ArsTechnica: Security Content: Breaking the iris scanner locking Samsung’s...
Enlarge (credit: Chaos Computer Club)Hackers have broken the iris-based authentication in Samsung's Galaxy S8 smartphone in an easy-to-execute attack that's at odds with the manufacturer's claim that...
View ArticleFortinet FortiGuard Blog: Automating Security Operations: What It Takes to...
A major challenge facing security vendors today is that most solutions and products are developed based on knowledge of previous threats that already exist. This makes many security solutions reactive...
View ArticleSANS Internet Storm Center, InfoCON: green: Jaff ransomware gets a makeover,...
IntroductionSince 2017-05-11, a new ransomware named Jaff has been distributed through malicious spam (malspam) from the Necurs botnet. This malspam uses PDF attachments with embedded Word documents...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Wednesday, May...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleUn informático en el lado del mal: Cómo ejecutar en red Telefónica WannaCry...
La semana pasada publicábamos Telefónica WannaCry File Restorer, un script escrito en Powershell con el que se podía recuperar archivos temporales afectados por el ransomware Wannacry. El script...
View ArticleDarknet - The Darkside: Massive Acunetix Online Update Brings New Features & UI
So there’s been a massive Acunetix Online update that has pushed out a brand new UI plus a whole bunch of new features and capabilities, including really powerful stuff for security professionals and...
View Articlehoneyblog: 2011 Honeynet Project Security Workshop Slides + Videos
The slides and videos from the 2011 Honeynet Project Security Workshop (Paris) are now available! You can get the material from http://www.honeynet.org/SecurityWorkshops/2011_Paris. About the...
View ArticleLost In Security: Españoles por la BlackHat
Siguiendo con la estela del artículo publicado 'Españoles por la Phrack', vuelvo a la carga con un artículo parecido, pero en este caso sobre una de las conferencias de seguridad que más conoce la...
View ArticleLost In Security: El último superviviente (II) - iOS
En el pasado artículo estuvimos revisando los puntos débiles que tiene un malware a la hora de sobrevivir un reinicio del sistema, y nos centramos en OSX. Ahora toca el turno a iOS, que al ser una...
View ArticlePandaLabs: PowerLocker
PowerLocker, also called PrisonLocker, is a new family of ransomware which in addition to encrypting files on the victim’s computer (as with other such malware) threatens to block users’ computers...
View ArticleArsTechnica: Security Content: A wormable code-execution bug has lurked in...
Enlarge (credit: Guido Sorarù)Maintainers of the Samba networking utility just patched a critical code-execution vulnerability that could pose a severe threat to users until the fix is widely...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Thursday, May...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleSANS Internet Storm Center, InfoCON: green: Critical Vulnerability in Samba...
Developers of Samba[1] disclosed a critical vulnerability that affects the file sharing component. Samba is a suite of tools that helps in the interoperability between UNIX with Microsoft Windows. The...
View ArticleUn informático en el lado del mal: Developer, protege tu cuenta de GitHub que...
A finales de Marzo, la Unit 42 de Palo Alto levantó la alerta de una campaña de ataques dirigidos a desarrolladores en GitHub. El malware utilizado para infectar a los desarrolladores y llevarse las...
View ArticleFortinet FortiGuard Blog: Trends Affecting Managed Security Service Providers
Given the very public explosion of ransomware, and an ever-growing list of other cyber threats, IT services providers are increasingly looking for ways to meet the insatiable demand for cybersecurity....
View ArticleArsTechnica: Security Content: Florida GOP consultant admits he worked with...
(credit: DonkeyHotey)A Florida GOP campaign consultant who runs a blog under a pseudonym directly contacted the hackers behind the breach of the Democratic National Committee and the Democratic...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Friday, May...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleArsTechnica: Security Content: E-mails phished from Russian critic were...
Enlarge/ This fraudulent e-mail was sent in a successful attempt to phish the Gmail password for reporter David Satter. (credit: Citizen Lab)E-mails stolen in a phishing attack on a prominent critic of...
View ArticleDarknet - The Darkside: sheep-wolf – Exploit MD5 Collisions For Malware...
sheep-wolf is a tool to help you Exploit MD5 Collisions in software, specially malware samples which are commonly detected using MD5 hash signatures. and then a malicious one (Wolf) that have the same...
View ArticleArsTechnica: Security Content: How to build your own VPN if you’re...
Enlarge (credit: Aurich / Thinkstock)In the wake of this spring's Senate ruling nixing FCC privacy regulations imposed on ISPs, you may be (even more) worried about how your data is used, misused, and...
View Article