skip to main
|
skip to sidebar
Lazy to Hack
If you're lazy to hack, get all the news here!
::Trend Micro Threat Resource Center::
Get the
Threat Resource Center
widget and many other
great free widgets
at
Widgetbox
! Not seeing a widget? (
More info
)
02 March 2010
Hitler and Cloud Computing Security
Hitler learns a painful lesson about Cloud Computing security.
Newer Post
Older Post
Home
= Why =
As a super user of the Information Highway, I hope to share my knowledge, inculcate the security culture, and to create security awareness amongst the less savvy users.
Welcome, if you're lazy to hack. :)
:: Twitter Feed ::
Tweets by @Lazy2Hack
= Latest Virus Alerts =
= Safe Web Browsing Tips =
= Daily Reads =
Security Focus
Dark Reading
SecurityPro News
Net-Security
Hacker Journals Newspaper
MadMark's Blog
Naked Security (Sophos)
Sunbelt Blog
Harry Waldron - IT Security
Optimal Security : the Lumension Blog
TrendLabs Malware Blog
MX Labs - Acquired taste for SPAM viruses
IT & Security Portal
CSIRT
NIST
SANS Forensics
HackInTheBox
BlogSecurity.Net
RSA: Speaking of Security
Roger's InfoSec Blog
Snapcrackerz
Reverse Engineering (misunderstood)
Hacking for Windows
Cybexin Security Blog
Security Monkey
High value RSS feeds list
= On the go =
Podcasts for Cyber Security Pros
Symantec Security Response
Social Media Security
Social-engineer
CERT's Series
Network Security Blog (mckeay)
Network Security Podcast
= Archives =
►
2016
(20)
►
May
(1)
►
April
(3)
►
March
(2)
►
February
(3)
►
January
(11)
►
2015
(74)
►
December
(5)
►
November
(9)
►
October
(8)
►
September
(6)
►
August
(4)
►
July
(3)
►
May
(4)
►
April
(2)
►
March
(10)
►
February
(12)
►
January
(11)
►
2014
(76)
►
December
(10)
►
November
(14)
►
October
(12)
►
September
(24)
►
August
(15)
►
July
(1)
►
2013
(13)
►
November
(1)
►
April
(1)
►
March
(10)
►
February
(1)
►
2012
(28)
►
November
(4)
►
October
(2)
►
September
(3)
►
July
(2)
►
May
(4)
►
April
(5)
►
March
(4)
►
January
(4)
►
2011
(88)
►
December
(3)
►
November
(6)
►
October
(2)
►
September
(3)
►
August
(3)
►
July
(13)
►
June
(21)
►
May
(8)
►
April
(4)
►
March
(15)
►
February
(6)
►
January
(4)
▼
2010
(213)
►
December
(10)
►
November
(17)
►
October
(27)
►
September
(22)
►
August
(12)
►
July
(19)
►
June
(18)
►
May
(22)
►
April
(24)
▼
March
(14)
Rogue toolbars phish for Facebook credentials
Symbian-targeting SMS worms in-the-wild
20 critical Apple vulnerabilities to be revealed
IE8, iPhone will fall first day of hacking contest...
Collection of security checks for Linux
Researchers build 8,000-strong smartphone botnet
Most costly security scam of 2010 - Scareware
Mariposa Botnet Malware Found On Vodaphone HTC Magic
USB battery charger installs Trojan
Apple bans Wi-Fi hotspot sniffers from App Store
Taiwan earthquake damages undersea Internet cables
Tool Automates Targeted Attacks On Social Network ...
Pressing F1 In Internet Explorer flaw
Hitler and Cloud Computing Security
►
February
(13)
►
January
(15)
►
2009
(115)
►
December
(11)
►
November
(15)
►
October
(13)
►
September
(5)
►
August
(15)
►
July
(13)
►
June
(10)
►
May
(2)
►
April
(15)
►
March
(2)
►
February
(6)
►
January
(8)
►
2008
(15)
►
December
(15)
Labels
2FA
(5)
Acrobat reader
(16)
Adobe
(29)
Adware
(1)
Aerospace
(2)
AirDrop
(1)
AISP
(1)
Alphabet
(1)
Amazon
(5)
Android
(40)
Anonymous
(4)
anti-phishing
(2)
antivirus
(14)
AOL
(3)
Apple
(73)
Apple Pay
(1)
AppStore
(2)
APT
(4)
Ashley Madison hack
(3)
AsiaPac
(2)
Asus
(1)
AT&T
(1)
Aurora
(6)
Australia
(2)
AVG
(3)
badUSB
(3)
Baidu
(1)
Bank
(2)
Bash Bug
(5)
bebo
(1)
biometric
(1)
BitTorrent
(2)
