skip to main
|
skip to sidebar
Lazy to Hack
If you're lazy to hack, get all the news here!
::Trend Micro Threat Resource Center::
Get the
Threat Resource Center
widget and many other
great free widgets
at
Widgetbox
! Not seeing a widget? (
More info
)
27 January 2015
When fixing a bug in a legacy system...
Newer Post
Older Post
Home
= Why =
As a super user of the Information Highway, I hope to share my knowledge, inculcate the security culture, and to create security awareness amongst the less savvy users.
Welcome, if you're lazy to hack. :)
:: Twitter Feed ::
Tweets by @Lazy2Hack
= Latest Virus Alerts =
= Safe Web Browsing Tips =
= Daily Reads =
Security Focus
Dark Reading
SecurityPro News
Net-Security
Hacker Journals Newspaper
MadMark's Blog
Naked Security (Sophos)
Sunbelt Blog
Harry Waldron - IT Security
Optimal Security : the Lumension Blog
TrendLabs Malware Blog
MX Labs - Acquired taste for SPAM viruses
IT & Security Portal
CSIRT
NIST
SANS Forensics
HackInTheBox
BlogSecurity.Net
RSA: Speaking of Security
Roger's InfoSec Blog
Snapcrackerz
Reverse Engineering (misunderstood)
Hacking for Windows
Cybexin Security Blog
Security Monkey
High value RSS feeds list
= On the go =
Podcasts for Cyber Security Pros
Symantec Security Response
Social Media Security
Social-engineer
CERT's Series
Network Security Blog (mckeay)
Network Security Podcast
= Archives =
►
2016
(20)
►
May
(1)
►
April
(3)
►
March
(2)
►
February
(3)
►
January
(11)
▼
2015
(74)
►
December
(5)
►
November
(9)
►
October
(8)
►
September
(6)
►
August
(4)
►
July
(3)
►
May
(4)
►
April
(2)
►
March
(10)
►
February
(12)
▼
January
(11)
Singapore to set up Cyber Security Agency
When fixing a bug in a legacy system...
Hackers target Malaysia Airlines website
iCloud is a major weakness: will Apple ever fix it?
Your computer and smartphone, held hostage
World’s first (known) bootkit for OS X can permane...
Google Isn’t Fixing Some Old Android Bugs
Researchers measure reach of Australian TorrentLoc...
Exploit allows Asus routers to be hacked from loca...
Skype serving virus-laden ads
If Your iCloud Password Is On This List, Change It...
►
2014
(76)
►
December
(10)
►
November
(14)
►
October
(12)
►
September
(24)
►
August
(15)
►
July
(1)
►
2013
(13)
►
November
(1)
►
April
(1)
►
March
(10)
►
February
(1)
►
2012
(28)
►
November
(4)
►
October
(2)
►
September
(3)
►
July
(2)
►
May
(4)
►
April
(5)
►
March
(4)
►
January
(4)
►
2011
(88)
►
December
(3)
►
November
(6)
►
October
(2)
►
September
(3)
►
August
(3)
►
July
(13)
►
June
(21)
►
May
(8)
►
April
(4)
►
March
(15)
►
February
(6)
►
January
(4)
►
2010
(213)
►
December
(10)
►
November
(17)
►
October
(27)
►
September
(22)
►
August
(12)
►
July
(19)
►
June
(18)
►
May
(22)
►
April
(24)
►
March
(14)
►
February
(13)
►
January
(15)
►
2009
(115)
►
December
(11)
►
November
(15)
►
October
(13)
►
September
(5)
►
August
(15)
►
July
(13)
►
June
(10)
►
May
(2)
►
April
(15)
►
March
(2)
►
February
(6)
►
January
(8)
►
2008
(15)
►
December
(15)
Labels
2FA
(5)
Acrobat reader
(16)
Adobe
(29)
Adware
(1)
Aerospace
(2)
AirDrop
(1)
AISP
(1)
Alphabet
(1)
Amazon
(5)
Android
(40)
Anonymous
(4)
anti-phishing
(2)
antivirus
(14)
AOL
(3)
Apple
(73)
Apple Pay
(1)
AppStore
(2)
APT
(4)
Ashley Madison hack
(3)
AsiaPac
(2)
Asus
(1)
AT&T
(1)
Aurora
(6)
Australia
(2)
AVG
(3)
badUSB
(3)
Baidu
(1)
Bank
(2)
Bash Bug
(5)
bebo
(1)
biometric
(1)
BitTorrent
(2)
Blackberry
(5)
Blackhat Asia
(1)
Blackhole
(2)
blogging
(4)
Blu-ray
(1)
bootable CDs
(5)
Bootkit
