Dan on Security
Register | Login
1. Trident - Sophisticated, persistent mobile attack against high-value targets on iOS (blog.lookout.com)
submitted by daniel over 3 years ago; voted 1 times | Up | 0 comments
2. HTTPoxy - Web/CGI Data Leakage Vulnerability (nakedsecurity.sophos.com)
submitted by daniel almost 4 years ago; voted 0 times | Up | 1 comments
3. DROWN Attack - Decrypting TLS on Servers with SSLv2 Enabled (blog.cryptographyengineering.com)
submitted by daniel about 4 years ago; voted 0 times | Up | 0 comments
4. Vulnerability in Glibc Allows Remote Execution on Domain Name Resolution (dankaminsky.com)
submitted by daniel about 4 years ago; voted 0 times | Up | 0 comments
5. OS X Apps Using Sparkle Updater are Vulnerable to MITM and RCE (vulnsec.com)
submitted by daniel over 4 years ago; voted 0 times | Up | 0 comments
6. SHA1 - A History of Hard Choices (medium.com)
submitted by daniel over 4 years ago; voted 0 times | Up | 1 comments
7. Unauthorized Code in Juniper Devices Allowing Decryption of VPN Traffic (forums.juniper.net)
submitted by daniel over 4 years ago; voted 0 times | Up | 0 comments
8. Certificate on Dell Laptops Breaks Encrypted HTTPS Connections (blog.hboeck.de)
submitted by daniel over 4 years ago; voted 1 times | Up | 0 comments
9. New attacks on Network Time Protocol can defeat HTTPS and create chaos (arstechnica.com)
submitted by daniel over 4 years ago; voted 14 times | Up | 0 comments
10. Setting up DNSCrypt (danonsecurity.com)
submitted by daniel over 4 years ago; voted 24 times | Up | 0 comments
11. Malware XcodeGhost Infects 39 iOS Apps, Including WeChat, Affecting Hundreds of Millions of Users (researchcenter.paloaltonetworks.com)
submitted by daniel over 4 years ago; voted 23 times | Up | 0 comments
12. The Latest on Stagefright: CVE-2015-1538 Exploit is Now Available for Testing Purposes Zimperium Mobile Security Blog (blog.zimperium.com)
submitted by daniel over 4 years ago; voted 23 times | Up | 0 comments
13. The Way GCHQ Obliterated The Guardians Laptops May Have Revealed More Than It Intended (firstlook.org)
submitted by daniel over 4 years ago; voted 33 times | Up | 0 comments
14. Major Android remote-access vulnerability is now being exploited (arstechnica.com)
submitted by daniel over 4 years ago; voted 30 times | Up | 0 comments
15. Black Hat USA 2015: The full story of how that Jeep was hacked | Kaspersky Lab Official Blog (blog.kaspersky.com)
submitted by daniel almost 5 years ago; voted 24 times | Up | 0 comments
16. Errata Security: A quick review of the BIND9 code (blog.erratasec.com)
submitted by daniel almost 5 years ago; voted 24 times | Up | 0 comments
17. Hackers Remotely Kill a Jeep on the Highway (wired.com)
submitted by daniel almost 5 years ago; voted 31 times | Up | 0 comments
18. Hacking Team Is Hacked - Schneier on Security (schneier.com)
submitted by daniel almost 5 years ago; voted 38 times | Up | 0 comments
19. How OPM hackers tapped the mother lode of espionage data (arstechnica.com)
submitted by daniel almost 5 years ago; voted 60 times | Up | 0 comments
20. Remote Code Execution as System User on Samsung Phones | NowSecure Blogs (nowsecure.com)
submitted by daniel almost 5 years ago; voted 49 times | Up | 0 comments
 

sort by: new | voted | magic | mine || render: new