InfoSec’s Holy Grail: Data Sharing & Collaboration

July 31st, 2014
by Levi Gundert
Despite all the best intentions, cooperation around Internet security is a still a work in progress. Case in point: Microsoft's unilateral action against No-IP.

Posted in Uncategorized | Comments (0)

10 Dramatic Moments In Black Hat History

July 31st, 2014
by Ericka Chickowski
From Google hacking to ATM "jackpotting" to the NSA -- Black Hat has had some memorable moments over the years.

Posted in Uncategorized | Comments (0)

Black Hat USA 2014: Breaking Windows

July 31st, 2014
by Black Hat Staff
In our last Intel update before the imminent show (are you hyped? we are!) we're checking out three Briefings that center on vulnerabilities in Microsoft Windows. No kidding, Windows has vulnerabilities! Let's see what's what.

Posted in Uncategorized | Comments (0)

Infocon: green

July 31st, 2014
by SANS Internet Storm Center, InfoCON: green
A Honeypot for home: Raspberry Pi

Posted in Uncategorized | Comments (0)

A Honeypot for home: Raspberry Pi, (Thu, Jul 31st)

July 31st, 2014
by SANS Internet Storm Center, InfoCON: green

In numerous previous Diaries, my fellow Internet Storm Center Handlers have talk on honeypots, th ...(more)...

Posted in Uncategorized | Comments (0)

Hackers Can Control Your Phone Using a Tool That’s Already Built Into It

July 31st, 2014
by Kim Zetter
A lot of concern about the NSA’s seemingly omnipresent surveillance over the last year has focused on the agency’s efforts to install back doors in software and hardware. Those efforts are greatly aided, however, if the agency can piggyback on embedded software already on a system that can be exploited. Two researchers have uncovered such […]






Posted in Threat Level | Comments (0)

New Mobile Phone ’0wnage’ Threat Discovered

July 31st, 2014
by Kelly Jackson Higgins
Widespread major vulnerabilities discovered in client control software that affect nearly all smartphone platforms: Details to come at Black Hat USA next week.

Posted in Uncategorized | Comments (0)

Why the Security of USB Is Fundamentally Broken

July 31st, 2014
by Andy Greenberg
Computer users pass around USB sticks like silicon business cards. Although we know they often carry malware infections, we depend on antivirus scans and the occasional reformatting to keep our thumbdrives from becoming the carrier for the next digital epidemic. But the security problems with USB devices run deeper than you think: Their risk isn’t […]






Posted in Threat Level | Comments (0)

ISC StormCast for Thursday, July 31st 2014 http://isc.sans.edu/podcastdetail.html?id=4085, (Thu, Jul 31st)

July 31st, 2014
by SANS Internet Storm Center, InfoCON: green
...(more)...

Posted in Uncategorized | Comments (0)

Symantec Endpoint Protection Privilege Escalation Zero Day, (Wed, Jul 30th)

July 30th, 2014
by SANS Internet Storm Center, InfoCON: green

The people at Posted in Uncategorized | Comments (0)