ArsTechnica: Security Content: This evil office printer hijacks your...
Julian Oliver has for years harbored a strange obsession with spotting poorly disguised cellphone towers, those massive roadside antennae draped in fake palm fronds to impersonate a tree, or even...
View ArticleSANS Internet Storm Center, InfoCON: green: Extracting Malware Transmitted...
One charactersitcs of many of the telnet explois we have seen over the last few years has been the transmission of malware using echo commands. Even the recent versions of Mirai used this trick....
View ArticleArsTechnica: Security Content: How to block the ultrasonic signals you didn’t...
EnlargeDystopian corporate surveillance threats today come at us from all directions. Companies offer “always-on” devices that listen for our voice commands, and marketers follow us around the web to...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Friday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleMcAfee Avert Labs: Taking a Look at W32/Ramnit
Today we’re going to take a look at an interesting file-infector virus. W32/Ramnit infects EXE, DLL and HTML files. That last one is right; W32/Ramnit also infects HTML files to replicate itself.Let’s...
View Articlehoneyblog: 2011 Honeynet Project Security Workshop Slides + Videos
The slides and videos from the 2011 Honeynet Project Security Workshop (Paris) are now available! You can get the material from http://www.honeynet.org/SecurityWorkshops/2011_Paris. About the...
View ArticleLost In Security: Españoles por la BlackHat
Siguiendo con la estela del artículo publicado 'Españoles por la Phrack', vuelvo a la carga con un artículo parecido, pero en este caso sobre una de las conferencias de seguridad que más conoce la...
View ArticleLost In Security: El último superviviente (II) - iOS
En el pasado artículo estuvimos revisando los puntos débiles que tiene un malware a la hora de sobrevivir un reinicio del sistema, y nos centramos en OSX. Ahora toca el turno a iOS, que al ser una...
View ArticleUn informático en el lado del mal: LUCA: From BASIC Data to Big Data @luca_d3...
Han pasado ya quince días desde que lanzamos LUCA, nuestra unidad de Big Data en Telefónica para ayudar a las empresas a transformarse y ayudarles a tomar Data-Driven Decisions en todas las actividades...
View ArticleSANS Internet Storm Center, InfoCON: green: If DDOS Attacks are Natural...
5 years ago, I posted a story on the Eastern Seaboard power outage of 2003 (https://isc.sans.edu/forums/diary/8+Years+since+the+Eastern+Seaboard+Blackout+Has+it+Been+that+Long/11374/ ). In that story I...
View ArticleUn informático en el lado del mal: MetaShield Protector Clean-UP Online &...
Ha pasado justo un mes desde que tuvimos nuestro Security Innovation Day 2016, pero aún no he terminado de contaros todas las novedades de seguridad que anunciamos allí. Hoy quiero hablar de otra...
View ArticleDarknet - The Darkside: Censys – Public Host & Network Search Engine
Censys is a public host & network search engine that allows computer scientists to ask questions about the devices and networks that compose the Internet. Driven by Internet-wide scanning, Censys...
View ArticleSANS Internet Storm Center, InfoCON: green: Full Packet Capture for Dummies,...
When a security incident occurred and must be investigated, the Incident Handlers Holy Grail is a network capture file. It contains all communications between the hosts on the network. These metadata...
View Article/dev/random: [SANS ISC Diary] Full Packet Capture for Dummies
I published the following diary on isc.sans.org: “Full Packet Capture for Dummies”When a security incident occurred and must be investigated, the Incident Handler’s Holy Grail is a network capture...
View ArticleUn informático en el lado del mal: Cómo usar Cortana en Español de Windows 10...
Como muchos sabréis ya esta disponible la Apk de Cortana para Android - el asistente virtual de Microsoft que viene con Windows 10 - con un pequeño inconveniente para algunos, y es que de momento, sólo...
View ArticleSANS Internet Storm Center, InfoCON: green: Hancitor Maldoc Bypasses...
For about two months I" />The EXE is a 32-bit application (MD5 CDCD2CA36ED9A2B060DD4147BC5F7706).The 32-bit shellcode does a egg-hunt for string STARFALL, skips 4 bytes and then starts to decode the...
View Articletxipi:blog: Clash Royale versión juego de mesa
Tengo un hijo que está bastante flipado con Clash Royale. Como en casa no somos mucho de móviles y tabletas, juega cuando le dejamos, que es más bien poco. Preferimos que juegue a juegos que le exijan...
View ArticleCarnal0wnage Blog: On Nation States and Sophistication
Thomas Ptacek made an interesting tweet today about Nation States, and if the term has any meaning, which got me thinking. In light of the numerous breaches that have been occurring, affecting both...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Monday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleInfosec Events: Week 45 In Review – 2016
ResourcesRuxcon– ruxcon.org.au Presentation Slides from Ruxcon AustraliaBlackHat Europe 2016– www.blackhat.comTechniquesKerberoasting Without Mimikatz– www.harmj0y.net Thanks to an awesome PowerView...
View Article