Quantcast
Channel: eternal-todo.com aggregator
Browsing all 12054 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Breaking the iris scanner locking Samsung’s...

Enlarge (credit: Chaos Computer Club)Hackers have broken the iris-based authentication in Samsung's Galaxy S8 smartphone in an easy-to-execute attack that's at odds with the manufacturer's claim that...

View Article


Fortinet FortiGuard Blog: Automating Security Operations: What It Takes to...

A major challenge facing security vendors today is that most solutions and products are developed based on knowledge of previous threats that already exist. This makes many security solutions reactive...

View Article


SANS Internet Storm Center, InfoCON: green: Jaff ransomware gets a makeover,...

IntroductionSince 2017-05-11, a new ransomware named Jaff has been distributed through malicious spam (malspam) from the Necurs botnet. This malspam uses PDF attachments with embedded Word documents...

View Article

SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Wednesday, May...

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Cómo ejecutar en red Telefónica WannaCry...

La semana pasada publicábamos Telefónica WannaCry File Restorer, un script escrito en Powershell con el que se podía recuperar archivos temporales afectados por el ransomware Wannacry. El script...

View Article


Image may be NSFW.
Clik here to view.

Darknet - The Darkside: Massive Acunetix Online Update Brings New Features & UI

So there’s been a massive Acunetix Online update that has pushed out a brand new UI plus a whole bunch of new features and capabilities, including really powerful stuff for security professionals and...

View Article

honeyblog: 2011 Honeynet Project Security Workshop Slides + Videos

The slides and videos from the 2011 Honeynet Project Security Workshop (Paris) are now available! You can get the material from http://www.honeynet.org/SecurityWorkshops/2011_Paris. About the...

View Article

Lost In Security: Españoles por la BlackHat

Siguiendo con la estela del artículo publicado 'Españoles por la Phrack', vuelvo a la carga con un artículo parecido, pero en este caso sobre una de las conferencias de seguridad que más conoce la...

View Article


Lost In Security: El último superviviente (II) - iOS

En el pasado artículo estuvimos revisando los puntos débiles que tiene un malware a la hora de sobrevivir un reinicio del sistema, y nos centramos en OSX. Ahora toca el turno a iOS, que al ser una...

View Article


Image may be NSFW.
Clik here to view.

PandaLabs: PowerLocker

PowerLocker, also called PrisonLocker, is a new family of ransomware which in addition to encrypting files on the victim’s computer (as with other such malware) threatens to block users’ computers...

View Article

Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: A wormable code-execution bug has lurked in...

Enlarge (credit: Guido Sorarù)Maintainers of the Samba networking utility just patched a critical code-execution vulnerability that could pose a severe threat to users until the fix is widely...

View Article

SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Thursday, May...

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article

SANS Internet Storm Center, InfoCON: green: Critical Vulnerability in Samba...

Developers of Samba[1] disclosed a critical vulnerability that affects the file sharing component. Samba is a suite of tools that helps in the interoperability between UNIX with Microsoft Windows. The...

View Article


Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Developer, protege tu cuenta de GitHub que...

A finales de Marzo, la Unit 42 de Palo Alto levantó la alerta de una campaña de ataques dirigidos a desarrolladores en GitHub. El malware utilizado para infectar a los desarrolladores y llevarse las...

View Article

Fortinet FortiGuard Blog: Trends Affecting Managed Security Service Providers

Given the very public explosion of ransomware, and an ever-growing list of other cyber threats, IT services providers are increasingly looking for ways to meet the insatiable demand for cybersecurity....

View Article


Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Florida GOP consultant admits he worked with...

(credit: DonkeyHotey)A Florida GOP campaign consultant who runs a blog under a pseudonym directly contacted the hackers behind the breach of the Democratic National Committee and the Democratic...

View Article

SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Friday, May...

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article


Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: E-mails phished from Russian critic were...

Enlarge/ This fraudulent e-mail was sent in a successful attempt to phish the Gmail password for reporter David Satter. (credit: Citizen Lab)E-mails stolen in a phishing attack on a prominent critic of...

View Article

Image may be NSFW.
Clik here to view.

Darknet - The Darkside: sheep-wolf – Exploit MD5 Collisions For Malware...

sheep-wolf is a tool to help you Exploit MD5 Collisions in software, specially malware samples which are commonly detected using MD5 hash signatures. and then a malicious one (Wolf) that have the same...

View Article

Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: How to build your own VPN if you’re...

Enlarge (credit: Aurich / Thinkstock)In the wake of this spring's Senate ruling nixing FCC privacy regulations imposed on ISPs, you may be (even more) worried about how your data is used, misused, and...

View Article
Browsing all 12054 articles
Browse latest View live