Yassir

157 Flips | 5 Magazines | 14 Likes | 39 Followers | @ayassir | Keep up with Yassir on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Yassir”

Hacking Tools List for Hackers & Security Professionals

Penetration testing & Hacking Tools Tools are more often used by security industries to test the vulnerabilities in network and applications. Here …

Snowden's New App Turns Your Spare Android Phone into a Pocket-Sized Security System

NSA whistleblower Edward Snowden has helped create a new way to protect you from potential snoops.<p>Snowden joined with the Freedom of the Press …

Android Phones

Apple responds to Sen. Al Franken’s Face ID concerns in letter

Apple has responded to Senator Al Franken's concerns over the privacy implications of its Face ID feature, which is set to debut on the iPhone X next month. In his letter to Tim Cook, Franken asked about customer security, third-party access to data (including requests by law enforcement), and …

Privacy

'Petya' ransomware attack strikes companies across Europe and US

Ukraine government, banks and electricity grid hit hardest, but companies in France, Denmark and Pittsburgh, Pennsylvania also attacked<p>Victims of a major ransomware cyberattack that has spread through the US and Europe can no longer unlock their computers even if they pay the ransom.<p>The “Petya” …

Cybersecurity

North Korea top suspect for WannaCry attack, says ex US security chief

Methods used in ransomware attack on NHS and in up to 100 countries similar to those used by Pyongyang in the past, says Michael Chertoff<p>North Korea may have been behind the ransomware cyber-attack on the NHS and up to 100 countries including the UK, a former head of the US Department of Homeland …

Kaspersky to US: Check Our Source Code

Cybersecurity expert Eugene Kaspersky reportedly has volunteered to turn over his company's software source code to allay fears about possible ties …

Cybercriminals Breached Over a Billion Accounts Last Year

Cybercriminals had a very good year in 2016 — and we all paid the price.<p>These digital bandits became more ambitious and more creative and that resulted in a year marked by “extraordinary attacks,” according to the 2017 Internet Security Threat Report from Symantec. “Cyber crime hit the big time in …

Cybersecurity

Russian Cybercriminals Are Loving Those Leaked NSA Windows Weapons

It’s been little over a week and a half since a hacker crew called the Shadow Brokers released a batch of tools believed to have belonged to the NSA, designed to break through the defences of Windows systems. Whilst Microsoft mysteriously patched its operating system to deflect attacks using the …

Microsoft Word flaw took so long to fix that hackers used it to send fraud software to millions of computers

A flaw in Microsoft Word took the tech giant so long to fix that hackers were able to use it to send fraud software to millions of computers, it has been revealed.<p>The security flaw, officially known as CVE-2017-0199, could allow a hacker to seize control of a personal computer with little trace, …

Mysterious Microsoft patch killed 0-days released by NSA-leaking Shadow Brokers

Microsoft fixed critical vulnerabilities in uncredited update released in March.<p>Contrary to what Ars and the rest of the world reported Friday, none …

Malwarebytes Details Cybersecurity Threats Seen During Q1 2017 For Windows, MacOS And Android

Many people don’t know as much about personal cybersecurity as they think they do. The bad news is that misunderstanding and lack of knowledge can put you at serious risk. The good news is that in many cases simply knowing what to be wary of is enough to provide a fairly effective level of …

Trend Micro

Forget the Tax Man: Time for a DNS Security Audit

Here's a 5-step DNS security review process that's not too scary and will help ensure your site availability and improve user experience.<p>1 of 8<p><i>Image</i> …

Snoops may soon be able to buy your browsing history. Thank the US Congress | Bruce Schneier

Not only did they vote to violate your privacy for their own profit – they are seeking to make it illegal for a key watchdog to protect your privacy online<p>Think about all of the websites you visit every day. Now imagine if the likes of Time Warner, AT&T and Verizon collected <i>all</i> of your browsing …

Privacy

Google kills text-based Captcha security tool; launches AI-powered invisible reCAPTCHA - IBTimes India

