Sat.Mar 17, 2018

article thumbnail

Taking down Gooligan: part 2 — inner workings

Elie

This post provides an in-depth analysis of the inner workings of Gooligan, the infamous Android OAuth stealing botnet. This is the second post of a series dedicated to the hunt and takedown of Gooligan that we did at Google, in collaboration with Check Point, in November 2016. The. first post. recounts Gooligan’s origin story and provides an overview of how it works.

article thumbnail

Security News This Week: A Smartphone Botnet Army Keeps Growing Stronger

WIRED Threat Level

A major botnet, an Equifax indictment, and more of the week's top security news.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Taking down Gooligan: part 2 — inner workings

Elie

This post provides an in-depth analysis of the inner workings of Gooligan, the infamous Android OAuth stealing botnet. This is the second post of a series dedicated to the hunt and takedown of Gooligan that we did at Google, in collaboration with Check Point, in November 2016. The. first post. recounts Gooligan’s origin story and provides an overview of how it works.

article thumbnail

Weekly Update 78 (San Fran Edition)

Troy Hunt

Last day of travel! The weekly update is out late due to a packed week which I endured whilst battling a cold as well which has made it pretty rough. But other than that, it was a fantastic week recording Pluralsight courses and meeting with some really cool tech companies which I talk about in the update. I also talk a lot about credential stuffing which is just becoming an absolutely massive issue at present and I'll write more on that from home next week.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

User Object Attributes in Office 365 Exchange Online

JKevinParker

I was working with my team on using our Exchange Online user attributes to create a new custom signature. But I could not find a definitive reference listing the user object attributes. So I went back to PowerShell and got it myself. I did this by getting a user object and exporting it to a CSV file. These are all the attributes I found with "Get-User".

Risk 40
article thumbnail

Trump Campaign Data Consultants Cambridge Analytica Took 50 Million Facebook Users' Data

WIRED Threat Level

New reports indicate that Cambridge Analytica, the data team affiliated with Trump's 2016 presidential campaign, harvested data from 50 million Facebook users—and Facebook failed to stop them.

Security 111