security vulnerabilities worth thousands of dollars on a secretive unregulated marketplace. Ryan Gallagher is a journalist who reports on surveillance, security, and civil liberties. Follow Using sophisticated techniques to detect weaknesses in widely used programs like Google Chrome, Java, and Flash, they spend hours crafting “zero-day exploits”—complex codes custom-made to target a software flaw that has not been publicly disclosed, so they can bypass anti-virus or firewall detection to help infiltrate a computer system. Like most technologies, the exploits have a dual use. Some legitimate companies operate in a legal gray zone within the zero-day market, selling exploits to governments and law enforcement agencies in countries across the world.

The importance of zero-day exploits, particularly to governments, has become increasingly apparent in recent years. CWE/SANS TOP 25 Most Dangerous Software Errors. What Errors Are Included in the Top 25 Software Errors? Version 3.0 Updated June 27, 2011 The Top 25 Software Errors are listed below in three categories: The New 25 Most Dangerous Programming Errors The Scoring System The Risk Management System Click on the CWE ID in any of the listings and you will be directed to the relevant spot in the MITRE CWE site where you will find the following: Ranking of each Top 25 entry, Links to the full CWE entry data, Data fields for weakness prevalence and consequences, Remediation cost, Ease of detection, Code examples, Detection Methods, Attack frequency and attacker awareness Related CWE entries, and Related patterns of attack for this weakness.

Each entry at the Top 25 Software Errors site also includes fairly extensive prevention and remediation steps that developers can take to mitigate or eliminate the weakness. Archive Insecure Interaction Between Components Risky Resource Management Porous Defenses Mark J. Tokenized data. Banks push for tokenization standard to secure credit card payments | Computerworld. A group representing 22 of the world's largest banks is pushing for broad adoption in the U.S. of payment card technology called tokenization, citing shortcomings in the planned migration to the Europay MasterCard Visa (EMV) smartcard standard over the next two years.

The Clearing House Payments Company (TCH), whose owners include Bank of America, Citibank, Capital One and JP Morgan Chase, is working with member banks to see how tokenization can be applied to online and mobile payment environments to protect against fraud. The effort stems from what the group says is the need to address gaps in the EMV standard involving mobile and online transactions. "EMV has been out there for close to 20 years" and has served its purpose well, said Dave Fortney, senior vice president, product development and management for The Clearing House. While the planned migration has its benefits, EMV is not quite the panacea that many assume it is, Fortney said. Tokenization is not new. Burp Suite. Burp Suite is an integrated platform for performing security testing of web applications.

Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application's attack surface, through to finding and exploiting security vulnerabilities. Burp gives you full control, letting you combine advanced manual techniques with state-of-the-art automation, to make your work faster, more effective, and more fun. Burp Suite contains the following key components: Burp is easy to use and intuitive, allowing new users to begin working right away. Screenshots - click to enlarge. Largest Cyber-Attack in History Hits Pro-Hong Kong Protest Websites. Websites supporting the pro-democracy protesters in Hong Kong have been hit with a series of DDoS attacks which have been described as the largest in history. (Bobby Yip/Reuters) A series of cyber attacks against websites supporting Occupy Central protestors in Hong Kong have been described as the biggest cyber attacks ever recorded. Over the last few months two independent news websites which have been covering the Occupy Central protests which began in September following the announcement of a decision by China's Standing Committee of the National People's Congress on proposed electoral reform.

The websites, Apple Daily and PopVote, have been vocal supporters of the pro-democracy protests and even carried out mock chief executive elections for Hong Kong. According to Matthew Prince, CEO of Cloudflare, the attacks have hit 500 gigabits per second (Gbps), which tops attacks in February of 400Gbps that were at the time the biggest in internet history. Who is behind the attacks? DDoS amplified. 'Uncrackable' codes set for step up. 4 September 2013Last updated at 13:09 ET By Melissa Hogenboom Science reporter, BBC News Quantum cryptography is a way to share secret digital keys A system that allows electronic messages to be sent with complete secrecy could be on the verge of expanding beyond niche applications.

A team of British scientists has discovered a way to build communications networks with quantum cryptography at a larger scale than ever before. Quantum cryptography has the potential to transform the way sensitive data is protected. Details appear in Nature journal. The system is based on a communication system, where information is carried by individual photons - single particles of light. Once these single photons of light are observed, they change. Continue reading the main story Quantum key distribution Secret communication The team says they have now extended the way to send uncrackable codes - referred to as "quantum key distribution" (QKD) - beyond very niche applications. Mobile cryptography. 3 Internet of Things Security Nuances You May Not Have Considered. HTTPS Everywhere.

Five Best Browser Security Extensions. 5 Million Online Passwords Leaked, Check Yours Now [Updated] Passwords hacked russian bitcoin. Your Email Password Might Be For Sale. Change It, Now. A Guide to Safeguarding Your Social Media for Small Business. AVG | Antivirus and Internet Security | Virus Protection. Collective-intelligence-framework - a framework for warehousing intelligence bits. Daily cyber threats and internet security news: network security, online safety and latest security alerts. Public Proxy Servers.

By Country • Proxy Site List. Web Proxies - sorted by country and software.