Blackberry
(5)
Blackhat Asia
(1)
Blackhole
(2)
blogging
(4)
Blu-ray
(1)
bootable CDs
(5)
Bootkit
(1)
bot net
(15)
breach
(39)
brute force
(3)
BSOD
(1)
car alarms
(1)
Care2.com
(1)
CelebGate
(7)
Censys
(1)
Child safety
(1)
China hacking
(21)
Cisco
(2)
clickjacking
(4)
Cloud computing
(5)
Cloud Security
(8)
Conference
(1)
conficker
(6)
Conventions
(5)
cracking
(2)
CryptoLocker
(3)
Cyber Threat Alliance
(1)
CyberSecurity
(12)
Cybersquatting
(1)
D-link
(1)
data theft
(34)
DDOS
(9)
defaced website
(7)
defcon
(1)
Dell
(1)
directory harvesting attack
(1)
DIY
(1)
DNS cache poisoning
(2)
downadup
(5)
Drive-by attack
(4)
Dropbox
(2)
eBay
(2)
education
(1)
email
(24)
encryption
(10)
espionage
(3)
events
(9)
exploit
(11)
facebook
(97)
facebook messenger
(1)
FaceTime
(1)
fake jobs
(1)
fakeAV
(1)
FireEye Optus
(2)
firefox
(11)
Flash
(8)
Fortinet
(1)
fraud
(8)
free download
(7)
freeware
(2)
friendster
(14)
FrP
(1)
Gartner
(1)
Ghost
(1)
GitHub
(1)
gmail
(12)
google
(59)
Google buzz
(1)
google chrome
(11)
google earth
(1)
Google+
(1)
Government Initiatives
(5)
GPS
(1)
GSM
(3)
hack
(2)
hacked
(40)
hardware
(1)
Hi5
(2)
hoax
(8)
hotmail
(5)
HTTPS
(1)
iCloud
(11)
identity theft
(70)
illegal software
(2)
infection
(47)
Instagram
(2)
Internet
(2)
internet explorer
(25)
Internet of Things
(4)
Investment
(1)
iOS
(19)
IoT
(4)
iPad
(6)
IPcam
(1)
iphone
(45)
iPhone 5
(2)
iPhone 6
(6)
ISIS
(2)
ISP
(1)
ITSC
(1)
iTunes
(6)
iWorm
(1)
jailbreak
(4)
Japan
(1)
Japan Airlines
(1)
Java
(1)
javascript
(8)
Kaspersky
(1)
keylogger
(1)
kids
(1)
Kindle
(1)
koobface
(1)
leaked
(3)
Legacy
(1)
Lenovo
(2)
LinkedIn
(1)
Linux
(18)
Lizard Squad
(1)
Lollipop
(2)
Lulzsec
(2)
Lumia
(1)
Mac OS
(12)
Malaysia Airlines
(1)
malicious code
(36)
Malware
(27)
megaupload
(1)
microsoft
(39)
microsoft office
(3)
MITM attack
(1)
mobilephone
(41)
mouse
(1)
MPAA
(1)
msn
(3)
myspace
(11)
myyearbook
(1)
NAS
(1)
NASDAQ
(1)
Natural disaster
(5)
Netflix
(1)
NICs
(1)
Nokia
(3)
North Korea
(2)
NSA
(2)
Online shopping
(3)
opera
(1)
Operation Pawn Storm
(1)
OS X
(2)
Osama bin Laden
(1)
P2P
(1)
password
(22)
Paypal
(2)
pcAnywhere
(1)
phishing
(51)
Photoshop
(1)
Pinterest
(2)
piracy
(1)
Playstation
(3)
Political
(2)
powerpoint
(1)
privacy
(25)
PwC
(1)
Pwn2Own
(4)
Quicktime
(1)
ransomware
(7)
RIAA
(2)
rootkit
(8)
Routers
(2)
RSA
(4)
safari
(8)
samsung
(2)
scam
(54)
scareware
(4)
Search Engine Optimization
(1)
Search engine poisoning
(10)
security awareness
(8)
Security Operation Centre
(4)
self muse
(1)
seminar
(1)
SEO
(1)
ShellShock
(5)
Shodan
(1)
Shortened URL
(1)
Silent Circle
(1)
Singapore
(9)
Singtel
(2)
Siri
(1)
skype
(6)
Smartphone
(23)
sms
(6)
SnapChat
(1)
Snappening
(2)
social engineering
(13)
social networking
(70)
Sony
(7)
Sony Ericsson
(2)
SOPA
(1)
spam
(29)
spoofing
(1)
spyware
(7)
SQL
(6)
SQL injection
(4)
SSH backdoor
(2)
Stagefright
(3)
Steam
(1)
Stratfor
(2)
SuperFish
(2)
surveillance
(2)
Symantec
(9)
Techdays
(2)
terrorist
(1)
thoughts
(2)
ThuderBolt
(1)
tips
(1)
Tor
(1)
TorLocker
(2)
training
(1)
trojan
(46)
tumblr
(2)
Twitch
(1)
twitter
(44)
typosquatting
(1)
U2
(1)
Unix
(6)
USB
(9)
virus
(30)
visibility
(1)
VOIP
(1)
vulnerability
(12)
war texting
(1)
Web Application Scanner
(1)
web browser
(19)
Whatsapp
(5)
WiFi
(5)
Windows
(8)
Windows 10
(1)
Windows 7
(9)
Windows 8.1
(2)
Windows Live
(1)
Windows mobile
(3)
Windows Phone
(1)
Windows Vista
(2)
wireless
(2)
WireLurker
(4)
word
(2)
WordPress
(9)
worm
(8)
WormHole
(1)
Xbox
(2)
Xcode
(1)
XSS
(4)
yahoo
(12)
Yahoo Messenger
(1)
Youtube
(6)
zero day
(12)
zero day plus one
(1)
netizens left a footprint.