The Blog
HOME
Thursday, January 17, 2013
Deobfuscating Potentially Malicious URLs - Part 1
http://blog.opensecurityresearch.com/2013/01/deofuscating-potentially-malicious-urls.html
How Twitter users can fake a verified account - and how you can tell the difference
http://nakedsecurity.sophos.com/2013/01/17/twitter-fake-verified-account/
Google has been accused of many things, but KILLING A DONKEY?
http://nakedsecurity.sophos.com/2013/01/17/did-google-kill-a-donkey/
Harvard Hacked Again by @D35m0nd142
http://www.cyberwarnews.info/2013/01/17/harvard-hacked-again-by-d35m0nd142/
http://pastebin.com/k2GCM9qp
The use of passwords in a technological evolution
http://thehackernews.com/2013/01/the-use-of-passwords-in-technological.html
http://www.deloitte.com/assets/Dcom-Shared%20Assets/Documents/TMT%20Predictions%202013%20PDFs/dttl_TMT_Predictions2013_Final.pdf
Malware Infects US Power Plants through USB Drives
http://thehackernews.com/2013/01/malware-infects-us-powers-through-usb.html
http://www.us-cert.gov/control_systems/pdf/ICS-CERT_Monthly_Monitor_Oct-Dec2012.pdf
Cisco Linksys routers vulnerable to remote zero-day exploit
http://thehackernews.com/2013/01/cisco-linksys-routers-vulnerable-to.html
Newer Posts
Older Posts
Home
Subscribe to:
Posts (Atom)