Lost In Security: Españoles por la BlackHat
Siguiendo con la estela del artículo publicado 'Españoles por la Phrack', vuelvo a la carga con un artículo parecido, pero en este caso sobre una de las conferencias de seguridad que más conoce la...
View ArticleLost In Security: El último superviviente (II) - iOS
En el pasado artículo estuvimos revisando los puntos débiles que tiene un malware a la hora de sobrevivir un reinicio del sistema, y nos centramos en OSX. Ahora toca el turno a iOS, que al ser una...
View ArticlePandaLabs: PowerLocker
PowerLocker, also called PrisonLocker, is a new family of ransomware which in addition to encrypting files on the victim’s computer (as with other such malware) threatens to block users’ computers...
View ArticleWired: Threat Level: Hacker Lexicon: What Are White Hat, Gray Hat, and Black...
Here's how to distinguish the colors of the hacker rainbow. The post Hacker Lexicon: What Are White Hat, Gray Hat, and Black Hat Hackers? appeared first on WIRED.
View ArticleWired: Threat Level: Matthew Keys Sentenced to Two Years for Aiding Anonymous
The former Tribune Company employee was convicted of giving Anonymous information that helped hackers access an LA Times server and alter a headline. The post Matthew Keys Sentenced to Two Years for...
View ArticleUn informático en el lado del mal: Next Week: Sin Límites, Hacking con Python...
Un domingo más, aprovecho el momento de publicar el artículo para detenerme en las citas que tenemos para la semana que entra. En esta ocasión con dos citas especiales en las que voy a participar yo,...
View ArticleUn informático en el lado del mal: Mitigación de la suplantación de identidad...
OAuth2 es uno de los protocolos de autorización/single sign-on (SSO) más extendidos en Internet sobre el que además se basa el estándar de autenticación OpenID Connect. Es su gran difusión y aceptación...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Monday, June...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleDarknet - The Darkside: credmap – The Credential Mapper
Credmap is an open source credential mapper tool that was created to bring awareness to the dangers of credential reuse. It is capable of testing supplied user credentials on several known websites to...
View ArticleArsTechnica: Security Content: Found: “Crash Override” malware that triggered...
Enlarge/ An overview of Crash Override/Industroyer, including the four international specifications it uses to communicate with electric grid devices all over the world. (credit: Eset)Last December,...
View ArticleUn informático en el lado del mal: Libro de @0xWord "Hacking con DRONES: Love...
Ayer mismo se publicaba el título número 48 de la editorial 0xWord, en este caso dedicado a los amantes del mundo de los DRONES. Con el nombre de "Hacking con Drones: Love is in the air", se ha...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Tuesday, June...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleInfosec Events: Week 24 In Review – 2017
Events RelatedSecurity Fest– www.youtube.com This summer, Göteborg became the most secure city in Sweden! We had a day filled with great talks by internationally renowned speakers on some of the most...
View ArticleSANS Internet Storm Center, InfoCON: green: An Introduction to VolUtility,...
If you would like to practicememory forensics using Volatility but you dont like command line tools and you hate to remmber plugins then VolUtility is your friend.Volutility1 2 is a web frontend for...
View ArticleArsTechnica: Security Content: Facing limits of remote hacking, Army cybers...
Enlarge/ FORT IRWIN, California – Spc. Nathaniel Ortiz, Expeditionary CEMA (Cyber Electromagnetic Activities) Team (ECT), 781st Military Intelligence Battalion, "conducts cyberspace operations" at the...
View ArticleArsTechnica: Security Content: Russia struck at election systems and data of...
Enlarge/ President Barack Obama reportedly called Russian President Vladimir Putin in October 2016 on the "cyber hotline" to warn about the ongoing hacking of US election officials' systems. (credit:...
View ArticleSANS Internet Storm Center, InfoCON: green: Microsoft and Adobe June 2017...
Today, Microsoft and Adobe released their usual monthly security updates. Microsoft patched a total of 96 different vulnerabilities. Three vulnerabilities have already been disclosed publicly, and two...
View ArticleSANS Internet Storm Center, InfoCON: green: Microsoft and Adobe June 2017...
Today, Microsoft and Adobe released their usual monthly security updates. Microsoft patched a total of 96 different vulnerabilities. Three vulnerabilities have already been disclosed publicly, and two...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Wednesday, June...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Wednesday, June...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View Article