ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login
    1. Topics
    2. Tags
    3. security
    Log in to post
    • All categories
    • mlnewsM

      SHA-1 Algorithm Rapidly Approaching End of Life

      Watching Ignoring Scheduled Pinned Locked Moved News security sha sha1 ars technica
      9
      1 Votes
      9 Posts
      2k Views
      scottalanmillerS

      @Dashrender said:

      These newer algorithms that require specific amounts of RAM and have time variables in them to force the decryption to take time are pretty interesting.

      Hmmmm.... I'd be interested to see how that works and, more importantly, how does that impact proper decryption versus a cracking attempt?

    • mlnewsM

      State Trooper Vehicles Hacked in Ethical Hacking Test

      Watching Ignoring Scheduled Pinned Locked Moved News security
      14
      3 Votes
      14 Posts
      2k Views
      gjacobseG

      @johnhooks said:

      More reason for me to get my dream car (67 GTO).

      GTO, Classic Camaro, Mustang Mach II, Classic Corvette, Dodge Power Wagon.....

      or one of my all time favorites -

      US Military m109

    • K

      New ownCloud Whitepaper: Cloud Security & Encryption 2.0 Technical Overview

      Watching Ignoring Scheduled Pinned Locked Moved News owncloud security cloud security encryption
      2
      3 Votes
      2 Posts
      1k Views
      scottalanmillerS

      Thanks, great resource.

    • nadnerBN

      WinRAR Self Extracting Archive Flaw

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion winrar security
      1
      2 Votes
      1 Posts
      633 Views
      No one has replied
    • jospoortvlietJ

      ownCloud most secure open source file sync and share - yeah, right...

      Watching Ignoring Scheduled Pinned Locked Moved News storage owncloud security
      7
      2 Votes
      7 Posts
      2k Views
      jospoortvlietJ

      Yup, our security guy is a big believer in "Linus' law": "many eyeballs make all bugs shallow" or something like that 😄

    • gjacobseG

      Spotify in locked down environment

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion spotify gpo security
      21
      1 Votes
      21 Posts
      6k Views
      Reid CooperR

      This gives me an idea for a topic...

    • stacksofplatesS

      Lab Project: 2FA with Google Authenticator

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion jump server ssh jumpbox 2fa linux security
      5
      4 Votes
      5 Posts
      2k Views
      stacksofplatesS

      @anonymous said:

      Nice Guide. Can you please add a link to the Jumpbox guide, I missed it.....

      http://mangolassi.it/topic/6143/linux-lab-project-building-a-linux-jump-box

    • gjacobseG

      Domain User Profile: Temporary Profile in use

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion windows 2012 r2 windows profiles windows 7 gpo security
      21
      1 Votes
      21 Posts
      5k Views
      dafyreD

      @Dashrender Eons ago... http://sillydog.org/narchive/full4.php

      It was actually pretty good too...

    • mlnewsM

      Researchers Find Many More Malicious Apps in the Apple iOS AppStore

      Watching Ignoring Scheduled Pinned Locked Moved News appstore iphone security ipad ios apple ars technica
      1
      3 Votes
      1 Posts
      980 Views
      No one has replied
    • stacksofplatesS

      SSH Key Best Practices

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion linux ssh security
      4
      1 Votes
      4 Posts
      1k Views
      AVI-NetworkGuyA

      Decent guide for this from NIST:

      http://csrc.nist.gov/publications/drafts/nistir-7966/nistir_7966_draft.pdf

    • mlnewsM

      Apple Scrambling After Finding Malware in Over 40 AppStore Apps

      Watching Ignoring Scheduled Pinned Locked Moved News security xcode ipad apple ars technica ios iphone xcodeghost malware
      5
      2 Votes
      5 Posts
      2k Views
      scottalanmillerS

      @Dashrender said:

      It's odd to think the developers of Angry Birds 2 would use an unofficial version of Xcode.

      Seriously!

    • mlnewsM

      Google Provides Table Level Encryption to MariaDB

      Watching Ignoring Scheduled Pinned Locked Moved News security encryption google databases mariadb inforworld
      3
      2 Votes
      3 Posts
      2k Views
      scottalanmillerS

      @JaredBusch said:

      What the hell is up with the author of that article basically down playing the entire thing because it does not prevent SQL injection?
      Seriously WTF?