(1)
bot net
(15)
breach
(39)
brute force
(3)
BSOD
(1)
car alarms
(1)
Care2.com
(1)
CelebGate
(7)
Censys
(1)
Child safety
(1)
China hacking
(21)
Cisco
(2)
clickjacking
(4)
Cloud computing
(5)
Cloud Security
(8)
Conference
(1)
conficker
(6)
Conventions
(5)
cracking
(2)
CryptoLocker
(3)
Cyber Threat Alliance
(1)
CyberSecurity
(12)
Cybersquatting
(1)
D-link
(1)
data theft
(34)
DDOS
(9)
defaced website
(7)
defcon
(1)
Dell
(1)
directory harvesting attack
(1)
DIY
(1)
DNS cache poisoning
(2)
downadup
(5)
Drive-by attack
(4)
Dropbox
(2)
eBay
(2)
education
(1)
email
(24)
encryption
(10)
espionage
(3)
events
(9)
exploit
(11)
facebook
(97)
facebook messenger
(1)
FaceTime
(1)
fake jobs
(1)
fakeAV
(1)
FireEye Optus
(2)
firefox
(11)
Flash
(8)
Fortinet
(1)
fraud
(8)
free download
(7)
freeware
(2)
friendster
(14)
FrP
(1)
Gartner
(1)
Ghost
(1)
GitHub
(1)
gmail
(12)
google
(59)
Google buzz
(1)
google chrome
(11)
google earth
(1)
Google+
(1)
Government Initiatives
(5)
GPS
(1)
GSM
(3)
hack
(2)
hacked
(40)
hardware
(1)
Hi5
(2)
hoax
(8)
hotmail
(5)
HTTPS
(1)
iCloud
(11)
identity theft
(70)
illegal software
(2)
infection
(47)
Instagram
(2)
Internet
(2)
internet explorer
(25)
Internet of Things
(4)
Investment
(1)
iOS
(19)
IoT
(4)
iPad
(6)
IPcam
(1)
iphone
(45)
iPhone 5
(2)
iPhone 6
(6)
ISIS
(2)
ISP
(1)
ITSC
(1)
iTunes
(6)
iWorm
(1)
jailbreak
(4)
Japan
(1)
Japan Airlines
(1)
Java
(1)
javascript
(8)
Kaspersky
(1)
keylogger
(1)
kids
(1)
Kindle
(1)
koobface
(1)
leaked
(3)
Legacy
(1)
Lenovo
(2)
LinkedIn
(1)
Linux
(18)
Lizard Squad
(1)
Lollipop
(2)
Lulzsec
(2)
Lumia
(1)
Mac OS
(12)
Malaysia Airlines
(1)
malicious code
(36)
Malware
(27)
megaupload
(1)
microsoft
(39)
microsoft office
(3)
MITM attack
(1)
mobilephone
(41)
mouse
(1)
MPAA
(1)
msn
(3)
myspace
(11)
myyearbook
(1)
NAS
(1)
NASDAQ
(1)
Natural disaster
(5)
Netflix
(1)
NICs
(1)
Nokia
(3)
North Korea
(2)
NSA
(2)
Online shopping
(3)
opera
(1)
Operation Pawn Storm
(1)
OS X
(2)
Osama bin Laden
(1)
P2P
(1)
password
(22)
Paypal
(2)
pcAnywhere
(1)
phishing
(51)
Photoshop
(1)
Pinterest
(2)
piracy
(1)
Playstation
(3)
Political
(2)
powerpoint
(1)
privacy
(25)
PwC
(1)
Pwn2Own
(4)
Quicktime
(1)
ransomware
(7)
RIAA
(2)
rootkit
(8)
Routers
(2)
RSA
(4)
safari
(8)
samsung
(2)
scam
(54)
scareware
(4)
Search Engine Optimization
(1)
Search engine poisoning
(10)
security awareness
(8)
Security Operation Centre
(4)
self muse
(1)
seminar
(1)
SEO
(1)
ShellShock
(5)
Shodan
(1)
Shortened URL
(1)
Silent Circle
(1)
Singapore
(9)
Singtel
(2)
Siri
(1)
skype
(6)
Smartphone
(23)
sms
(6)
SnapChat
(1)
Snappening
(2)
social engineering
(13)
social networking
(70)
Sony
(7)
Sony Ericsson
(2)
SOPA
(1)
spam
(29)
spoofing
(1)
spyware
(7)
SQL
(6)
SQL injection
(4)
SSH backdoor
(2)
Stagefright
(3)
Steam
(1)
Stratfor
(2)
SuperFish
(2)
surveillance
(2)
Symantec
(9)
Techdays
(2)
terrorist
(1)
thoughts
(2)
ThuderBolt
(1)
tips
(1)
Tor
(1)
TorLocker
(2)
training
(1)
trojan
(46)
tumblr
(2)
Twitch
(1)
twitter
(44)
typosquatting
(1)
U2
(1)
Unix
(6)
USB
(9)
virus
(30)
visibility
(1)
VOIP
(1)
vulnerability
(12)
war texting
(1)
Web Application Scanner
(1)
web browser
(19)
Whatsapp
(5)
WiFi
(5)
Windows
(8)
Windows 10
(1)
Windows 7
(9)
Windows 8.1
(2)
Windows Live
(1)
Windows mobile
(3)
Windows Phone
(1)
Windows Vista
(2)
wireless
(2)
WireLurker
(4)
word
(2)
WordPress
(9)
worm
(8)
WormHole
(1)
Xbox
(2)
Xcode
(1)
XSS
(4)
yahoo
(12)
Yahoo Messenger
(1)
Youtube
(6)
zero day
(12)
zero day plus one
(1)
netizens left a footprint.