Thursday, January 17, 2013

Deobfuscating Potentially Malicious URLs - Part 1

http://blog.opensecurityresearch.com/2013/01/deofuscating-potentially-malicious-urls.html

How Twitter users can fake a verified account - and how you can tell the difference

http://nakedsecurity.sophos.com/2013/01/17/twitter-fake-verified-account/

Google has been accused of many things, but KILLING A DONKEY?

http://nakedsecurity.sophos.com/2013/01/17/did-google-kill-a-donkey/

Harvard Hacked Again by @D35m0nd142

http://www.cyberwarnews.info/2013/01/17/harvard-hacked-again-by-d35m0nd142/

http://pastebin.com/k2GCM9qp

The use of passwords in a technological evolution

http://thehackernews.com/2013/01/the-use-of-passwords-in-technological.html

http://www.deloitte.com/assets/Dcom-Shared%20Assets/Documents/TMT%20Predictions%202013%20PDFs/dttl_TMT_Predictions2013_Final.pdf

Malware Infects US Power Plants through USB Drives

http://thehackernews.com/2013/01/malware-infects-us-powers-through-usb.html

http://www.us-cert.gov/control_systems/pdf/ICS-CERT_Monthly_Monitor_Oct-Dec2012.pdf

Cisco Linksys routers vulnerable to remote zero-day exploit

http://thehackernews.com/2013/01/cisco-linksys-routers-vulnerable-to.html