Quantcast
Channel: eternal-todo.com aggregator
Browsing all 12054 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Wired: Threat Level: Hacker Lexicon: What Are White Hat, Gray Hat, and Black...

Here's how to distinguish the colors of the hacker rainbow. The post Hacker Lexicon: What Are White Hat, Gray Hat, and Black Hat Hackers? appeared first on WIRED.

View Article


Image may be NSFW.
Clik here to view.

Wired: Threat Level: Matthew Keys Sentenced to Two Years for Aiding Anonymous

The former Tribune Company employee was convicted of giving Anonymous information that helped hackers access an LA Times server and alter a headline. The post Matthew Keys Sentenced to Two Years for...

View Article


Image may be NSFW.
Clik here to view.

Wired: Threat Level: A Scheme to Encrypt the Entire Web Is Actually Working

The non-profit certificate authority Let's Encrypt is enabling a sea change toward HTTPS encryption online. The post A Scheme to Encrypt the Entire Web Is Actually Working appeared first on WIRED.

View Article

Fortinet FortiGuard Blog: DMA Locker 4.0: The Next Threat to Healthcare?

Lately, healthcare has been making headlines due to an onslaught of ransomware attacks from viruses like TeslaCrypt and CryptoWall. As a result of many lucrative successes in extorting ransom payments,...

View Article

Kriptópolis - /* Nos gustaría cambiar el mundo, pero no tenemos el código...

Recientemente ha salido en algunos medios una noticia acerca de la clarificación de jurisprudencia sobre en qué circunstancias concretas puede una intervención telefónica autorizada judicialmente ser...

View Article


Image may be NSFW.
Clik here to view.

48Bits Blog: LaCon2k16 Call For Pulpos

We are proud to present the call for papers for Lacon 2016!, get your papers in now. We are accepting short talks of 30min and long talks of ~1h.[when]conf will be held from the 23rd to the 25th of...

View Article

Niels Provos: My Most Complex Pattern-Welded Sword

A Day at the Forge documents a single day at the shop. This time, I am working on a complex pattern-welded sword that contains a core of 8 pattern-welded bars. Watch me forge-weld the core and then...

View Article

Hex blog: Installing IDA 6.95 on Linux

IDA is still, as of this writing (August 9th, 2015), a 32-bit application and both IDA & its installer(*) require certain 32-bit libraries to be present on your Linux system before they can run....

View Article


Hex blog: IDA 6.95: Qt 5.6.0 configure options & patch

A handful of our users have already requested information regarding the Qt 5.6.0 build, that is shipped with IDA 6.95. Configure options Here are the options that were used to build the libraries on:...

View Article


SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Monday, August...

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article

Image may be NSFW.
Clik here to view.

Didier Stevens: Video: mimikatz: Golden Ticket + DCSync

I also have a video for my mimikatz: Golden Ticket + DCSync blog post.

View Article

Image may be NSFW.
Clik here to view.

Infosec Events: Week 31 In Review – 2016

Events RelatedThe Security Summer Camp Talks I Want To See…– jerrygamblin.com I took some time tonight and read through the Security Summer Camp (BSidesLV, Blackhat and Defcon) schedules and picked the...

View Article

Image may be NSFW.
Clik here to view.

Infosec Events: Week 32 In Review – 2016

Events RelatedDARPA’s Cyber Grand Challenge: Early Highlights from the Competition– www.youtube.com Early highlights from the world’s first all-machine hacking tournament, DARPA’s Cyber Grand Challenge...

View Article


Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: ¿Quién dijo que en Agosto se hace el vago?...

Ya hemos llegado a la mitad justa del mes de Agosto, así que aprovechando que hoy es el día más tranquilo - probablemente - de todo el verano, os traigo solo una recapitulación de los eventos y...

View Article

ArsTechnica: Security Content: The World Series of Hacking—without humans

LAS VEGAS—On a raised floor in a ballroom at the Paris Hotel, seven competitors stood silently. These combatants had fought since 9:00am, and nearly $4 million in prize money loomed over all the...

View Article


SANS Internet Storm Center, InfoCON: green: MS Office 2013 - New Macro...

I was trolling through the readme">Plan security settings for VBA macros in Office 2016A quick check immediately followed, I dont see any new registry keys that allow this control....

View Article

Image may be NSFW.
Clik here to view.

Darknet - The Darkside: UFONet – Open Redirect DDoS Tool

UFONet is an open redirect DDoS tool designed to launch attacks against a target, using insecure redirects in third party web applications, like a botnet. Obviously, only for testing purposes. The tool...

View Article


Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: 20 hotels suffer hack costing tens of...

(credit: HEI Hotels & Resorts)The chain that owns Starwood, Marriott, Hyatt, and Intercontinental hotels—HEI Hotels & Resorts—said this weekend that the payment systems for 20 of its locations...

View Article

Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Linux bug leaves 1.4 billion Android users...

(credit: Ron Amadeo)An estimated 80 percent of Android phones contain a recently discovered vulnerability that allows attackers to terminate connections and, if the connections aren't encrypted, inject...

View Article

SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Tuesday, August...

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article
Browsing all 12054 articles
Browse latest View live