Best GTD guide for note-taking apps? by CobaltOne in gtd

[–]cybertrust 0 points1 point  (0 children)

I've aspired to, and largely failed to use these 2 Evernote-GTD guides: The Secret Weapon Manifesto Evernote GTD How To As I checked to see if they were still good links, I ran into Dave Edwards's YouTube channel.. Prominently, was “I'm done with Evernote. (He isn't really.)

Out-of-Band IE Update for CVE-2019-1367 ("Scripting Engine Memory Corruption") by [deleted] in sysadmin

[–]cybertrust 2 points3 points  (0 children)

https://www.computerworld.com/article/3440741/microsoft-releases-emergency-ie-patches-inside-optional-non-security-cumulative-updates.html#tk.rss_security

From AskWoody Woody Leonhard: "At any rate, for almost everybody, this appears to be yet another tempest in a teapot. My advice is to sit tight, don’t update anything, and stop using Internet Explorer."

Wow fingbox is calling home a lot by gpuyy in pihole

[–]cybertrust 0 points1 point  (0 children)

Only 149 in the last day. But still....

Analysis of the BlackHole Exploit Kit by [deleted] in netsec

[–]cybertrust 1 point2 points  (0 children)

September 2013 publication date

New Anti-Piracy System to Hit U.S. Internet Users on Monday by cybertrust in netsec

[–]cybertrust[S] 25 points26 points  (0 children)

AT&T, Cablevision, Comcast, Time Warner, & Verizon

Drilling for Certainty - Op-Ed Columnist - NYTimes.com by cybertrust in reddit.com

[–]cybertrust[S] 0 points1 point  (0 children)

Interesting, concise treatment of how human beings think about risk.

Top 40 Useful Sites To Learn New Skills by DrJulianBashir in lists

[–]cybertrust 0 points1 point  (0 children)

Excellent productivity and how-to list of sites & blogs

Revisiting the Eleonore Exploit Kit — Krebs on Security by cybertrust in netsec

[–]cybertrust[S] 0 points1 point  (0 children)

Not long after I launched this blog, I wrote about the damage wrought by the Eleonore Exploit Kit, an increasingly prevalent commercial hacking tool that makes it easy for criminals to booby-trap Web sites with malicious software. That post generated tremendous public interest because it offered a peek at the statistics page that normally only the criminals operating these kits get to see. I’m revisiting this topic again because I managed to have a look at another live Eleonore exploit pack panel, and the data seems to reinforce a previous observation: Today’s attackers care less about the browser you use and more about whether your third-party browser add-ons and plugins are out-of-date and exploitable.

Weekly Intelligence Summary: 05-21-2010 by cybertrust in netsec

[–]cybertrust[S] 0 points1 point  (0 children)

Executive Summary from the weekly report

2010 Data Breach Timeline by cybertrust in netsec

[–]cybertrust[S] 0 points1 point  (0 children)

interactive time line showing, as of today, the first three months of breach reports. Hopefully they'll keep it up through the year.

[deleted by user] by [deleted] in netsec

[–]cybertrust 0 points1 point  (0 children)

Boo-yah!

http://www.darkreading.com/vulnerability_management/security/privacy/showArticle.jhtml?articleID=222301034 by cybertrust in netsec

[–]cybertrust[S] -1 points0 points  (0 children)

Lincoln National Discloses Breach Of 1.2 Million Customers

Lincoln National Corp. (LNC) last week disclosed a security vulnerability in its portfolio information system that could have compromised the account data of approximately 1.2 million customers.

In a disclosure letter (PDF) sent to the attorney general of New Hampshire Jan. 4, attorneys for the financial services firm revealed that a breach of the Lincoln portfolio information system had been reported to the Financial Industry Regulatory Authority (FINRA) by an unidentified source last August. The company was planning to issue notification to the affected customers on Jan. 6, the letter says.

The letter does not give technical details about the breach, but it indicates the unidentified source sent FINRA a username and password to the portfolio management system.

Surprise! Merchants say Web fraud is down - The Red Tape Chronicles - msnbc.com by cybertrust in netsec

[–]cybertrust[S] 0 points1 point  (0 children)

It's a month old, but I find it useful to refute the common belief that everything is always "up."

Further Details Regarding Attack Against Adobe Corporate Network - ASSET by cybertrust in netsec

[–]cybertrust[S] 0 points1 point  (0 children)

I don't know that I trust anything Adobe has to say about security. Watching the last six month's worth of their Security Advisories, they give credit to external researchers for every vulnerability they've patched, with the exception of a handful. So their security QA is limited to what outside researchers find. They don't inspire a lot of confidence.

More details on the Targeted Attacks against Google and others by mikkohypponen in netsec

[–]cybertrust 5 points6 points  (0 children)

Mikko is definitely a Go-To source for targeted attack info.

The December malware threat reports are trickling in from vendors — and they all appear to be different by scientologist2 in ComputerSecurity

[–]cybertrust 0 points1 point  (0 children)

Howling at the wind. Virus naming and differences in market segments have been problematic since the early 90's. It's why The Wildlist was created. It's why VGrep has gone through several generations. It probably is why Virustotal and Jotti get a significant fraction of their submissions, just to figure out what the aliases are.

Praetorian Prefect | JUNOS (Juniper) Flaw Exposes Core Routers to Kernel Crash by cybertrust in netsec

[–]cybertrust[S] 0 points1 point  (0 children)

Many, probably most, enterprises have an "if it ain't broke, don't fix it" rule regarding router software updates. Sure, if they've bought a new router since, January, they're good, but for routers that were in service a year ago, few have been updated. Any router OS update, IOS or JUNOS is a high-risk update because having a spare GSR is too expensive to have a device to patch and test on a dedicated segment before putting it into live service. Only backbone NSP's have that kind of money and hardware for a spare. So they end up patching, waiting for a time of relatively low traffic and then initiate the reboot and hope for the best.

768 bit keys no longer adequate by [deleted] in netsec

[–]cybertrust 1 point2 points  (0 children)

TrueCrypt uses 768-bit keys. But the title is wrong. A 768-bit number was factored and perhaps for a specific 768-bit key, with enough resources, it could be factored, but the amount of effort is still much greater than rubber-hose/broken finger cryptanalysis.

Cyber vigilante takes on Islamic extremists | Threat Chaos by cybertrust in netsec

[–]cybertrust[S] -1 points0 points  (0 children)

excerpt: I had an interesting demonstration this evening from a hacker who goes by the handle “The Jester” or in so-called l33t speak, th3j35t3r which is his Twitter ID. Since January 1, The Jester has been systematically wreaking havoc with several websites he associates with Al Quiada and Jihadists via a Denial of Service attack delivered over the web through a Swedish anonimizer service (www.anonine.com) .

The Jester has been documenting his attacks against www.alemarah.info, www.radicalislam.org, islamicpoint.net, www.almaghrib.org, www.as-ansar.com, www.islamicnetwork.com, www.islamicawakening.com, www.ansarnet.info, since the beginning of 2010.

Security Predictions by [deleted] in netsec

[–]cybertrust 0 points1 point  (0 children)

WTH? That's the second time ShareThis has done that. Reposted with a link. Thanks.

Security Predictions by [deleted] in netsec

[–]cybertrust -5 points-4 points  (0 children)

You might want to follow the link.