Google's reCAPTCHA comes equipped with Artificial Intelligence (AI) with machine learning and advanced risk analysis capability.<p>Search engine giant …

US military leak exposes 'holy grail' of security clearance files

Exclusive: These security clearance applications contain sensitive personal information, and are highly valuable to foreign adversaries seeking to …

Security

Intel Security releases MacBook scanner for CIA Vault 7 rootkits

We’re just a few days removed from the WikiLeaks publication, Vault 7, that outlined many of the supposed hacking tools at the disposal of the CIA. …

World's most wanted hacker Evgeniy Bogachev fuelled Kremlin's espionage efforts - Report

The cybercriminal reportedly owns luxury cars and a yacht and is currently believed to be living openly in Russia.<p>Evgeniy M Bogachev is reportedly …

Learn to become a Google Chrome power user

Do you use Google Chrome? Do you want to become a Google Chrome power user? Read on!<p>Do you use Google Chrome? Do you want to become a Google Chrome …

Reach inbox zero in Gmail with these 5 tricks

Take charge of your emails<p>When it comes to email, it's usually a case of can't live with it, can't live without it. These messages make up an essential part of modern-day communications, but sorting through them takes up an inordinate amount of time, time that could be spent doing something more …

There’s A Virus Infecting Our Medical Devices With Identity Stealing Malware

Medjack is coming for your doctor’s office.<p>We’re slowly learning that while appliances connected to the internet, aka the internet of things, might be convenient, they’re also a hacker’s paradise, because in our haste to make them easy to use, we’ve made them woefully insecure. But it’s not just …

Teen Who Hacked CIA Director's Email Tells How He Did It

A hacker who claims to have broken into the AOL account of CIA Director John Brennan says he obtained access by posing as a Verizon worker to trick …

Hacking Conference Audio and Video Archive

7 Concepts That Tease The Wacky Future Of Screens

Architecture that morphs, clothing made of woven LEDs, and interfaces hidden in everyday products<p>For years, experts have predicted that screens will disappear, as voice interaction and ambient computing take over. But London-based digital design studio Universal Everything thinks screens will stick …

Touchscreens

Awesome Windows Domain Hardening

A curated list of awesome Security Hardening techniques for Windows.<p>Created by gepeto42 and PaulWebSec but highly inspired from PyroTek3 …

Yahoo punishes CEO Marissa Mayer over hacks that cost firm $350 million

Yahoo is punishing CEO Marissa Mayer and jettisoning its top lawyer for the mishandling of two security breaches that exposed the personal information of more than 1 billion users and already have cost the company $350 million.<p>Ms Mayer won't be paid her annual bonus nor receive a potentially …

What’s Next in Computing?

This post is by Chris Dixon, General Partner at AndreessenThe post What’s Next in Computing? appeared first on iamwire.

New Report: Businesses Suffer Serious, Measurable Damage From Data Breaches | Inc.com

More than 50 percent of organizations faced public scrutiny after a security breach. Operations and finance systems were the most affected, followed by brand reputation and customer retention. <i>(If you own or work for a business, take note: data breaches have repercussions.)</i><p>For organizations that …

How To Create A Cyber Security Playbook

<b>What is a Cyber Security Playbook?</b><p>All organisations plan for fires, floods, or any other type of incident that impacts business resilience, why …

Cybersecurity

China is funding Baidu to take on the US in deep-learning research

While US-based companies like Alphabet, IBM, Facebook, and Microsoft typically dominate US artificial-intelligence headlines, China’s government is now accelerating the country’s own contributions to the field.<p>China’s National Development and Reform Commission, a government agency tasked with …

Artificial Intelligence

New details emerge about Palantir’s custom software for spy agencies

A new report by The Intercept provides some compelling specifics on collaboration between Palo Alto’s secretive big data shop Palantir and the intelligence agencies that it keeps on its client roster.<p>While some broad strokes are known about Palantir’s relationship with spy agencies, the finer …

Surveillance