Quantcast
Channel: eternal-todo.com aggregator
Browsing all 12054 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Google backtracks—a bit—on controversial...

Enlarge (credit: Google Chrome)Google will partially revert a controversial change made in Chrome 69 that unified signing in to Google's online properties and Chrome itself and which further preserved...

View Article


Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: El texto del pregón de las fiestas de...

Estoy a punto de cambiar otra vez de equipo y por ello tengo que dejar esta "funda" vacía de todo documento antes de proceder a destrozar el disco duro. Dentro de los documentos me he encontrado con el...

View Article


Image may be NSFW.
Clik here to view.

/dev/random: New PGP Key

I received my Yubikey 4C Nano for a while (“C” because it is compatible with USB-C connectors) but I did not have time yet to configure it to be used with my PGP key. It’s now done! As you can see, it...

View Article

Image may be NSFW.
Clik here to view.

/dev/random: [SANS ISC] More Excel DDE Code Injection

I published the following diary on isc.sans.edu: “More Excel DDE Code Injection“:The “DDE code injection” technique is not brand new. DDE stands for “Dynamic Data Exchange”. It has already been...

View Article

Image may be NSFW.
Clik here to view.

Cisco Talos: Threat Roundup Sept 21 - 28

Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we’ve observed this week — covering the dates between Sept. 21 and 28. As with previous roundups, this post...

View Article


Image may be NSFW.
Clik here to view.

Cisco Talos: Beers with Talos Ep. #38 — More fun with VPNFilter; Getting pwnd...

Beers with Talos (BWT) Podcast Ep. #38 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing, click here.Ep. #38 show notes: Recorded...

View Article

Image may be NSFW.
Clik here to view.

Zero in a bit: Insecure code cited in Facebook hack impacting nearly 50...

On Sept. 28, Facebook announced via its blog that it discovered attackers exploited a vulnerability in its code that impacted its "View As" feature. While Guy Rosen, VP of product management, notes...

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Charlas y conferencias en las que...

Se acabó el mes de septiembre, y comienza el que probablemente suele ser el más con más eventos y actividades del año. La oferta con citas, conferencias, y charlas suele ser grande, y por tanto...

View Article


Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: La AI que no quería morir, que quería...

Las pelis de superhéroes basadas en los "viejos" cómics nos han traído de actualidad muchos de los temores que la ciencia ficción fue capaz de meternos en la cabeza cuando éramos niños. Bueno, al menos...

View Article


Image may be NSFW.
Clik here to view.

Didier Stevens: Title: Overview of Content Published in September

Here is an overview of content I published in September:Blog posts:Firmware Upgrade: WiFi Pineapple NANOWiFi Pineapple NANO: Persistent Recon DBQuickpost: Compiling EXEs and Resources with MinGW on...

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Viernes, 1 de Octubre de 1999: Arranca...

El 24 de Septiembre de 1999 se constituyó Informática 64. Hace 19 años y una semana. Sin embargo, no fue hasta el viernes 1 de Octubre de 1999 que tuvimos nuestro primera oficina en la Calle Burgos de...

View Article

Image may be NSFW.
Clik here to view.

Cisco Talos: Vulnerability Spotlight: Multiple vulnerabilities in Atlantis...

Vulnerabilities discovered by Cory Duplantis and Ali Rizvi-Santiago of Cisco Talos.OverviewCisco Talos is disclosing several vulnerabilities discovered in Atlantis Word Processor. Atlantis Word...

View Article

Image may be NSFW.
Clik here to view.

AlienVault Blogs: Observability and Visibility in DevSecOps

To celebrate AllDayDevOps coming up October 17 - here's an on-topic blog.Automation is Your Friend DevSecOpsCompanies often turn to software as a solution when they need to solve a problem.  Whether...

View Article


Image may be NSFW.
Clik here to view.

Cisco Talos: Vulnerability Spotlight: Multiple Issues in Foxit PDF Reader

Vulnerabilities discovered by Aleksandar Nikolic of Cisco TalosOverviewCisco Talos is disclosing eightteen vulnerabilities in Foxit PDF Reader, a popular free program for viewing, creating and editing...

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Cómo usar Dropbox como canal de hacking...

Pasó la Ekoparty. Un evento especial que se celebra desde hace 14 años en la ciudad de Buenos Aires, Argentina. Por primera vez estuve allí, en el espacio Konex, un ambiente distinto, especial, un...

View Article


Image may be NSFW.
Clik here to view.

AlienVault Blogs: 3 Big Changes in Cybercrime Putting Small Businesses at Risk

Cybercrime business models are evolving. Small businesses are paying the price.Last year, 54% of companies experienced a successful attack that compromised their data or IT infrastructure. With malware...

View Article

Image may be NSFW.
Clik here to view.

Cisco Talos: Vulnerability Spotlight: Adobe Acrobat Reader DC Collab...

Discovered by Aleksandar Nikolic of Cisco TalosOverviewToday, Talos is releasing details of a new vulnerability within Adobe Acrobat Reader DC. Adobe Acrobat Reader is the most popular and most...

View Article


Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Google taking new steps to prevent malicious...

Google has announced plans to further restrict Chrome extensions in a bid to crack down on the number of malicious extensions found in the Chrome Web Store.We've seen a spate of malicious extensions...

View Article

Image may be NSFW.
Clik here to view.

Cisco Talos: BruCON Primer: 10 Years and Cisco Talos Talks

Cisco Talos will have a significant presence at the 10th edition of BruCON, which kicks off this week. Below, you will find the presentations that Talos researchers will give, along with a brief...

View Article

ADD / XOR / ROL: Turing completeness, weird machines, Twitter, and muddled...

First off, an apology to the reader: I normally spend a bit of effort to make my blog posts readable / polished, but I am under quite a few time constraints at the moment, so the following will be held...

View Article
Browsing all 12054 articles
Browse latest View live