Quantcast
Channel: eternal-todo.com aggregator
Browsing all 12054 articles
Browse latest View live

Lost In Security: Españoles por la BlackHat

Siguiendo con la estela del artículo publicado 'Españoles por la Phrack', vuelvo a la carga con un artículo parecido, pero en este caso sobre una de las conferencias de seguridad que más conoce la...

View Article


Lost In Security: El último superviviente (II) - iOS

En el pasado artículo estuvimos revisando los puntos débiles que tiene un malware a la hora de sobrevivir un reinicio del sistema, y nos centramos en OSX. Ahora toca el turno a iOS, que al ser una...

View Article


Image may be NSFW.
Clik here to view.

PandaLabs: PowerLocker

PowerLocker, also called PrisonLocker, is a new family of ransomware which in addition to encrypting files on the victim’s computer (as with other such malware) threatens to block users’ computers...

View Article

Image may be NSFW.
Clik here to view.

Wired: Threat Level: Hacker Lexicon: What Are White Hat, Gray Hat, and Black...

Here's how to distinguish the colors of the hacker rainbow. The post Hacker Lexicon: What Are White Hat, Gray Hat, and Black Hat Hackers? appeared first on WIRED.

View Article

Image may be NSFW.
Clik here to view.

Wired: Threat Level: Matthew Keys Sentenced to Two Years for Aiding Anonymous

The former Tribune Company employee was convicted of giving Anonymous information that helped hackers access an LA Times server and alter a headline. The post Matthew Keys Sentenced to Two Years for...

View Article


Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Next Week: Sin Límites, Hacking con Python...

Un domingo más, aprovecho el momento de publicar el artículo para detenerme en las citas que tenemos para la semana que entra. En esta ocasión con dos citas especiales en las que voy a participar yo,...

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Mitigación de la suplantación de identidad...

OAuth2 es uno de los protocolos de autorización/single sign-on (SSO) más extendidos en Internet sobre el que además se basa el estándar de autenticación OpenID Connect. Es su gran difusión y aceptación...

View Article

SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Monday, June...

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article


Image may be NSFW.
Clik here to view.

Darknet - The Darkside: credmap – The Credential Mapper

Credmap is an open source credential mapper tool that was created to bring awareness to the dangers of credential reuse. It is capable of testing supplied user credentials on several known websites to...

View Article


Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Found: “Crash Override” malware that triggered...

Enlarge/ An overview of Crash Override/Industroyer, including the four international specifications it uses to communicate with electric grid devices all over the world. (credit: Eset)Last December,...

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Libro de @0xWord "Hacking con DRONES: Love...

Ayer mismo se publicaba el título número 48 de la editorial 0xWord, en este caso dedicado a los amantes del mundo de los DRONES. Con el nombre de "Hacking con Drones: Love is in the air", se ha...

View Article

SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Tuesday, June...

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article

Image may be NSFW.
Clik here to view.

Infosec Events: Week 24 In Review – 2017

Events RelatedSecurity Fest– www.youtube.com This summer, Göteborg became the most secure city in Sweden! We had a day filled with great talks by internationally renowned speakers on some of the most...

View Article


SANS Internet Storm Center, InfoCON: green: An Introduction to VolUtility,...

If you would like to practicememory forensics using Volatility but you dont like command line tools and you hate to remmber plugins then VolUtility is your friend.Volutility1 2 is a web frontend for...

View Article

Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Facing limits of remote hacking, Army cybers...

Enlarge/ FORT IRWIN, California – Spc. Nathaniel Ortiz, Expeditionary CEMA (Cyber Electromagnetic Activities) Team (ECT), 781st Military Intelligence Battalion, "conducts cyberspace operations" at the...

View Article


Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Russia struck at election systems and data of...

Enlarge/ President Barack Obama reportedly called Russian President Vladimir Putin in October 2016 on the "cyber hotline" to warn about the ongoing hacking of US election officials' systems. (credit:...

View Article

SANS Internet Storm Center, InfoCON: green: Microsoft and Adobe June 2017...

Today, Microsoft and Adobe released their usual monthly security updates. Microsoft patched a total of 96 different vulnerabilities. Three vulnerabilities have already been disclosed publicly, and two...

View Article


SANS Internet Storm Center, InfoCON: green: Microsoft and Adobe June 2017...

Today, Microsoft and Adobe released their usual monthly security updates. Microsoft patched a total of 96 different vulnerabilities. Three vulnerabilities have already been disclosed publicly, and two...

View Article

SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Wednesday, June...

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article

SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Wednesday, June...

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article
Browsing all 12054 articles
Browse latest View live