Switch branches/tags
Nothing to show
Find file Copy path
Fetching contributors…
Cannot retrieve contributors at this time
500 lines (401 sloc) 40 KB



  • Strong Passwords Aren't Enough: How to to Ensure the Apple and Amazon Explo
  • Don't be a Petraeus: A Tutorial on Anonymous Email Accounts | Electronic Fr
  • Staying safe online: Using a password manager just isnâ��t enough | ExtremeTe
  • Misconfigured Apache sites expose user passwords, other private data | Ars
  • Study May Offer Insight Into Coca-Cola Breach -
  • Why Good
  • When It Comes to Security, We're Back to Feudalism | Wired Opinion | Wired.
  • Schneier on Security: All Those Companies that Can't Afford Dedicated Secur
  • Schneier on Security: Phishing Has Gotten Very Good
  • The Unsecured State Part 3 � 2,000 NHS Security Vulnerabilities (Disclosed
  • Do me a favor. Go through this list and make sure that you revoke everythin
  • hilarious security article by james mickens.
  • Beware Keyloggers at Hotel Business Centers
  • How online scammers made millions selling nonexistent cars, motor homes | A
  • �Lucky Thirteen� attack snarfs cookies protected by SSL encryption | Ars Te
  • How to Use Your Cat to Hack Your Neighbor�s Wi-Fi | Threat Level | WIRED

    SSL, Heartbleed

  • What Heartbleed Can Teach The OSS Community About Marketing | Kalzumeus Sof
  • A DEFINITVE answer on whether Mint was EVER affected by Heartbleed?
  • Flash

    SQL Injection

  • sqlmap: automatic SQL injection and database takeover tool
  • SQL Injection Hacker Attacks Are On The Rise. Here's How To Defend Your Ser
  • Internet of Things, Vehicles, Industrial Systems

    Security Policy

  • TSA employee to security theater skeptics: "You don't have shit for rights"
  • Android, OS X, Windows, Smartphones

    Bug Bounties, White Hats, Infosec Industry

  • How 4 Microsoft engineers proved that the darknet would defeat DRM | Ars
  • Data Breaches, Ransomware

  • datachick: Exclusive: Hacker nabs 3m Verizon customer records
  • No consensus on notifying victims of data breaches | Technology | Seattle N
  • Security of users' data?
  • OPM

    Nation-State Attacks, China, Russia

  • How Georgia doxed a Russian hacker (and why it matters) | Ars Technica
  • Finance Attacks, Payment Systems, Credit Cards

  • Target, Neiman Marcus Credit Card Hacking Reveals Third-World US Payment Sy
  • Security Algorithms, Hashing, Password Cracking, Password Strength

  • 25-GPU cluster cracks every standard Windows password in
  • Update: New 25 GPU Monster Devours Passwords In Seconds | The Security Ledg
  • Kill the Password: Why a String of Characters Can't Protect Us Anymore | Ga
  • TrueCrypt

  • Volatility Labs: TrueCrypt Master Key Extraction And Volume Identification
  • Lenovo / Superfish / Dell

    NSA / CIA / GCHQ / Snowden / FBI

  • 'Everyone in US under virtual surveillance' - NSA whistleblower � RT
  • Sony Hack