Quantcast
Channel: eternal-todo.com aggregator
Browsing all 12054 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Stealing login credentials from a locked PC or...

EnlargeSnatching the login credentials of a locked computer just got easier and faster, thanks to a technique that requires only $50 worth of hardware and takes less than 30 seconds to carry out.Rob...

View Article


SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Thursday,...

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article


Lost In Security: El último superviviente (II) - iOS

En el pasado artículo estuvimos revisando los puntos débiles que tiene un malware a la hora de sobrevivir un reinicio del sistema, y nos centramos en OSX. Ahora toca el turno a iOS, que al ser una...

View Article

Image may be NSFW.
Clik here to view.

KPNC: vulnerability in… WinCalc (Win7, x64)

I will never go out of business in this country. thanks to Microsoft. who would have thought that wincalcis vulnerable? I have not checked all systems yet, so this is my configuration: Windows 7...

View Article

Image may be NSFW.
Clik here to view.

PandaLabs: PowerLocker

PowerLocker, also called PrisonLocker, is a new family of ransomware which in addition to encrypting files on the victim’s computer (as with other such malware) threatens to block users’ computers...

View Article


Image may be NSFW.
Clik here to view.

Wired: Threat Level: Hacker Lexicon: What Are White Hat, Gray Hat, and Black...

Here's how to distinguish the colors of the hacker rainbow. The post Hacker Lexicon: What Are White Hat, Gray Hat, and Black Hat Hackers? appeared first on WIRED.

View Article

Image may be NSFW.
Clik here to view.

Darknet - The Darkside: Linux kernel.org Hacker Arrested After Traffic Stop

So it seems the alleged kernel.org hacker has finally been caught, kinda by accident after being stopped for a traffic violation. It was quite a high profile hack, especially in the open source...

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: SWEET32: Nuevos ataques a Blowfish y 3DES...

Los ataques a los algoritmos criptográficos son siempre una de las disciplinas más importantes en el mundo de la seguridad de la información. El cifrado permite dotar de una estructura sólida a la...

View Article


SANS Internet Storm Center, InfoCON: green: Curious SNMP Traffic Spike, (Thu,...

It could be nothing. It could be something.The ISC HoneyPot">12:08:27.874575 IP x.x.x.x.12458 y.y.y.y.161:GetRequest(28).1.3.6.1.2.1.1.1.0 12:09:10.952260 IP z.z.z.z.12458...

View Article


SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Friday,...

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article

Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Two men charged with hacking CIA director and...

(credit: cia.gov)Federal authorities have arrested two men on charges they were part of a group that broke into the private e-mail accounts of high-ranking US government officials and a Justice...

View Article

SANS Internet Storm Center, InfoCON: green: Collecting Users Credentials from...

Its a fact: When a device can be physically accessed, you may consider it as compromised. And if the device is properly hardened, its just a matter of time. The best hacks are the ones which use a...

View Article

Image may be NSFW.
Clik here to view.

/dev/random: [SANS ISC Diary] Collecting Users Credentials from Locked Devices

I published the following diary on isc.sans.org: “Collecting Users Credentials from Locked Devices“.It’s a fact: When a device can be physically accessed, you may consider it as compromised. And if the...

View Article


Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Facebook investigado por chupar lo datos...

Tras el anuncio de Facebook de que iba a importar los datos de WhatsApp para generar un mejor servicio en Facebook y así mejorar - valga la redundancia - las ofertas que se hacen tanto de anuncios como...

View Article

Image may be NSFW.
Clik here to view.

Darknet - The Darkside: DET – Data Exfiltration Toolkit

DET is a proof of concept Data Exfiltration Toolkit using either single or multiple channel(s) at the same time. The idea behind DET was to create a generic tool-kit to plug any kind of...

View Article


Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Two critical bugs and more malicious apps make...

(credit: Ron Amadeo)It was a bad week for millions of Android phone users. Two critical vulnerabilities were disclosed but remain unpatched in a large percentage of devices, while, separately,...

View Article

Image may be NSFW.
Clik here to view.

McAfee Avert Labs: Taking a Look at W32/Ramnit

Today we’re going to take a look at an interesting file-infector virus. W32/Ramnit infects EXE, DLL and HTML files. That last one is right; W32/Ramnit also infects HTML files to replicate itself.Let’s...

View Article


honeyblog: 2011 Honeynet Project Security Workshop Slides + Videos

The slides and videos from the 2011 Honeynet Project Security Workshop (Paris) are now available! You can get the material from http://www.honeynet.org/SecurityWorkshops/2011_Paris. About the...

View Article

Lost In Security: Españoles por la BlackHat

Siguiendo con la estela del artículo publicado 'Españoles por la Phrack', vuelvo a la carga con un artículo parecido, pero en este caso sobre una de las conferencias de seguridad que más conoce la...

View Article

SANS Internet Storm Center, InfoCON: green: Ongoing IMAP Scan, Anyone Else?,...

Im operating a mail server which handles email flows from multiple domains (20 domains). The server is under a massive IMAPS (%%port:993%%) scan for a few days. More details about the ongoing...

View Article
Browsing all 12054 articles
Browse latest View live