ZeroTrustNet
9.9K views | +0 today
Follow
ZeroTrustNet
Trust what you know, and do not trust the rest.
Your new post is loading...
Your new post is loading...
Scooped by 0 тrυѕт neт
Scoop.it!

ZeroTrustNet

ZeroTrustNet | ZeroTrustNet | Scoop.it

Check out my security dashboards and resources. Trust what you do know, and Do Not Trust the Rest!

 

www.zerotrustnet.com

more...
No comment yet.
Scooped by 0 тrυѕт neт
Scoop.it!

Firefox Under Fire: Anatomy of latest 0-day attack

Firefox Under Fire: Anatomy of latest 0-day attack | ZeroTrustNet | Scoop.it
The recent Firefox attacks are an example of active in-the-wild exploitation of a serious software vulnerability.
more...
No comment yet.
Scooped by 0 тrυѕт neт
Scoop.it!

Hacked federal files couldn't be encrypted because government computers are too old

Hacked federal files couldn't be encrypted because government computers are too old | ZeroTrustNet | Scoop.it
Millions of government employee records apparently stolen by Chinese hackers were not encrypted, and software designed to block known computer breaches has not been installed to protect most of the files, officials said Tuesday.
more...
No comment yet.
Scooped by 0 тrυѕт neт
Scoop.it!

A Visual APT Exploration Tool

A Visual APT Exploration Tool | ZeroTrustNet | Scoop.it
A tool that visually shows the timelines for many known APT campaigns, connections among them, and various known information about the campaigns.
more...
No comment yet.
Scooped by 0 тrυѕт neт
Scoop.it!

ESnet: The 100-gigabit shadow internet that only the US government has access to | ExtremeTech

ESnet: The 100-gigabit shadow internet that only the US government has access to | ExtremeTech | ZeroTrustNet | Scoop.it
One day, as I surfed the web on my laptop and lamented how long it takes a YouTube video to load, I found myself wondering if employees of the US government are also beholden to the same congestion and shoddy peering that affects everyone else on the internet. Surely, as hundreds of scientists at Fermi Lab near Chicago wait for petabytes of raw data to arrive from the Large Hadron Collider in Europe, they don't suffer interminable connection drops and inexplicable lag. And, as it turns out, they
more...
No comment yet.
Scooped by 0 тrυѕт neт
Scoop.it!

Google finds critical vulnerability in SSL 3.0 called POODLE | ExtremeTech

Google finds critical vulnerability in SSL 3.0 called POODLE | ExtremeTech | ZeroTrustNet | Scoop.it
Google has released the details on a new SSL 3.0 bug, codenamed Poodle, that threatens all modern browsers with a man-in-the-middle attack -- and the only solution is to disable the old handshake standard.
more...
No comment yet.
Scooped by 0 тrυѕт neт
Scoop.it!

JPMorgan Employee Password Was Key in Hack Hitting 76 Million Homes

JPMorgan Employee Password Was Key in Hack Hitting 76 Million Homes | ZeroTrustNet | Scoop.it
JPMorgan Chase & Co., the biggest U.S. bank, said a previously disclosed data breach affected 76 million households and 7 million small businesses.
more...
No comment yet.
Scooped by 0 тrυѕт neт
Scoop.it!

Hackers can make more money stealing medical records than credit cards

Hackers can make more money stealing medical records than credit cards | ZeroTrustNet | Scoop.it
Cyber criminals targeting US healthcare records can make ten times more money selling medical information than trading credit card details according to internet security experts.
more...
No comment yet.
Scooped by 0 тrυѕт neт
Scoop.it!

Hospital network hacked, 4.5 million records stolen

Hospital network hacked, 4.5 million records stolen | ZeroTrustNet | Scoop.it
Hackers have taken 4.5 million Social Security numbers from patients who attended any one of Community Health Systems' 206 hospitals this year.
more...
No comment yet.
Scooped by 0 тrυѕт neт
Scoop.it!

Russian Hackers Amass Over a Billion Internet Passwords

Russian Hackers Amass Over a Billion Internet Passwords | ZeroTrustNet | Scoop.it
The hacked records, discovered by a security firm based in Milwaukee, include user name and password combinations and more than 500 million email addresses.
more...
No comment yet.
Scooped by 0 тrυѕт neт
Scoop.it!

'Canvas fingerprinting' online tracking is sneaky but easy to halt

'Canvas fingerprinting' online tracking is sneaky but easy to halt | ZeroTrustNet | Scoop.it
At least two browser extensions can stop the tracking method, which was in wide use earlier this year
more...
No comment yet.
Scooped by 0 тrυѕт neт
Scoop.it!

US cybercrime laws being used to target security researchers

US cybercrime laws being used to target security researchers | ZeroTrustNet | Scoop.it
Security researchers say they have been threatened with indictment for their work investigating internet vulnerabilities. By Tom Brewster
more...
No comment yet.
Scooped by 0 тrυѕт neт
Scoop.it!

While Warning Of Chinese Cyberthreat, U.S. Launches Its Own Attack

While Warning Of Chinese Cyberthreat, U.S. Launches Its Own Attack | ZeroTrustNet | Scoop.it
The NSA managed to penetrate the networks of the giant Chinese telecommunications firm Huawei, documents show. Journalist David Sanger says cyber-espionage is an "entirely new field of conflict."
more...
No comment yet.
Scooped by 0 тrυѕт neт
Scoop.it!

ONLINE SCAMS! Coach Outlet Store - The Largest Selection Of Authentic Coach 60% Off

ONLINE SCAMS! Coach Outlet Store - The Largest Selection Of Authentic Coach 60% Off | ZeroTrustNet | Scoop.it
Coach outlet online sale - 2015 Coach outlet hot sale handbags,bags,purses with high quality and fast shipping to all over the world.
0 тrυѕт neт 's insight:

Be aware of online ad scams populating through Facebook; these Phishing websites are capturing peoples credit card numbers and personal information. 

 

Triggers for SCAM sites 

1. These sites are NOT using HTTPS (try the link with "https://www.coachbagoutletstore.com",) through mobile device browsers this is not always apparent. 

 

2. They have no association with the manufacture, or a third party; non reputable site; try searches within a popular search engine like google.com "coachbagoutletstore.com"; reveals there are conflicts with Copyright and SCAM site within China. http://www.scamadviser.com/check-website/coachbagsoutletstore.com

 

3.) They have no phone number, address. e.g) Site above's contact address is only an email that has no association with the original site. supportclients@softbankjp.biz  If they do have a phone number listed, it is usually a recorded voicemail. 

more...
No comment yet.
Scooped by 0 тrυѕт neт
Scoop.it!

Battery Attributes Can Be Used To Track Web Users

Battery Attributes Can Be Used To Track Web Users | ZeroTrustNet | Scoop.it
A team of European security researchers has published a paper analyzing how the battery life of mobile devices could be used to track web browsing habits of..
more...
No comment yet.
Scooped by 0 тrυѕт neт
Scoop.it!

FCC Chairman Tom Wheeler: This Is How We Will Ensure Net Neutrality | WIRED

FCC Chairman Tom Wheeler: This Is How We Will Ensure Net Neutrality | WIRED | ZeroTrustNet | Scoop.it
I am proposing the FCC use its Title II authority to implement and enforce open internet protections, banning paid prioritization, and the blocking and throttling of lawful content and services.
more...
No comment yet.
Scooped by 0 тrυѕт neт
Scoop.it!

16-30 November 2014 Cyber Attacks Timeline

16-30 November 2014 Cyber Attacks Timeline | ZeroTrustNet | Scoop.it
The Cyber Monday has just gone, and here we are with the second Cyber Attacks Timeline of November (Part I here). Even if no massive breaches against retailers have been discovered so far (however ...
more...
No comment yet.
Scooped by 0 тrυѕт neт
Scoop.it!

