Quantcast
Channel: eternal-todo.com aggregator
Browsing all 12054 articles
Browse latest View live

...And you will know me by the trail of bits: $10,000 research fellowships...

The Trail of Bits SummerCon Fellowship program is now accepting applications from emerging security researchers with excellent project ideas. Fellows will explore their research topics with our...

View Article


Image may be NSFW.
Clik here to view.

Dancho Danchev's Blog - Mind Streams of Information Security Knowledge:...

Dear blog readers, I wanted to let everyone know that I'm currently offering unlimited and exclusive access to Threat Data - The World's Most Comprehensive Threats Database in the true spirit of the...

View Article


Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: El cuento de Papá Noel y el niño de la...

Mañana es Nochebuena, y hoy os quiero traer un cuento que les narro a los niños sobre la Torre del Reloj del edificio de Telefónica en Gran Vía 28. Si subes allí, podrás ver que hay una sala con una...

View Article

Image may be NSFW.
Clik here to view.

SANS Internet Storm Center, InfoCON: green: Scanning Activity, end Goal is to...

While reviewing my honeypot logs, I found some interesting entries associated with the Mirai botnet starting the 30 November 2018. This is the last log sample that was captured 2 days...

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Despedida y cierre de 2018

Como no pude hacer un resumen de todo el año 2018 desde un punto de vista profesional - solo os hice una breve repaso de lo personal - hoy que estoy en Telefónica he decidido grabar un pequeño vídeo de...

View Article


Wired: Security: Cryptojacking Took Over the Internet in 2018

Move over, ransomware. Cryptojacking is officially the scourge of the internet.

View Article

Image may be NSFW.
Clik here to view.

AlienVault Blogs: The Dangers of Free VPNs

If you use a free VPN, then you have to wonder how your provider earns money to cover their own costs. The answer often involves advertising, but it can also be through far more sinister means.Running...

View Article

Hex blog: IDA 7.2 – The Mac Rundown

We posted an addendum to the release notes for IDA 7.2: The Mac Rundown. It dives much deeper into the Mac-specific features introduced in 7.2, and should be great reference material for users...

View Article


Image may be NSFW.
Clik here to view.

SANS Internet Storm Center, InfoCON: green: Live memory analysis using...

If you are doing memory forensics using Volatility, maybe you have noticed that one of the disadvantages that you can’t do a live analysis. If you need to do live memory forensics, then Rekall is your...

View Article


Wired: Security: How China Helped Make the Internet Less Free in 2018

Tech companies, democratic governments, and civil society need to work together to fight back against growing surveillance and censorship online.

View Article

SANS Internet Storm Center, InfoCON: green: Bitcoin "Blacklists", (Wed, Dec...

At the Internet Storm Center, we regularly get malware and fraudulent emails including Bitcoin addresses. Like the extortion emails including leaked passwords. And we often search online for these...

View Article

Wired: Security: Privacy Law Showdown Between Congress and Tech Looms in 2019

Lawmakers spend the better part of 2018 talking tough to tech companies. Now the pressure is on for Congress to act.

View Article

Wired: Security: Pan Am Flight 103: Robert Mueller’s 30-Year Search for Justice

Known as the Lockerbie bombing, in December 1988 a bomb downed a Pan Am jet, leaving 270 dead. It was the first mass killing of Americans by terrorists. As the head of the Justice Department’s criminal...

View Article


Image may be NSFW.
Clik here to view.

AlienVault Blogs: How Malware Sandboxes and SIEMs Work in Tandem to...

Rohan Viegas of VMRay explains some of the key factors IT security teams should consider when evaluating a malware analysis sandbox and whether it’s a good fit for their existing SIEM environment. He...

View Article

Wired: Security: The Most-Read Security Stories of 2018

This year saw the most devastating cyberattack in history, a gang of teen hackers, and so much Mueller news.

View Article


SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Friday,...

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Y para Reyes Magos puedes pedir un LEGO...

Ya sabéis que soy muy aficionado a los cómics, los posters, los libros, las figuras, y demás, y por ello he cortado mi periodo de desconexión invernal para daros esta noticia. Ya conocéis de mí que me...

View Article


Image may be NSFW.
Clik here to view.

Didier Stevens: Update: numbers-to-string.py Version 0.0.7

In this update, I added option -T. This is an alternative for option -t (table for number to character conversion). In stead of providing the full table with option -t, now you can provide a partial...

View Article

Wired: Security: We’re all Just Starting to Realize the Power of Personal Data

This year revealed consumers have a lot more to learn about what happens to their information online.

View Article

Image may be NSFW.
Clik here to view.

AlienVault Blogs: How Malware Sandboxes and SIEMs Work in Tandem to...

Rohan Viegas of VMRay explains some of the key factors IT security teams should consider when evaluating a malware analysis sandbox and whether it’s a good fit for their existing SIEM environment. He...

View Article
Browsing all 12054 articles
Browse latest View live