Stream

 
 
Android Security: 5 Ways To Secure Your Android Phone

The Android platform does not have to be inherently vulnerable to security issues, but it is a little more open than many others. For this reason, it’s very important that you take additional action to ensure that your phone is simplest secure. See more at: http://www.greatsoftline.com/5-ways-to-secure-your-android-phone/
8
5
miguel rodriguez's profile photoJosh Sabboth's profile photo
Add a comment...

Sergey Goryunov

Discussion  - 
 
 
#windows10 #security

Here are a few security features that Microsoft say will significantly improve your device and internet security:
Are Microsoft actually taking security seriously this time around? Windows has had plenty of problems with hackers because it was (and still is) the most popular operating system on the planet--but...
10
1
Sergey Gor (GreatSoftLine)'s profile photoṤⱧǠ ᴆŐƜ's profile photoJonny Moss's profile photo
7 comments
 
OK you are not making any sense. You seem like a Windows salesman to me +Sergey Goryunov 
Add a comment...
 
Lol Thought this was pretty cool
At least she advised people not to break the law. But I wonder how many won't listen lol
American TV show, Mr Robot, inspires Chinese web developer to create her own hacking toolkit - hidden away in her high heels.
7
dustin h.'s profile photo
 
nice fake boobies :)
Add a comment...

Cyrus Elworth

Discussion  - 
 
Hi my name is Cyrus, I have been through a very difficult time. Some people in the local community where I live stole all of my property including my (workstations, servers, all of the data, etc.) No one has helped get my property back; local law enforcement, the FBI, the DHS, etc. Now this isn't as simple as a few civil court hearings, someone had this planned. They have been using psychological warfare on me for what ends I do not know, but it has kept me from being able to work and recover my property. I am under a constant barrage of hacking attempts/cyber attacks and have been for a long time! I am posting here to ask for help in way that anyone can.
3
Cyrus Elworth's profile photo{gr3y h47}'s profile photo
3 comments
 
I would strongly recommend that you use a VPN service for all of your online interactions. Don't use public wifi if you can help it. Make sure that you turn off GPS on all of your smart devices. Also, Like James said, create brand new accounts for everything, including your bank accounts, create strong passwords that are at least 20 characters in length, using a password manager can help with that. Create email accounts that don't reveal your name in the address.......these are just few things that I can advise you to do. I hope this helps.
Add a comment...

ṤⱧǠ ᴆŐƜ
moderator

Discussion  - 
 
+TheWatcher _ It was this guy ROFL. He was wrong then he deleted the post and continued to rant
3
ṤⱧǠ ᴆŐƜ's profile photoTheWatcher _'s profile photo
4 comments
 
+ṤⱧǠ ᴆŐƜ
uhm... no...
Add a comment...

ṤⱧǠ ᴆŐƜ
moderator

Discussion  - 
 
I just had a conversation with "someone" I wont mention their name that he could "triangulate" my position if he had my IP address.... Now, this is foolish, I wish people would stop talking about stuff they don't understand.  
4
{gr3y h47}'s profile photoṤⱧǠ ᴆŐƜ's profile photo
21 comments
 
+{gr3y h47}
It wont matter my friend. He'll still argue that you can.
Add a comment...

Gustavo Alves

Discussion  - 
 
Hi guys! Dropped by with a question Ive had for some time now. Is hacking really mostly social engineering now? Is remote hacking obsolete? Thx for the help
3
ṤⱧǠ ᴆŐƜ's profile photoGustavo Alves's profile photo
9 comments
Add a comment...
 
We’re at an inflection point in technology history. The Internet of Things (IoT) now penetrates to the edge of the physical world and brings
4
1
Alexsander Antunes's profile photo
Add a comment...

TheWatcher _

Discussion  - 
Michael Ossmann gives a show-and-tell on open source versions of NSA's ANT surveillance toolkit.
11
6
Jose Miranda's profile photoAlexsander Antunes's profile photo
Add a comment...

