Security through ...
Follow
Find
7.1K views | +4 today
 
Scooped by Yury Chemerkin
onto Security through Obscurity
Scoop.it!

VMware Security Update for DoS problem among vulnerabilities, kernel source code leaks

VMware Security Update for DoS problem among vulnerabilities, kernel source code leaks | Security through Obscurity | Scoop.it
VMware, virtualization software manager, has issued a security update for its vSphere API. This resolves a denial-of-service problem in ESX and ESXi. The ESX is a bare metal hypervisor, capable of ...
more...
No comment yet.
Security through Obscurity
A system relying on security through obscurity may have theoretical or actual security vulnerabilities, but its owners or designers believe that the flaws are not known, and that attackers are unlikely to find them. The basis of STO has always been to run your system on a “need to know” basis. If a person doesn’t know how to do something which could impact system security, then s/he isn’t dangerous. The technique stands in contrast with security by design.
Curated by Yury Chemerkin
Your new post is loading...
Your new post is loading...
Suggested by Chintan Jain
Scoop.it!

Email Security: Largest Email Usage by Continents | All Infographics

Email Security: Largest Email Usage by Continents | All Infographics | Security through Obscurity | Scoop.it
Infographic on Email Security with largest Email usage by Continents includes categories for pharma, weight loss, casino, watches, jobs, mobile and software
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Browser Security: Settings for Chrome, Firefox and Internet Explorer

Optimizing your browser’s settings is a critical step in using the Internet securely and privately. Today’s popular browsers include built-in security features, but users often fail to optimize their browser’s security settings on installation.
more...
No comment yet.
Rescooped by Yury Chemerkin from Internet and Cybercrime
Scoop.it!

1-15 March 2013 Cyber Attacks Timeline

1-15 March 2013 Cyber Attacks Timeline | Security through Obscurity | Scoop.it
Other troubles for system administrators: March is confirming the 2013 dangerous trend with several high profile breaches against industrial, financial and governmental targets. The first two weeks...

Via David Silva Ramalho
more...
No comment yet.
Rescooped by Yury Chemerkin from The latest and greatest in IT Security, the Cloud and Big Data
Scoop.it!

Two new attacks on SSL decrypt authentication cookies

Two new attacks on SSL decrypt authentication cookies | Security through Obscurity | Scoop.it
Aging standard isn't holding up very well in face of sophisticated attacks.

Via Ameen Hashimi
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

APT Research (Mandiant & Others)

Download all files as a zip Read Top 25 comments on this research Download [ China Lashes Back at Hacking Claims ] Download [ Appendix C (Digital) - The Malware Arsenal ] Download [ Appendix D (Digital) - FQDNs ] Download [ Appendix E (Digital) - ...
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Best Of Web Application Penetration Testing Tools

TriplePlay-WebAppPenTestingTools by Yury Chemerkin
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

The Best of Web App Pentesting | Issues | Penetration testing, ethical hacking: tools, methodologies and tutorials

The Best of Web App Pentesting | Issues | Penetration testing, ethical hacking: tools, methodologies and tutorials | Security through Obscurity | Scoop.it
The Best of Web App Pentesting   Dear Readers! We decided to publish the next Best of Web App Pentesting. It has been half a year since | The Best of Web App Pentesting | The only magazine devoted exclusively to penetration testing.
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Hacker Wanted 2008 Full

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

AWS Cloud Security From the Point of View of the Compliance

Clouds are finding increased use in core enterprise systems, which mean auditing is the cornerstone expectation. Cloud vendors announce new cloud services, offe
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Twitter / sto_blog : Immaterials: Light painting ...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Twitter / sto_blog : Twitter OAuth API Keys Leaked ...

more...
No comment yet.
Rescooped by Yury Chemerkin from Cybercrime and Cybersecurity
Scoop.it!

Twitter / sto_blog : Mandiant APT1 Report: 25 Best ...

Yury Chemerkin's insight:

read full on cybercrime&cybersecurity (scoop.it)

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Twitter / sto_blog : Online services to check ...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Richard Stallman says Ubuntu Linux is 'spyware'

Richard Stallman says Ubuntu Linux is 'spyware' | Security through Obscurity | Scoop.it
Asks South American free software association not to promote it at events
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

BlackBerry software ruled not safe enough for essential government work

this article was published Tuesday 19 March 2013 18.13 GMT but removed from original source as well as Google cache , but keeps translated and here and in exported to pdf from evernote CESG rejects BB10 software in new Z10...
more...
No comment yet.
Rescooped by Yury Chemerkin from Internet and Cybercrime
Scoop.it!

Privacy is dead

Privacy is dead | Security through Obscurity | Scoop.it
Privacy is dead. There is no such thing as privacy. We are all under constant, unending, crushing surveillance. Depressed? You should be. This is the pow

Via David Silva Ramalho
more...
No comment yet.
Rescooped by Yury Chemerkin from Mobile Security
Scoop.it!

BYOD trend continues in 2013

BYOD trend continues in 2013 | Security through Obscurity | Scoop.it

Many technologies and trends come and go and so many fail to measure up to the hype but it appears BYOD (Bring Your Own Device) isn't one of them. BYOD is changing the way employees work and it's i...


Via MOBIQUANT
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Dating site Zoosk resets some user accounts following password dump

“ Zoosk.com, an online dating service with about 15 million unique visitors each month, is requiring some users to reset their passwords.
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

r00tsecurity staff open #

r00tsecurity is looking for members for it's staff team. Staff are privileged members who volunteers to help run the community.
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Business Meeting (MultiLang) (with tweets) · yurychemerkin

A Social Media Story storified by Yury Chemerkin
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Comparative Analysis on Forensics

As a dead forensics techniques goes apart from live forensics, there are various way when a separation of its meet with problems encountered by each of them htt
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Interview Pentest

http://pentestmag.com/pentest-webapp-1212/
more...
No comment yet.
Rescooped by Yury Chemerkin from Forenscics Compilations
Scoop.it!

Twitter / sto_blog : Manipulating Memory for Fun ...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Twitter / sto_blog : Apple finally adopts HTTPS ...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Anatomy of a bug - the five minute insecurity window in the sudo command

Anatomy of a bug - the five minute insecurity window in the sudo command | Security through Obscurity | Scoop.it
An authentication-related bug was patched recently in the Unix sudo command.
Ironically, the bug was more likely to affect those users who were more security-conscious.
Paul Ducklin explains...
more...
No comment yet.