Security through Obscurity
7.7K views | +0 today
Follow
Security through Obscurity
A system relying on security through obscurity may have theoretical or actual security vulnerabilities, but its owners or designers believe that the flaws are not known, and that attackers are unlikely to find them. The basis of STO has always been to run your system on a “need to know” basis. If a person doesn’t know how to do something which could impact system security, then s/he isn’t dangerous. The technique stands in contrast with security by design.
Curated by Yury Chemerkin
Your new post is loading...
Your new post is loading...
Scooped by Yury Chemerkin
Scoop.it!

Exploit Pack - Web Security

Exploit Pack - Web Security Take control of remote browsers, steal social network credentials, obtain persistence on remote browsers, Distributed denial of s...
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Key Twitter and Facebook Metadata Fields Forensic Investigators Need to be Aware of

Key Twitter and Facebook Metadata Fields Forensic Investigators Need to be Aware of | Security through Obscurity | Scoop.it
Authentication of social media evidence can present significant challenges when you collect by screen shots, printouts or raw html feeds from an archive tool. This is just one reason why social med...
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Exploiting Software 04/12 | Magazine | IT Security Magazine - Hakin9 www.hakin9.org

Exploiting Software 04/12 | Magazine | IT Security Magazine - Hakin9 www.hakin9.org | Security through Obscurity | Scoop.it

Cisco IOS Rootkits and Malware: A practical guide By Jason Nehrboss Propagating the worm code into a new router can either be quite easy, difficult, | Exploiting Software 04/12 | IT Security Magazine...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Spy Gadgets: SPY Bluetooth Earpiece Is Completely Invisible in your ears

Spy Gadgets: SPY Bluetooth Earpiece Is Completely Invisible in your ears | Security through Obscurity | Scoop.it
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Hakin9 04/2012: Cyber Warfare | Magazine | IT Security Magazine - Hakin9 www.hakin9.org

Hakin9 04/2012: Cyber Warfare | Magazine | IT Security Magazine - Hakin9 www.hakin9.org | Security through Obscurity | Scoop.it

What is Cyber War?by Keith DeBus In just a brief fifteen years, our communication, commercial and social lives have been dramatically altered by | Hakin9 04/2012: Cyber Warfare | IT Security Magazine...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

POC Android botnet - Command and Control Channel over SMS | The Hacker News (THN) Security Blog

POC Android botnet - Command and Control Channel over SMS | The Hacker News (THN) Security Blog | Security through Obscurity | Scoop.it
POC Android botnet - Command and Control Channel over SMS. Computer Security Blog !!
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Security Through Obscurity: Security Alert: New Android Malware — DKFBootKit — Moves Towards The First Android BootKit

NQ Mobile Security Research Center has recently uncovered a new malware –DKFBootKit. This malware is identified when monitoring and analyzing the evolution of earlier DroidKungFu variants. While it uses known techniques to piggyback malicious payloads into legitimate apps, it intentionally chooses legitimate apps that require root privilege to facilitate its payload. Specifically, by taking advantage of the root privilege, DKFBootKit adds itself as a part of the boot sequence of the original Android system and replaces a number of utility programs (e.g., ifconfig and mount). By doing so, the malware can get started even before the entire Android framework is bootstraped. To the best of our knowledge, this malware is the first of its kind in moving towards a full-fledged bootkit on Android, which represents a serious threat to mobile users. Based on our initial investigation, we have so far identified more than 100 infected malware samples and it seems this number continues to grow at the time of writing this report.


more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Criminal credit card websites shut down by police

More information at http://nakedsecurity.sophos.com/2012/04/26/credit-card-websites/ Cybercrime is big business these days, in fact it's an industry. So it's...
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Which Mobile Platforms Are Ready for the Enterprise?

The Social Media Story storified by Yury Chemerkin...
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Comparison of android and black berry forensic techniques

As digital data is omnipresent now, the digital forensics has quickly become a legal necessity.
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Social network privacy guide. Part I. Facebook

Discussing Facebook Policy as one of most useful and powerful discretion from user vision.

...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Microsoft BlueHat 2010 - Cyber[Crime/War] . Connecting the Dots

This video is part of the Infosec Video Collection at SecurityTube.net: http://www.securitytube.net Microsoft BlueHat 2010 - Cyber[Crime/War] .
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

BlackBerry Returns to its Roots - Focuses on Business Customers

BlackBerry Returns to its Roots - Focuses on Business Customers | Security through Obscurity | Scoop.it
Technology News...

...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Security Through Obscurity: Wayback Machine (Archive.ORG)

Browse through over 150 billion web pages archived from 1996 to a few months ago. To start surfing the Wayback, type in the web address of a site or page where you would like to start, and press enter. Then select from the archived dates available. The resulting pages point to other archived pages at as close a date as possible. Keyword searching is not currently supported.


more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Check Usernames - Social Media Username Availability

Protect yourself or your trademarked brand from Social Media Identity Theft. Check for your username availability on 160 Social Networking websites.

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Debtris (UK version)

by InformationIsBeautiful.net http://www.informationisbeautiful.net/2010/debtris/ directed by: David McCandless animation by: Miles Tudor, Dom Del Torto musi...

...

more...
No comment yet.