background preloader

Security

Facebook Twitter

Healthcare Privacy & Security Videos. Brandieself added: 7 Online Privacy Tools To Deter Snooping - The Vuze BlogThe Vuze Blog. 3 of the Best Radar Detector Apps. When it come to speed tickets, I think we can all agree that they have to be avoided at all costs first because they can really affect your wallet, because the speed tickets are never a pretty thing in one’s life and second, because they can make you paranoid whenever your radar detector is going off the charts.

3 of the Best Radar Detector Apps

How Tor is building a new Dark Net with help from the U.S. military. The Dark Net is and has always been under threat.

How Tor is building a new Dark Net with help from the U.S. military

This is the smart approach to take as the focus has been shifted to technology like the Tor-anonymizing network. Warnings from governments and hackers around the world have forced Tor’s decade-old secret service technology to its limits. Tor is creating the next-generation Dark Net in part to stay forward in the security race. With funding from the Defense Advanced Research Projects Agency, the U.S. military agency has been accused of designing the cutting edge of new technology. Feds warn first responders of dangerous hacking tool: Google Search. In a restricted intelligence document distributed to police, public safety, and security organizations in July, the Department of Homeland Security warned of a “malicious activity” that could expose secrets and security vulnerabilities in organizations’ information systems.

Feds warn first responders of dangerous hacking tool: Google Search

The name of that activity: “Google dorking.” “Malicious cyber actors are using advanced search techniques, referred to as ‘Google dorking,’ to locate information that organizations may not have intended to be discoverable by the public or to find website vulnerabilities for use in subsequent cyber attacks,” the for-official-use-only Roll Call Release warned. “By searching for specific file types and keywords, malicious cyber actors can locate information such as usernames and passwords, e-mail lists, sensitive documents, bank account details, and website vulnerabilities.” This code can hack nearly 90 percent of credit card readers in circulation. This is a facepalm moment for the credit card issues and retailers.

This code can hack nearly 90 percent of credit card readers in circulation

Nearly all credit card readers in United States are still using the default password which can be easily hacked into by cyber criminals. The passcode, set by default on credit card machines since 1990, has been exposed for so long there’s no sense in trying to hide it. It’s either 166816 or Z66816, depending on the machine. Using either of the two passwords, an attacker can gain complete control of a store’s credit card readers, potentially allowing them to hack into the machines and steal customers’ payment data. No wonder big retailers like Target and Home Depot keep on losing our credit card data to hackers. Researchers at Trustwave, a cybersecurity firm were quite flummoxed to find that retailers still use decades old passwords for credit card readers. Device makers sell machines to special distributors. RaiderSec: Resources. The following is a list of blogs, communities, or other miscellaneous resources that can provide some great reads and educational info on topics pertaining to security.

RaiderSec: Resources

Feel free to leave comments below if you think anything should be added! News Existing Vulnerability Research (what we aim to protect against): Multimedia Resources. Hacking%20-%20NMap%20Mindmap%20Reference.pdf. Ultimate Library of ICS Cyber Security Resources - SCADAhacker. Senate Torture Report Finds the CIA Was Less Effective and More Brutal Than Anyone Knew. Today the Senate Select Committee on Intelligence released the long-awaited 500-page executive summary from its $40 million report on the CIA's "enhanced interrogation" program, which senators have said documents the brutal techniques used against 119 high-level al Qaeda suspects.

Senate Torture Report Finds the CIA Was Less Effective and More Brutal Than Anyone Knew

Hackers Steal Up To $1 Billion From Banks. NEW YORK (AP) — A hacking ring has stolen up to $1 billion from banks around the world in what would be one of the biggest banking breaches known, a cybersecurity firm says in a report scheduled to be delivered Monday.

Hackers Steal Up To $1 Billion From Banks

The hackers have been active since at least the end of 2013 and infiltrated more than 100 banks in 30 countries, according to Russian security company Kaspersky Lab. After gaining access to banks' computers through phishing schemes and other methods, they lurk for months to learn the banks' systems, taking screen shots and even video of employees using their computers, the company says. And These Companies Want To Kill Them. Imagine sitting down in front of your computer or grabbing your smartphone and being able to seamlessly log in to every account you need.

And These Companies Want To Kill Them

Maybe your device recognizes your fingerprint, your eyes or your heartbeat. It just knows it’s you, and not an impostor. FACT SHEET: Cyber Threat Intelligence Integration Center. The White House Office of the Press Secretary For Immediate Release February 25, 2015 Today, the President directed the Director of National Intelligence (DNI) to establish the Cyber Threat Intelligence Integration Center (CTIIC).

FACT SHEET: Cyber Threat Intelligence Integration Center

The CTIIC will be a national intelligence center focused on “connecting the dots” regarding malicious foreign cyber threats to the nation and cyber incidents affecting U.S. national interests, and on providing all-source analysis of threats to U.S. policymakers. Purpose Cyber threats are among the gravest national security dangers to the United States. The CTIIC will provide integrated all-source intelligence analysis related to foreign cyber threats and cyber incidents affecting U.S. national interests; support the U.S. government centers responsible for cybersecurity and network defense; and facilitate and support efforts by the government to counter foreign cyber threats.

Authority. 15 Free Android VPN Apps To Surf Anonymously. Everyone is getting more concerned about the issue of Internet security especially when making transactions via mobile.

15 Free Android VPN Apps To Surf Anonymously

VPN (Virtual Private Network) is technology that enables you to add an extra level of security while you surf the Internet without compromising the privacy of personal data, even whilst using public WiFi networks. There are many ways to access the region-based blocked content as well but VPN software/apps provide a handy way to do so. For the ease of Android users, I have pooled together 10 of the top free Android VPN Apps along with some bonus apps that may prove to be useful. Recommended Reading: Send Anonymous Emails: 20 Sites To Keep Your Identity Hidden. Update: Spy agencies hacked SIM card maker's encryption. U.S. and U.K. intelligence agencies have reportedly hacked into the computer network of giant SIM card maker Gemalto and taken smartphone encryption keys potentially used by customers of hundreds of mobile phone carriers worldwide.

The Gemalto hack, by the U.S. National Security Agency and the U.K. Government Communications Headquarters (GCHQ), allowed the two spy agencies to monitor a large portion of the world's mobile phone voice and data traffic, according to a story in The Intercept. Your cellphone sharing data. Privacy International. Did GCHQ illegally spy on you? Have you ever made a phone call, sent an email, or, you know, used the internet? Spy vs. Spy Matters. Tracking Apps. Welcome to the Underground.

S!Ri.URZ - Cyberfox. Google tracks you. We don't. An illustrated guide. Google. Web Privacy. Tools: Security - Forensics - Pentesting - Ethical Hacking. Relakks - Surf anonymously with VPN and proxy. Cyber Security. Ethical Hacking. GlobaLeaks. SEC THREE. Socks 24. Fundamentals of Information Security. Online Privacy Tools. Tor. Encryption. Encryption.