background preloader

Sec

Facebook Twitter

Help Net Security - Risks. A new defense against kernel-mode exploits Posted on 17 June 2014. | Over the past many years, there’ve been a plethora of security solutions available for Windows-based endpoints, but most of them are helpless against malicious code targeting the kernel - even when we employ layered security and stack them one upon the other.

Help Net Security - Risks

Being a CISO at a higher education institution Posted on 17 June 2014. | Matt Santill, CISO of Broward College, talks about the requirements and peculiarities of his job, the technologies the college uses to make its network safe, and offers advice for CISOs working in other educational institutions. Five great computer security tips that few people follow Posted on 16 June 2014. | If you’re an infosec professional, you probably know a ton of security tips and best practices. Mobile security risks and challenges The state of GRX security Posted on 12 June 2014. | How easy is it to breach the systems of existing GRX providers?

Google Translate. Crypto-Gram, June 2013 (in EPUB and MOBI format) Cell phone privacy guide (Android) - Encrypt Everything. InfoSec News Summary - Internet Security. Cryptome. Fraud, Phishing and Financial Misdeeds. Security Sense - Infosec on the Loose, for individuals and organizations alike. Slashdot: News for nerds, stuff that matters. Internet security for everyone. Android - Platforms. DuckDuckGo is a software-as-a-service (SaaS) hosted around the world that provides you with anonymous search results from these sources.

Android - Platforms

DDG open source components are available here. There is also a DuckDuckGo hidden service at 3g2upl4pq6kufc4m.onion for Tor users. MetaGer is a SaaS by the German non-profit SUMA e.V. that provides you with anonymous meta search results. Startpage is a SaaS hosted in the USA and the Netherlands that provides you with anonymous Google search and image results through a free proxy. Ixquick (run by the same company as Startpage) is a meta search engine that returns combined results from nearly 100 sources - excluding Google. 'Squeaky Dolphin' for sale: How surveillance companies are targeting social networks. The latest Snowden document revelation, which shows how GCHQ and the NSA are conducting broad, real-time monitoring of YouTube, Facebook, and Blogger using a program called "Squeaky Dolphin," is the most recent demonstration of the immense interception capabilities of intelligence services.

'Squeaky Dolphin' for sale: How surveillance companies are targeting social networks

Despite the program's cute name, "Squeaky Dolphin" is shocking in its ability to intercept raw data, which includes sensitive personal and location information, and keep tabs on people across the world who are simply uploading videos or 'liking' the links on their friends' Facebook walls. Such massive, unrestrained capabilities are no way consistent with international law, as their capabilities and execution are clearly neither necessary nor proportionate. Because of this, Privacy International has litigation underfoot to challenge the legality of GCHQ's surveillance activities on the grounds that they fly in the face of the UK's human rights obligations. Privacy Online News - Part 4. Blog. Building a Better Anonymous.

By Josh Corman & Brian Martin This multi-part article, with original artwork by Mar, is a follow-up to a one hour panel discussion at DEF CON 19 titled "'Whoever Fights Monsters...' Confronting Aaron Barr, Anonymous and Ourselves" moderated by Paul Roberts, discussed by Josh Corman, Brian Martin and Scot Terban.

Building a Better Anonymous

The views of the authors are not meant to be a criticism of Anonymous, nor are they meant to be encouragement for future criminal activity. It is an inevitable fact that Anonymous, or similar groups, will become bigger, stronger, and more effective. Discussions on how to build a more potent digital hacktivism (illegal hacking to achieve a political goal) group have occurred for over a decade. When we say "building a better Anonymous", we seek to explore the ideas of making such a group truly better. Introduction & Abstract A brief introduction to this article series and Anonymous. Fact vs Fiction. Nicht verfügbar. Privacy. C.

Privacy

S. Lewis wrote some pretty good sci-fi, some excellent kids books (which Disney managed to ruin), and my favourite satire on the commercialization of Christmas. Most people, though, would know him as a writer on Christianity. So I wonder if Stephen Harper and Vic Toews have ever read him. One of the things he wrote was, “It would be better to live under robber barons than under omnipotent moral busybodies.” Bill C-30 (sometimes known as the Investigating and Preventing Criminal Electronic Communications Act, sometimes known as the Protecting Children from Internet Predators Act, and sometimes just known as “the online spy bill”) is heading for Committee of the Whole.

SecureGossip: Bringing Intelligence & Security under one roof. Cybersecurity. Surveillance. The U.S.

Surveillance

Government: Paying to Undermine Internet Security, Not to Fix It by Julia Angwin ProPublica, April 15, 12:50 p.m. One lesson of the Heartbleed bug is that the U.S. needs to stop running Internet security like a Wikipedia volunteer project. What the Proposed NSA Reforms Wouldn’t Do by Kara Brandeisky ProPublica, April 3, 3:20 p.m. All the plans purport to end the bulk phone records collection program, but there are big differences. Stasi Social Network Analysis.