Wired: Threat Level: A Scheme to Encrypt the Entire Web Is Actually Working
The non-profit certificate authority Let's Encrypt is enabling a sea change toward HTTPS encryption online. The post A Scheme to Encrypt the Entire Web Is Actually Working appeared first on WIRED.
View Article48Bits Blog: LaCon2k16 Call For Pulpos
We are proud to present the call for papers for Lacon 2016!, get your papers in now. We are accepting short talks of 30min and long talks of ~1h.[when]conf will be held from the 23rd to the 25th of...
View ArticleNiels Provos: Support my videos on Patreon!
Add your support on Patreon to help me create more videos. Your support will help with materials, rent as well as other equipment, e.g. cameras, lights, software, etc. It is not required but...
View ArticleArsTechnica: Security Content: WikiLeaks says CIA’s “Pandemic” turns servers...
Enlarge/ One of the pages published Thursday in WikiLeaks' latest Vault 7 release. (credit: WikiLeaks)WikiLeaks just published details of a purported CIA operation that turns Windows file servers into...
View ArticleArsTechnica: Security Content: Putin: “Patriotic” Russian hackers may have...
Enlarge/ Russian President Vladmir Putin in Saint Petersburg today for the St. Petersburg International Economic Forum, acknowledged today that Russian hackers may have interfered in the US election....
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Friday, June...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleUn informático en el lado del mal: Viernes con "V" de Vídeos: Trucos para...
Después de una semana intensa de trabajo, para hoy viernes he decidido dejaros en le blog algunos vídeos que tenía pendientes. No son nuevos, pero no os había avisado de ellos por el blog, así que os...
View ArticleSANS Internet Storm Center, InfoCON: green: Phishing Campaigns Follow Trends,...
Those phishing emails that we receive every day in our mailboxes are often related to key players in different fields:Internet actorsGoogle, Yahoo!, Facebook, ...Software or manufacturersApple,...
View Article/dev/random: [SANS ISC] Phishing Campaigns Follow Trends
I published the following diary on isc.sans.org: “Phishing Campaigns Follow Trends“.Those phishing emails that we receive every day in our mailboxes are often related to key players in different fields...
View ArticleDarknet - The Darkside: maltrail – Malicious Traffic Detection System
Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV...
View ArticleMcAfee Avert Labs: Taking a Look at W32/Ramnit
Today we’re going to take a look at an interesting file-infector virus. W32/Ramnit infects EXE, DLL and HTML files. That last one is right; W32/Ramnit also infects HTML files to replicate itself.Let’s...
View Articlehoneyblog: 2011 Honeynet Project Security Workshop Slides + Videos
The slides and videos from the 2011 Honeynet Project Security Workshop (Paris) are now available! You can get the material from http://www.honeynet.org/SecurityWorkshops/2011_Paris. About the...
View ArticleLost In Security: Españoles por la BlackHat
Siguiendo con la estela del artículo publicado 'Españoles por la Phrack', vuelvo a la carga con un artículo parecido, pero en este caso sobre una de las conferencias de seguridad que más conoce la...
View ArticleLost In Security: El último superviviente (II) - iOS
En el pasado artículo estuvimos revisando los puntos débiles que tiene un malware a la hora de sobrevivir un reinicio del sistema, y nos centramos en OSX. Ahora toca el turno a iOS, que al ser una...
View ArticlePandaLabs: PowerLocker
PowerLocker, also called PrisonLocker, is a new family of ransomware which in addition to encrypting files on the victim’s computer (as with other such malware) threatens to block users’ computers...
View ArticleFortinet FortiGuard Blog: Infographic: Protecting Today’s Financial Services...
Read this post and view the embedded infographic to learn how financial services organizations can protect their data in the digital age.
View ArticleUn informático en el lado del mal: Eventos, cursos y charlas para la semana...
Tras la semana pasada donde yo participé en seis conferencias, los siete días que se avecinan por delante vienen más relajados, pero aún con algunos eventos, cursos y charlas que merece la pena que...
View ArticleUn informático en el lado del mal: DirtyTooth: Vídeo de la conferencia en...
No es la grabación oficial, pero la gente de MarketingDirecto hizo una grabación de la charla de OpenExpo 2017 que impartí sobre DirtyTooth: It´s only Rock'n Roll but I like it con uno de nuestros...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Monday, June...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View Article