Wired: Threat Level: Hacker Lexicon: What Are White Hat, Gray Hat, and Black...
Here's how to distinguish the colors of the hacker rainbow. The post Hacker Lexicon: What Are White Hat, Gray Hat, and Black Hat Hackers? appeared first on WIRED.
View ArticleWired: Threat Level: Matthew Keys Sentenced to Two Years for Aiding Anonymous
The former Tribune Company employee was convicted of giving Anonymous information that helped hackers access an LA Times server and alter a headline. The post Matthew Keys Sentenced to Two Years for...
View ArticleWired: Threat Level: A Scheme to Encrypt the Entire Web Is Actually Working
The non-profit certificate authority Let's Encrypt is enabling a sea change toward HTTPS encryption online. The post A Scheme to Encrypt the Entire Web Is Actually Working appeared first on WIRED.
View ArticleFortinet FortiGuard Blog: DMA Locker 4.0: The Next Threat to Healthcare?
Lately, healthcare has been making headlines due to an onslaught of ransomware attacks from viruses like TeslaCrypt and CryptoWall. As a result of many lucrative successes in extorting ransom payments,...
View ArticleKriptópolis - /* Nos gustaría cambiar el mundo, pero no tenemos el código...
Recientemente ha salido en algunos medios una noticia acerca de la clarificación de jurisprudencia sobre en qué circunstancias concretas puede una intervención telefónica autorizada judicialmente ser...
View Article48Bits Blog: LaCon2k16 Call For Pulpos
We are proud to present the call for papers for Lacon 2016!, get your papers in now. We are accepting short talks of 30min and long talks of ~1h.[when]conf will be held from the 23rd to the 25th of...
View ArticleNiels Provos: My Most Complex Pattern-Welded Sword
A Day at the Forge documents a single day at the shop. This time, I am working on a complex pattern-welded sword that contains a core of 8 pattern-welded bars. Watch me forge-weld the core and then...
View ArticleHex blog: Installing IDA 6.95 on Linux
IDA is still, as of this writing (August 9th, 2015), a 32-bit application and both IDA & its installer(*) require certain 32-bit libraries to be present on your Linux system before they can run....
View ArticleHex blog: IDA 6.95: Qt 5.6.0 configure options & patch
A handful of our users have already requested information regarding the Qt 5.6.0 build, that is shipped with IDA 6.95. Configure options Here are the options that were used to build the libraries on:...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Monday, August...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleDidier Stevens: Video: mimikatz: Golden Ticket + DCSync
I also have a video for my mimikatz: Golden Ticket + DCSync blog post.
View ArticleInfosec Events: Week 31 In Review – 2016
Events RelatedThe Security Summer Camp Talks I Want To See…– jerrygamblin.com I took some time tonight and read through the Security Summer Camp (BSidesLV, Blackhat and Defcon) schedules and picked the...
View ArticleInfosec Events: Week 32 In Review – 2016
Events RelatedDARPA’s Cyber Grand Challenge: Early Highlights from the Competition– www.youtube.com Early highlights from the world’s first all-machine hacking tournament, DARPA’s Cyber Grand Challenge...
View ArticleUn informático en el lado del mal: ¿Quién dijo que en Agosto se hace el vago?...
Ya hemos llegado a la mitad justa del mes de Agosto, así que aprovechando que hoy es el día más tranquilo - probablemente - de todo el verano, os traigo solo una recapitulación de los eventos y...
View ArticleArsTechnica: Security Content: The World Series of Hacking—without humans
LAS VEGAS—On a raised floor in a ballroom at the Paris Hotel, seven competitors stood silently. These combatants had fought since 9:00am, and nearly $4 million in prize money loomed over all the...
View ArticleSANS Internet Storm Center, InfoCON: green: MS Office 2013 - New Macro...
I was trolling through the readme">Plan security settings for VBA macros in Office 2016A quick check immediately followed, I dont see any new registry keys that allow this control....
View ArticleDarknet - The Darkside: UFONet – Open Redirect DDoS Tool
UFONet is an open redirect DDoS tool designed to launch attacks against a target, using insecure redirects in third party web applications, like a botnet. Obviously, only for testing purposes. The tool...
View ArticleArsTechnica: Security Content: 20 hotels suffer hack costing tens of...
(credit: HEI Hotels & Resorts)The chain that owns Starwood, Marriott, Hyatt, and Intercontinental hotels—HEI Hotels & Resorts—said this weekend that the payment systems for 20 of its locations...
View ArticleArsTechnica: Security Content: Linux bug leaves 1.4 billion Android users...
(credit: Ron Amadeo)An estimated 80 percent of Android phones contain a recently discovered vulnerability that allows attackers to terminate connections and, if the connections aren't encrypted, inject...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Tuesday, August...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View Article