ArsTechnica: Security Content: Stealing login credentials from a locked PC or...
EnlargeSnatching the login credentials of a locked computer just got easier and faster, thanks to a technique that requires only $50 worth of hardware and takes less than 30 seconds to carry out.Rob...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Thursday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleLost In Security: El último superviviente (II) - iOS
En el pasado artículo estuvimos revisando los puntos débiles que tiene un malware a la hora de sobrevivir un reinicio del sistema, y nos centramos en OSX. Ahora toca el turno a iOS, que al ser una...
View ArticleKPNC: vulnerability in… WinCalc (Win7, x64)
I will never go out of business in this country. thanks to Microsoft. who would have thought that wincalcis vulnerable? I have not checked all systems yet, so this is my configuration: Windows 7...
View ArticlePandaLabs: PowerLocker
PowerLocker, also called PrisonLocker, is a new family of ransomware which in addition to encrypting files on the victim’s computer (as with other such malware) threatens to block users’ computers...
View ArticleWired: Threat Level: Hacker Lexicon: What Are White Hat, Gray Hat, and Black...
Here's how to distinguish the colors of the hacker rainbow. The post Hacker Lexicon: What Are White Hat, Gray Hat, and Black Hat Hackers? appeared first on WIRED.
View ArticleDarknet - The Darkside: Linux kernel.org Hacker Arrested After Traffic Stop
So it seems the alleged kernel.org hacker has finally been caught, kinda by accident after being stopped for a traffic violation. It was quite a high profile hack, especially in the open source...
View ArticleUn informático en el lado del mal: SWEET32: Nuevos ataques a Blowfish y 3DES...
Los ataques a los algoritmos criptográficos son siempre una de las disciplinas más importantes en el mundo de la seguridad de la información. El cifrado permite dotar de una estructura sólida a la...
View ArticleSANS Internet Storm Center, InfoCON: green: Curious SNMP Traffic Spike, (Thu,...
It could be nothing. It could be something.The ISC HoneyPot">12:08:27.874575 IP x.x.x.x.12458 y.y.y.y.161:GetRequest(28).1.3.6.1.2.1.1.1.0 12:09:10.952260 IP z.z.z.z.12458...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Friday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleArsTechnica: Security Content: Two men charged with hacking CIA director and...
(credit: cia.gov)Federal authorities have arrested two men on charges they were part of a group that broke into the private e-mail accounts of high-ranking US government officials and a Justice...
View ArticleSANS Internet Storm Center, InfoCON: green: Collecting Users Credentials from...
Its a fact: When a device can be physically accessed, you may consider it as compromised. And if the device is properly hardened, its just a matter of time. The best hacks are the ones which use a...
View Article/dev/random: [SANS ISC Diary] Collecting Users Credentials from Locked Devices
I published the following diary on isc.sans.org: “Collecting Users Credentials from Locked Devices“.It’s a fact: When a device can be physically accessed, you may consider it as compromised. And if the...
View ArticleUn informático en el lado del mal: Facebook investigado por chupar lo datos...
Tras el anuncio de Facebook de que iba a importar los datos de WhatsApp para generar un mejor servicio en Facebook y así mejorar - valga la redundancia - las ofertas que se hacen tanto de anuncios como...
View ArticleDarknet - The Darkside: DET – Data Exfiltration Toolkit
DET is a proof of concept Data Exfiltration Toolkit using either single or multiple channel(s) at the same time. The idea behind DET was to create a generic tool-kit to plug any kind of...
View ArticleArsTechnica: Security Content: Two critical bugs and more malicious apps make...
(credit: Ron Amadeo)It was a bad week for millions of Android phone users. Two critical vulnerabilities were disclosed but remain unpatched in a large percentage of devices, while, separately,...
View ArticleMcAfee Avert Labs: Taking a Look at W32/Ramnit
Today we’re going to take a look at an interesting file-infector virus. W32/Ramnit infects EXE, DLL and HTML files. That last one is right; W32/Ramnit also infects HTML files to replicate itself.Let’s...
View Articlehoneyblog: 2011 Honeynet Project Security Workshop Slides + Videos
The slides and videos from the 2011 Honeynet Project Security Workshop (Paris) are now available! You can get the material from http://www.honeynet.org/SecurityWorkshops/2011_Paris. About the...
View ArticleLost In Security: Españoles por la BlackHat
Siguiendo con la estela del artículo publicado 'Españoles por la Phrack', vuelvo a la carga con un artículo parecido, pero en este caso sobre una de las conferencias de seguridad que más conoce la...
View ArticleSANS Internet Storm Center, InfoCON: green: Ongoing IMAP Scan, Anyone Else?,...
Im operating a mail server which handles email flows from multiple domains (20 domains). The server is under a massive IMAPS (%%port:993%%) scan for a few days. More details about the ongoing...
View Article