Quantcast
Channel: eternal-todo.com aggregator
Browsing all 12054 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Darknet - The Darkside: HTTrack – Website Downloader Copier & Site Ripper...

HTTrack is a free and easy-to-use offline browser utility which acts as a website downloader and a site ripper for copying websites and downloading them for offline viewing.HTTrack Website Downloader...

View Article


Image may be NSFW.
Clik here to view.

AlienVault Blogs: Delivery (Key)Boy

IntroductionBelow we’ve outlined the delivery phase of some recent attacks by KeyBoy, a group of attackers believed to operate out of China. They were first identified in 2013 targeting governments and...

View Article


Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Apple to Congress: Chinese spy-chip story is...

Enlarge/ Apple CEO Tim Cook. (credit: Drew Angerer/Getty Images)Apple isn't relenting in its attacks on last week's Bloomberg story claiming that tiny Chinese chips had compromised the security of...

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Bettercap 2: La evolución de la navaja...

Hace un par de años hablé sobre Bettercap y MITMf dos herramientas que permiten llevar a cabo pruebas de ataques en redes IPv4 & IPv6 modernos. Con Bettercap hablamos de la facilidad de uso y de la...

View Article

Image may be NSFW.
Clik here to view.

AlienVault Blogs: 5 Steps to Maximize Your Financial Data Protection

A series of high-profile data breaches in 2017 made it clear that it's becoming more difficult to protect your and your customer's sensitive information from nefarious agents. As businesses expand,...

View Article


Image may be NSFW.
Clik here to view.

Zero in a bit: Application Security Mistake No. 6: Going It Alone

We’ve been in the application security business for more than 10 years, and we’ve learned a lot in that time about what works, and what doesn’t. This is the sixth and final post in a blog series that...

View Article

Image may be NSFW.
Clik here to view.

Cisco Talos: Vulnerability in the Intel Unified Shader compiler for the Intel...

Vulnerabilities discovered by Piotr Bania of Cisco TalosTalos is disclosing a pointer corruption vulnerability in the Intel Unified Shader compiler for the Intel Graphics Accelerator.OverviewIn order...

View Article

Image may be NSFW.
Clik here to view.

Cisco Talos: Microsoft Patch Tuesday — October 18: Vulnerability disclosures...

Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday covers 49 vulnerabilities, 12 of which are rated...

View Article


Image may be NSFW.
Clik here to view.

Cisco Talos: Vulnerability Spotlight: VMWare Workstation DoS Vulnerability

Today, Cisco Talos is disclosing a vulnerability in VMware Workstation that could result in denial of service. VMware Workstation is a widely used virtualization platform designed to run alongside a...

View Article


Image may be NSFW.
Clik here to view.

Didier Stevens: KEIHash: Fingerprinting SSH

keihash.py is a program to parse pcap files and calculate the KEIHash of SSH connections.The KEIHash is the MD5 hash of the Key Exchange Init (KEI) data (strings). For obvious reasons, I could not call...

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: 18 de Octubre: Movistar Home en Late Motiv

El próximo 18 de Octubre es el día que teníamos marcado en el calendario para presentar la versión final de Movistar Home que vamos a entregar a todos los clientes "early adopters" que han hecho la...

View Article

Image may be NSFW.
Clik here to view.

/dev/random: [SANS ISC] “OG” Tools Remain Valuable

I published the following diary on isc.sans.edu: “‘OG’ Tools Remain Valuable“:For vendors, the cybersecurity landscape is a nice place to make a very lucrative business. New solutions and tools are...

View Article

Image may be NSFW.
Clik here to view.

AlienVault Blogs: Time to Cover your Selfie Camera

I am reading an excellent book named “Cringeworthy:  A Theory of Awkardness”, which examines exactly as the title describes, awkward situations and how to deal with them.  I love reading non-fiction...

View Article


Image may be NSFW.
Clik here to view.

Cisco Talos: Microsoft WindowsCodecs.dll SniffAndConvertToWideString...

These vulnerabilities were discovered by Marcin Noga of Cisco Talos.Today, Cisco Talos is disclosing a vulnerability in the WindowsCodecs.dll component of the Windows operating system.WindowsCodecs.dll...

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Chromecast Hacking con Metasploit y Kali...

Una ventaja que presenta Chromecast es que es un dispositivo realmente pequeño, y por tanto resulta muy práctico llevarlo de viaje, ya que no todos los hoteles cuentan con todos los canales en sus...

View Article


Image may be NSFW.
Clik here to view.

/dev/random: [SANS ISC] New Campaign Using Old Equation Editor Vulnerability

I published the following diary on isc.sans.edu: “New Campaign Using Old Equation Editor Vulnerability“:Yesterday, I found a phishing sample that looked interesting:From: sales@tjzxchem[.]com To: me...

View Article

Image may be NSFW.
Clik here to view.

AlienVault Blogs: AlienVault Product Roundup – the Latest Updates!

September was another busy month for product development at AlienVault, an AT&T Company.  We are excited that the AlienVault Agent is getting great traction with our USM Anywhere user base, and we...

View Article


Image may be NSFW.
Clik here to view.

Cisco Talos: GPlayed Trojan - .Net playing with Google Market

This blog post is authored byVitor Ventura.IntroductionIn a world where everything is always connected, and mobile devices are involved in individuals' day-to-day lives more and more often, malicious...

View Article

Image may be NSFW.
Clik here to view.

Darknet - The Darkside: How To Recover When Your Website Got Hacked

The array of easily available Hacking Tools out there now is astounding, combined with self-propagating malware, people often come to me when their website got hacked and they don’t know what to do, or...

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Conferencias, charlas y eventos del 14 al...

Si esta semana que hoy termina con día festivo en España tenía pocas citas, la que viene está cargada de ellas y yo tengo varios compromisos en los que participaré, pero además mis compañeros también...

View Article
Browsing all 12054 articles
Browse latest View live