-
https://raw.github.com/galkan/tools/master/openvpn-brute/openvpn_brute_force.sh
-
Howto: simplest sshd backdoor ever | Offensive Security Blog V2.0
-
Wireless Attack Toolkit (WAT) | Free Security & Utilities software downloads at SourceForge.net
-
10 Techniques for Blindly Mapping Internal Networks - NetSPI Blog
-
Have I been pwned? Check if your email has been compromised in a data breach
-
Manual Page - macof(8) flood a nework with fake mac addresses
-
Wireless Attacks with Python: Part One - The "Dnspwn Attack" - jordan-wright
-
Video: Wireshark Network Forensics | Offensive Security Blog V2.0
-
Howto: Monitor all shell command and send to syslog server | Offensive Security Blog V2.0
-
Remotely Scan Malware/Virus in Victim PC with Metasploit » Hacking Articles
-
Cyber Attack Hit Japanese Nuclear Power Plant using Special Malware ~ The Hackers Media™ [ THM ]
-
1-15 November 2013 Cyber Attacks Timeline | Hackmageddon.com
-
16-30 November 2013 Cyber Attacks Timeline | Hackmageddon.com
-
1-15 December 2013 Cyber Attacks Timeline | Hackmageddon.com
-
16-31 December 2013 Cyber Attacks Timeline | Hackmageddon.com
-
HIPAA Data Breach Lawsuit: Omnicell Laptop Theft Case Dismissed - AlertBoot Endpoint Security
-
HIPAA Encryption: When Is Encryption Not Encryption? - AlertBoot Endpoint Security
-
Keyloggers: One Way To Defeat Full Disk Encryption - AlertBoot Endpoint Security
-
Court Rejects Equal Access Rules for Internet Providers - NYTimes.com
-
Supreme Court agrees to hear Aereo case | Internet & Media - CNET News
-
IOActive Labs Research: Personal banking apps leak info through phone
-
Court rules YELP must ID negative reviewers; no constitutional protection - Washington Times
-
What It's Like When The FBI Asks You To Backdoor Your Software
-
Lifelogging: Crowdsourcing + life logs = big insights - tech - 10 January 2014 - New Scientist
-
Larry Page's Second Big Mistake As CEO: Opening Your Gmail Box to Google+ Followers - Forbes
-
BBC News - CES 2014: Phones morph into 'stun guns' and 'tricorders'
-
Wearable gadgets not ready for prime time, tech watchers say | Reuters
-
China ALSO building encryption-cracking quantum computer • The Register
-
Data scrapers used Amazon cloud to reap biz bods' CVs, wails LinkedIn • The Register
-
Security analysis of mobile banking apps reveals significant weaknesses - Computerworld
-
Opvouwbare Pocket Drone volgt gebruiker overal | nu.nl/tech | Het laatste nieuws het eerst op nu.nl
-
'KPN tolereert NSA-spionage niet' | nu.nl/tech | Het laatste nieuws het eerst op nu.nl
-
EU veroordeelt illegaal downloaden Nederland | nu.nl/tech | Het laatste nieuws het eerst op nu.nl
-
Man arrested for allegedly trying to send sensitive F-35 data to Iran | TheHill
-
Banken stellen nieuwe regels voor internetbankieren - Security.NL
-
How Google and Nest could get the smart home all wrong | Cutting Edge - CNET News
-
Rechter bepaalt wat grof nalatig is bij internetbankieren - Security.NL
-
Sabu wasn't the only FBI mole in LulzSec, suggest leaked docs • The Register
-
Expanding Target Breach Shows Need for Highly Secure Payment Systems
-
Reuters sources: Other US retailers victims of cyberattacks - NBC News.com
-
Schneier on Security: How the NSA Threatens National Security
-
Hackers gain 'full control' of critical SCADA systems - Security - Technology - News - iTnews.com.au
-
Is your IP address personal information? - Software - Technology - Blogs - iTnews.com.au
-
Dropbox works to resolve service hiccups, says files are safe - Computerworld
-
Privacy advocates announce day of protest against NSA spying
-
Al-Arab Daily Newspaper, first Arabic newspaper published in London 1977
-
This malware class was reportedly used in the Target hackings. Here’s how it works.
-
Cyber crime robs Britons of £1billion in just a year | Metro News
-
Could data collection have stopped 9/11? White House thinks so - latimes.com
-
Homegrown Extremism 2001-2013 | The National Security Program
-
Do NSA's Bulk Surveillance Programs Stop Terrorism? | The National Security Program
-
Vulnerability leaves Cisco small biz routers wide open to attack • The Register
-
How Israel and Hamas weaponized social media | Internet & Media - CNET News
-
Syrian Electronic Army hacks into Xbox Twitter accounts too | Security & Privacy - CNET News
-
Exclusive: With Muslim Brotherhood crushed, Egypt sets sights on Hamas | Reuters
-
With data vulnerable, retailers look for tougher security | Reuters
-
Do we need cyber warfare treaties? Study looks at legacy of Stuxnet - NBC News.com
Tuesday, 14 January 2014
links of the day 01/15/2014 (a.m.)
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment