Steve Vallis

1,850 Flips | 1 Magazine | 7 Following | 68 Followers | @SteveV | Keep up with Steve Vallis on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Steve Vallis”

Password re-use is dangerous, right? So what about stopping it with password-sharing?

If Facebook knows you use the same password on Twitter, both can hassle you to changeTwo comp-sci boffins have proposed that websites cooperate to …

Information Systems

NSA tripled surveillance of phone records, collected over 534 million records in 2017

The NSA gobbled up more than three times as many records of phone calls and text messages of Americans last year than it did in 2016, according to a …

Surveillance

IDG Contributor Network: How to stop threats before they hit your network

In today’s IT environment, endpoint monitoring is fairly standard procedure. Most organizations have at least some sort of system in place allowing …

Sophisticated Android malware tracks all your phone activities

An advanced type of malware can spy on nearly every Android smartphone function and steal passwords, photos, video, screenshots and data from WhatsApp, Telegram and other apps. "ZooPark" targets subjects in the Middle East and was likely developed by a state actor, according to Kaspersky Lab, which …

Apps

Resource: OSINT tools and how you learn how to use them

I hope this will become a useful resource for Open-source Intelligence (OSINT)‍ and to find and learn how to use osint tool‍s.<p>Chapter 1: Data …

Open Source Movement

Australia's Offensive Cyber Capability | Australian Strategic Policy Institute

WHAT’S THE PROBLEM?<p>In April 2016, Prime Minister Turnbull confirmed that Australia has an offensive cyber capability. A series of official …

DARPA is looking to avoid another version of Meltdown or Spectre

The Defense Advanced Research Projects Agency has contracted Tortuga Logic to develop hardware security tools that use commercial testing platforms …

DARPA

VirusTotal Launches Droidy, Its New Android Sandbox Technology

VirusTotal, the aggregated antivirus scanning engine owned by Google, announced today a new Android sandbox technology named Droidy. [...]

Cybersecurity

Web Authentication: What It Is and What It Means for Passwords

Since mid 2016, a group of security professionals and researchers from across the industry have been working on a new way to handle authentication …

IT security

Synchronize Your DNS to Multiple Providers: DNSControl

DNSControl is a system for maintaining DNS zones. It has two parts: a domain specific language (DSL) for describing DNS zones plus software that …

The Leaked NSA Spy Tool That Hacked the World

An elite Russian hacking team, a historic ransomware attack, an espionage group in the Middle East, and countless small time cryptojackers all have …

Threat or menace? “Autosploit” tool sparks fears of empowered “script kiddies”

400 lines of Python code + Shodan + Metasploit equals a whole heap of hand-wringing.<p>The tools used by security researchers, penetration testers, and …

Information Security

One-stop counterfeit certificate shops for all your malware-signing needs

Certificates registered in names of real corporations are surprisingly easy to come by.<p>The Stuxnet worm that targeted Iran's nuclear program almost a …

Information Security

The Feds Can Now (Probably) Unlock Every iPhone Model In Existence -- UPDATED

In what appears to be a major breakthrough for law enforcement, and a possible privacy problem for Apple customers, a major U.S. government contractor claims to have found a way to unlock pretty much every iPhone on the market.<p>Cellebrite, a Petah Tikva, Israel-based vendor that’s become the U.S. …

Privacy

Who Wasn’t Responsible for Olympic Destroyer?

This blog post is authored by Paul Rascagneres and Martin Lee.<br>Summary<br>Absent contributions from traditional intelligence capacities, the available …

Cybersecurity

Six Cyber Threats to Really Worry About in 2018 - MIT Technology Review

Hackers are constantly finding new targets and refining the tools they use to break through cyberdefenses. The following are some significant threats …

Cybersecurity

If you don’t cover your webcam you could end up a ‘slave’

<b>Mark Zuckerberg does it. The FBI does it. And you should do it too.</b><p>No, not collecting mass amounts of data through surveillance – this is about …

New DNS Service Launched by IBM Vows to Keep Your Browsing Habits Secret

A new online service was launched Thursday morning to keep your browsing habits out of the hands of marketers and help you automatically avoid …

How to detect malware infection in 9 easy steps

Hardly a week goes by when I’m not cleaning up someone’s computer and detecting and eradicating malware. It’s not uncommon for me to find dozens of …

Malware

Google’s strongest security, for those who need it most

<i>Editor’s note: October is Cybersecurity Awareness Month, and we're celebrating with a series of security announcements this week. This is the second</i> …

Researchers deliberately get phished, learn that account exploitation often takes more than 24 hours

Researchers at Imperva recently set up fake online accounts and intentionally allowed themselves to be phished by scammers in order to observe how …

Putin bans VPNs to stop Russians accessing prohibited websites

MOSCOW (Reuters) - President Vladimir Putin has signed a law that prohibits technology that provides access to websites banned in Russia, the government's website showed on Sunday.<p>The law, already approved by the Duma, the lower house of parliament, will ban the use of virtual private networks …

Russia

Next cyber-attack could be imminent, warn experts

<b>Another major cyber-attack could be imminent after Friday's global hit that infected more than 125,000 computer systems, security experts have warned.</b><p>UK security researcher "MalwareTech", who helped to limit the ransomware attack, predicted "another one coming... quite likely on Monday".<p>The virus, …

More Android phones than ever are covertly listening for inaudible sounds in ads

Your Android phone may be listening to ultrasonic ad beacons without your knowledge.<p>Almost a year after app developer SilverPush vowed to kill its …

Apps

>10,000 Windows computers may be infected by advanced NSA backdoor

Did script kiddies use DoublePulsar code released by NSA-leaking Shadow Brokers?<p>Security experts believe that tens of thousands of Windows computers …

National Security Agency (NSA)

Nearly half of UK businesses experienced a cybersecurity incident in the last 12 months

Nearly half of all UK businesses have experienced a cybersecurity incident over the last 12 months, according to a new government paper.The post …

Cybersecurity

Design flaws in Lastpass 2FA implementation

As part of a Red Team engagement I found myself looking for a way to bypass two-factor authentication (2FA) in Lastpass. Unfortunately this happened …

Govt could make telcos block malware

Looking at legislative changes.

Cybersecurity