      I agree, that is a bunch of BS. This is about on-disk data at rest security and is a decently big deal.

    • mlnewsM

      With iOS 9 Apple Gets Serious On Security

      Watching Ignoring Scheduled Pinned Locked Moved News ios 9 inforworld apple security
      7
      2 Votes
      7 Posts
      2k Views
      scottalanmillerS

      @JaredBusch said:

      @DustinB3403 said:

      6 Digit pass-codes are only a minimalist approach to attempt securing their devices.

      It is better than 4 by a long shot and the cries if they forced users to switch from the simple code to alphanumeric would be immense

      And there isn't any RDP type access to these devices where that access can be attempted remotely. That's a physical input device with a ten attempt limit. It's far more secure than the same thing on an SSH password, for example. I think that people are thinking of it in terms of different types of security.

    • mlnewsM

      Backdoors Discovered in Cisco Routers

      Watching Ignoring Scheduled Pinned Locked Moved News ars technica cisco security
      4
      3 Votes
      4 Posts
      1k Views
      scottalanmillerS

      @JaredBusch said:

      @mlnews said:

      Cisco routers in four countries have been discovered to have a SYNful malware variant creating back doors in them

      I read about this already, but that neither that article nor the one you linked state clearly how the routers had the malware loaded onto them other than to state they were logged into with default credentials.

      I've been wondering about that myself. Was this factory loaded, loaded from a shipping location, at customs, simply through online attacks.... any potential options.

    • AmbarishrhA

      Linux Server Security

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion linux security ssh vpn server
      11
      2 Votes
      11 Posts
      3k Views
      scottalanmillerS

      @Dashrender said:

      Why is a VPN a security risk? because they give you (generally) full access to the network?

      Correct. They create unnecessary exposure. Direct access to all hosts (typically) for all protocols and ports. The protections of firewalls and proxies are bypassed. They are generally the least secure form of access because they are the laziest - just expose everything and hope for the best.

    • mlnewsM

      How Debian Is Taking On the CIA for Security

      Watching Ignoring Scheduled Pinned Locked Moved News debian security linux
      8
      3 Votes
      8 Posts
      2k Views
      scottalanmillerS

      @Breffni-Potter said:

      But Soviet Russia will invade, We need to beat Al-Qaeda, ect.

      They know they are attacking Americans. There can't honestly be any confusion about what they are doing.

    • mlnewsM

      Windows 7, 8, 8.1 and 10 Now All Collect User Data

      Watching Ignoring Scheduled Pinned Locked Moved News windows 8 windows 10 microsoft windows 7 infoworld windows 8.1 windows security
      10
      2 Votes
      10 Posts
      3k Views
      MattSpellerM

      @scottalanmiller said:

      We need to understand where and when it is happening and why it potentially makes sense and if and where potential concerns exist. But that data is being collected itself is not a major concern.

      Agreed. I want a list of what they collect & why & how it's used & who can use it. Then I'll quit sharpening my pitchfork and disperse the mob.

      Edit: I may settle for less explanation if they get super specific about what they collect.

    • stacksofplatesS

      Linux Foundation Workstation Hardening

      Watching Ignoring Scheduled Pinned Locked Moved IT Discussion linux linux foundation security
      3
      1 Votes
      3 Posts
      984 Views
      scottalanmillerS

      Of course UEFI comes with its own risks, as we have recently seen, so it is more imperative that you trust your hardware maker when using UEFI. Not that trusting them wasn't always essential, but their toolkits for being naughty have expanded.

    • gjacobseG

      Jailbroken iOS: Data hacked

      Watching Ignoring Scheduled Pinned Locked Moved News ios hacking apple security malware
      7
      1 Votes
      7 Posts
      2k Views
      DashrenderD

      @nadnerB said:

      App stores... pfffft who needs them
      stares at Lumia wondering what to do with it 😐

      😞 yeah All I want is a stupid StarBucks app... lol

    • 1
    • 2
    • 21
    • 22
    • 23
    • 24
    • 25
    • 31
    • 32
    • 23 / 32