Un informático en el lado del mal: Aprende cómo descifrar los mensajes de...
Desde el principio, al menos en los sistemas operativos Android, la base de datos de WhatsApp que se almacena en el dispositivo se ha mantenido cifrada, para evitar que alguien fácilmente pudiera...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Monday, August...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleUn informático en el lado del mal: Reflexiones sobre los límites de...
Durante el trabajo de creación del libro "Hacking Web Applications: Client-Side Attacks", Enrique Rando estuvo realizando muchas pruebas sobre los principales navegadores de Internet. Como os podéis...
View ArticleSANS Internet Storm Center, InfoCON: green: An Update On DVR Malware: A DVR...
Last week, the fact that someone leaked 1700 or so IP addresses with default username/password caused some people to get excited about the issue of default telnet credentials again. Ever since the...
View ArticleDidier Stevens: Quickpost: PowerShell Options Order
This is a reminder for myself: “powershell.exe -File test.ps1 -ExecutionPolicy Bypass” doesn’t work.“File C:\Demo\hello.ps1 cannot be loaded because running scripts is disabled on this system.”It’s...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Tuesday, August...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleUn informático en el lado del mal: Chile & Chema: Tres eventos después de...
Ya se acaba el mes de Agosto, y con la llegada de la cuesta de Septiembre se avecinan actividades, así que aprovecho el último post de este mes - me voy a saltar el de artículo de mañana por problemas...
View ArticleSANS Internet Storm Center, InfoCON: green: Second Google Chrome Extension...
IntroductionIt seems that Google Chrome extensions have become quite the tool for banking malware fraudsters. Two weeks ago, an offender phoned a victim and asked him to install a supposedly new bank...
View ArticlePandaLabs: PowerLocker
PowerLocker, also called PrisonLocker, is a new family of ransomware which in addition to encrypting files on the victim’s computer (as with other such malware) threatens to block users’ computers...
View ArticleWired: Threat Level: Hacker Lexicon: What Are White Hat, Gray Hat, and Black...
Here's how to distinguish the colors of the hacker rainbow. The post Hacker Lexicon: What Are White Hat, Gray Hat, and Black Hat Hackers? appeared first on WIRED.
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Wednesday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleDarknet - The Darkside: GitMiner – Advanced Tool For Mining Github
GitMiner is an Advanced search tool for automation in Github, it enables mining Github for useful or potentially dangerous information or for example specific vulnerable or useful WordPress files.This...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Thursday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleSANS Internet Storm Center, InfoCON: green: Remote SOC Workers Concerns,...
As a SOC manager, you may need to start thinking about remote works for several reasons: Office move, larger talent pool, disaster recovery plan. Some scenarios may be short term to midterm solutions,...
View ArticleUn informático en el lado del mal: Steve Wozniak, Kevin Mitnick & Chema...
Sé que el título puede parecer un chiste, pero la verdad es que ayer fue un día muy divertido donde además se cumplió uno de mis sueños como ingeniero: conocer a Steve Wozniak. Si a eso le sumas una...
View ArticleDarknet - The Darkside: Instagram Leak From API Spills High Profile User Info
Another high profile Instagram leak, this time no there’s actual tangible repercussions other than it could possibly link to the recent Justin Bieber nudes leaked via a compromise of Selena Gomez’s...
View ArticleUn informático en el lado del mal: Go! Go online in flight! (Con tu VPN...
¿A quién no le gusta viajar? En mi caso, disfruto tres veces de los viajes: al planificarlos, durante el viaje y finalmente, clasificando las fotos y los recuerdos que me he traído. Pero hay una cosa...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Friday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleInfosec Events: Information Security Events For September
Here are information security events in North America this month: SecureWorld Twin Cities : September 6 in Twin Cities, MN, USA Protect 2017 : September 11 to 13 in Washington, DC, USA UNITED Security...
View ArticleDarknet - The Darkside: Reaver Download – Hack WPS Pin WiFi Networks
Reaver download below, this tool has been designed to be a robust and practical tool to hack WPS Pin WiFi Networks using WiFi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2...
View Article