How to surf safely: From LastPass to tin foil hats, and everything in between | ExtremeTech

How to surf safely: From LastPass to tin foil hats, and everything in between | ExtremeTech | ZeroTrustNet | Scoop.it
Don't wait until it's too late to implement a solid strategy for staying safe online.
more...
No comment yet.
Scooped by 0 тrυѕт neт
Scoop.it!

Code to exploit fundamental USB flaw posted on Github

Code to exploit fundamental USB flaw posted on Github | ZeroTrustNet | Scoop.it
Remember that fundamental USB security flaw that a pair of researchers unearthed back in July? You know, the one that allegedly affects every single USB device in the wild for which there is no fix for. While they did publically…
more...
No comment yet.
Scooped by 0 тrυѕт neт
Scoop.it!

Bash Bug: Bigger Than Heartbleed

Bash Bug: Bigger Than Heartbleed | ZeroTrustNet | Scoop.it
Security experts are warning that millions of systems - Apache servers, Linux and Mac systems, and innumerable Internet of Things devices - may be vulnerable to a
more...
No comment yet.
Scooped by 0 тrυѕт neт
Scoop.it!

Snowden went too far by revealing the NSA’s MonsterMind cyber weapon | ExtremeTech

Snowden went too far by revealing the NSA’s MonsterMind cyber weapon | ExtremeTech | ZeroTrustNet | Scoop.it
The latest NSA program to come out of Edward Snowden is MonsterMind, an autonomous cyber warfare program that signals a sharp turn for the whistleblower.
more...
No comment yet.
Scooped by 0 тrυѕт neт
Scoop.it!

Massive, undetectable security flaw found in USB: It’s time to get your PS/2 keyboard out of the cupboard | ExtremeTech

Massive, undetectable security flaw found in USB: It’s time to get your PS/2 keyboard out of the cupboard | ExtremeTech | ZeroTrustNet | Scoop.it
Security researchers have found a fundamental flaw that affects almost every USB device. This flaw is so serious that, now that it has been revealed, you probably shouldn't plug a USB device into your computer ever again. There are no known effective defenses against this variety of USB attack. The USB IF itself notes that your only defense against this new attack vector is to only use USB devices that you 100% trust -- but even then, as we'll outline below, this won't always protect you.
more...
Scooped by 0 тrυѕт neт
Scoop.it!

How to watch hacking, and cyberwarfare between the USA and China, in real time | ExtremeTech

How to watch hacking, and cyberwarfare between the USA and China, in real time | ExtremeTech | ZeroTrustNet | Scoop.it
You've probably read dozens of paragraphs on how the next great theater of war will be online rather than offline, and how China and the US are already battling each other for cyber supremacy. The truth is, though, unless you've actually been hacked, it's hard to appreciate just how real the prospect of cyberwar actually is. Now, though, a security company has produced a fascinating geographic map that shows you hacking attempts in real-time -- and sure enough, you really can see China waging cyberwar against the US.
more...
No comment yet.
Scooped by 0 тrυѕт neт
Scoop.it!

Critical crypto bug in OpenSSL opens two-thirds of the Web to eavesdropping

Critical crypto bug in OpenSSL opens two-thirds of the Web to eavesdropping | ZeroTrustNet | Scoop.it
Exploits allow attackers to obtain private keys used to decrypt sensitive data.
more...
No comment yet.
Scooped by 0 тrυѕт neт
Scoop.it!

In rare move, banks sue Target's security auditor

In rare move, banks sue Target's security auditor | ZeroTrustNet | Scoop.it
Two banks that claim to have suffered losses from the recent data breach at Target have sued Trustwave Holdings Inc., the company that was responsible for validating Target's compliance with the Payment Card Industry Data Security Standard.
more...
No comment yet.