ṤⱧǠ ᴆŐƜ
owner

Discussion  - 
 
Just figured I would share this with all of ya....
9
Hubert Przybylowski's profile photoDima Z's profile photo
15 comments
Dima Z
+
3
4
3
 
ROFLMAO! 
Add a comment...

Stephen Ziegler

Discussion  - 
 
Just a quick question here. I am a controls engineer in the power generation industry and as such, am resposible for multiple networked systems that mimic an enterprise environment. I am looking to certify CISSP and am looking for experienced opinions as to this certification and whether it is worth the time and effort to do so. Thanks in advance! 
2
Stephen Ziegler's profile photoJonathan Weekes's profile photo
4 comments
 
No problem!
Add a comment...

Kai Roer

Discussion  - 
 
The Security Culture Show is back after the summer! 
 
Join us to discuss how to build security culture, and learn from Rowenna Fielding! We will be discussing her take on security culture, and how she has created results. 

As always, we love your questions! Please join the discussion by asking questions in the comment session before or during the show. We will do our best to cover them! 

The Security Culture Show is a part of the free and open Security Culture Framework community at https://scf.roer.com 

Follow Kai:
Kai's Blog: http://roer.com
Kai on Twitter: http://twitter.com/kairoer
Kai on LinkedIn: http://linkedin.com/in/kairoer
Kai on G Plus: http://plus.google.com/+kairoer Kai's Youtube channel: http://youtube.com/kairoer

Follow Mo:
Mo's blog: http://moamin.com
Mo on Twitter: http://twitter.com/infosecmo
Mo on LinkedIn: http://www.linkedin.com/profile/view?id=58496081
Mo on G Plus: http://plus.google.com/105017980006962001108
This Hangout On Air is hosted by Kai Roer. The live video broadcast will begin soon.
Q&A
Preview
Live
The Security Culture Show #13
Wed, August 26, 12:00 PM
Hangouts On Air - Broadcast for free

4
2
Boyka Ashraf's profile photoLitzsey Tech Services's profile photo
Add a comment...

{gr3y h47}

Discussion  - 
 
For those of you seeking to understand what this is all about, this is the first note that was released by the Impact Team to Avid Media, which is the company that owns Ashley Madison. This is basically an ultimatum to AM to either take the site down or else the db will be released.
8
Co doi's profile photoDmitrii Cherepennikov's profile photo
9 comments
 
Co_Ol info. Thank;s... B-)
Add a comment...

Sergey Goryunov

Discussion  - 
 
This is an interesting technique that would fool some Anti-Phishing filters based on analysis of the URLs in the  embedded  email messages themselves.

https://securelist.com/blog/phishing/71963/a-phishing-trampoline-embedding-redirects-in-pdf-documents/
Today I ran into a typical fraud email claiming to come from a U.S. bank but with a twist! Analyzing the attachment, it turns out that there’s no malware inside but instead a new middle ste...
2
Add a comment...

Bhargav Tandel

Discussion  - 
 
Reaver – cracking WPA/2 using the WPS vulnerability
Share (y)
http://cybersecteam.org/?p=678
3
1
o ak's profile photo
Add a comment...
 
I really think this is so wrong. Its like intelligence isn't tolerated unless its in the bigger business's benefit.
9
2
Patrick Cockman's profile photoJonny Moss's profile photo
Add a comment...

Debaleena Ghosh

Discussion  - 
 
 
Research says computer program can be biased as well
A scientist named Suresh Venkakatasubramanian from University of Utah's school of computing along with other fellow scientists are working to find out if a machine
4
Add a comment...

ṤⱧǠ ᴆŐƜ
moderator

Discussion  - 
 
Hello World
9
Troy May's profile photoṤⱧǠ ᴆŐƜ's profile photo
14 comments
 
+Troy May
When I say it's by Shadow, I mean it's posted by  me not that I wrote it. Enough of your nonsense Troy
Add a comment...

Romain R

Discussion  - 
 
Bypass ESET. No FUD. http://wp.me/p5CxI2-7M
I was training my skills with Cobalt Strike when I decided to try something different by mixing some features in order to create a simple .exe which could not get the attention of the antivirus. Su...
3
Add a comment...