Security Affairs newsletter Round 29 – Best of the week from best sources

Pierluigi Paganini October 04, 2015

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box.

Cisco released a tool to scan for SYNful_Knock implants
Aerospace Probes released to stratosphere for spying weapons
Last weeks cookie-vuln wont be the last, security bod says
Insult to injury: Researcher remote pwns RAT of cuffed FireEye VXer
China, US Agree To Not Conduct Cyberespionage For Economic Gain
Cyber attack overall cost suffered last year by businesses is $315b
Paranoid Android redux: going dark with Silent Circle’s Blackphone 2
#OpNimr Anonymous targets Saudi websites to stop al-Nimr’s crucifixion
Uber is facing problems with Chinese fraudsters
Saudi Arabia: They liked Hacking Team so much they tried to buy the company
Identity theft hit 7% of US population last year
Tracking Hacker Forums with Traffic Analysis
How to use GCAT backdoor with Gmail as a C&C server
Dyreza Trojan Targeting IT Supply Chain Credentials
SAP Patches 12 SQL Injection, XSS Vulnerabilities in HANA
Shifu Banking Trojan Targets UK Wealth Management Firms
UK.gov unleashes 3D virtual world to train GCHQs kiddie division
Linux XOR DDoS Botnet delivers potent DDoS attacks
Viruses, bulletins, surveys, and gender: hashtag #VB2015
The Unintended Attack Surface Of The Internet Of Things
Fiorina: I rushed out HP servers to power NSA snooping. Mwahahaha!
Monica Lewinsky lawyer named as first outsider on secret US spy court
Trump Hotels Collection confirm data breach
Linux-powered botnet lets rip on victims with 180Gbps network floods
Snowden Joins Twitter, Follows NSA
Here are the God-mode holes that gave TrueCrypt audit the slip
Deceit As A Defense Against Cyberattacks
Highly personal data for 15 million T-Mobile applicants stolen by hackers
TrueCrypt Encryption Software Has Two Critical Flaws: Its time to Move On
15 MILLION T-Mobile US customer records swiped by hackers
Profiling an insider
How to identify and thwart insider threats
Apple Working to Patch Gatekeeper Bypass Flaw
A billion Android phones are vulnerable to new Stagefright bugs
Study Analyzes Corporate Security Practices Across Industries
Apple Patches 100+ Vulnerabilities in OS X, Safari, iOS
HTTPS Available as Opt-In for Blogspot
Bringing IT and OT together
Automating Breach Detection For The Way Security Professionals Think
Six steps that can make your cyber workspace a safer place
Chinese fraudsters hitch a ride on Uber accounts
Apple iOS 9.0.2 Update Patches Lock Screen Bypass Exploit
Microsoft gaffe spooks users as weird Windows 7 update accidentally released
Stagefright 2.0 Vulnerabilities Affect 1 Billion Android Devices
Hacked Opinions: The legalities of hacking – Ian Amit
Scraping away profits
New Apple Gatekeeper bypass can allow running rouge applications
WinRAR zero-day open million users to hack
Hillary spillery finds half-hearted phishery
US Air Force Wireless hacking in Flight
Russian hacker, nabbed in Spain, cops 4+ years for Citadel botnet
Significant WinRAR vulnerability identified
Unsupported Honeywell Experion PKS Vulnerable to Public Attacks
CIA officers pulled from China because of OPM breach
The Hacking crew known as Gaza cybergang was very active in Q2 2015
New Botnet Hunts for Linux — Launching 20 DDoS Attacks/Day at 150Gbps
UK parents ‘want minimum age for smartphone ownership’
Microsoft Chooses Ubuntu Linux for their Cloud-based Azure HDInsight Big Data Solution
Smuggle mischievous JavaScript into WinRAR archives? Sure, why not
Does Mr. Robot’s use real Hacking Tools? Which are?
Rusky antivirus company FIRE BOMBED for research blogs
Are you still using TrueCrypt? Beware of these 2 critical flaws!
Aussie students set to hack cloud biz to hell
Raytheon: Ho hum, another day, another $1bn cyber-security contract with Uncle Sam
An Amazon employee became owner of Google.com for a few minutes
Point of view: Hacker Halted 2015
The mystery behind the Internet-of-Things vigilante malware
Apple CEO Tim Cook: Email keyword sniffing? Wed NEVER do that!
The Dridex Banking Malware is risen, British attention
A billion Android devices vulnerable to Stagefright 2.0 bugs
Experian Breach Spills Data on 15 Million T-Mobile Customers
Experian experiences T-Mobile data breach
Google Details Steps Taken to Disrupt Android Phishing Campaign
WordPress Jetpack Plugin Patched Against Stored XSS Vulnerability
Hand-cranked ‘DDoS’ floors Thai government website amid protests
Patreon crowdfunding site hacked and data leaked online
T-Mobile US hires someone other than bungling Experian to offer ID theft monitoring to hack victims
How to Freeze Credit Report To Protect Yourself Against Identity Theft
Scottrade data breach affects 4.6 Million Customers
US state police cars are vulnerable to cyberattack

Email address: Hurry up, subscribe to the newsletter, next Sunday you will receive all the news directly in your inbox.

newsletter

Once again thank you!

Pierluigi Paganini

(Security Affairs – Newsletter, SecurityAffairs)



you might also like

leave a comment