Quantcast
Channel: eternal-todo.com aggregator
Browsing all 12054 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: ¡Ojo con los acosadores en Tinder! En cada...

Debo reconocer que soy una de las víctimas de la aplicación de citas por excelencia, Tinder. Gracias a este servicio pensé que encontraría a mi pareja ideal, pero lo que no imaginé nunca es que la...

View Article


SANS Internet Storm Center, InfoCON: green: Data Classification For the...

Data classification isnt a brand new topic. For a long time, international organizations or military are doing data classification. It can be defined as:A set of processes and tools to help the...

View Article


Image may be NSFW.
Clik here to view.

/dev/random: [SANS ISC Diary] Data Classification For the Masses

I published the following diary on isc.sans.org: “Data Classification For the Masses“.Data classification isn’t a brand new topic. For a long time, international organizations or military are doing...

View Article

Image may be NSFW.
Clik here to view.

KPNC: vulnerability in… WinCalc (Win7, x64)

I will never go out of business in this country. thanks to Microsoft. who would have thought that wincalcis vulnerable? I have not checked all systems yet, so this is my configuration: Windows 7...

View Article

Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: How the NSA snooped on encrypted Internet...

Enlarge (credit: NSA)In a revelation that shows how the National Security Agency was able to systematically spy on many Cisco Systems customers for the better part of a decade, researchers have...

View Article


Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Cómo te estafan 1.282 € por un falso piso...

En verano el mercado de los alquileres se acelera, aprovechando que muchos estudiantes finalizan sus carreras,  que empleados cambian de trabajo o que la gente quiere tomarse unas largas y merecidas...

View Article

Image may be NSFW.
Clik here to view.

Darknet - The Darkside: PowerOPS – PowerShell Runspace Portable Post...

PowerShell Runspace Portable Post Exploitation Tool aimed at making Penetration Testing with PowerShell “easier”. PowerOPS is an application written in C# that does not rely on powershell.exe but runs...

View Article

SANS Internet Storm Center, InfoCON: green: What are YOU doing to give back...

Someone has played a large role in helping us become inspired and motivated to develop as an information security practitioner.We certainly did not get where we are today on our own.Without a doubt, I...

View Article


Lost In Security: El último superviviente (II) - iOS

En el pasado artículo estuvimos revisando los puntos débiles que tiene un malware a la hora de sobrevivir un reinicio del sistema, y nos centramos en OSX. Ahora toca el turno a iOS, que al ser una...

View Article


Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Entrevista en "Las tardes del ciudadano...

Al comienzo del verano de este año fui invitado a pasar una tarde en Radio Nacional de España para ser entrevistado en el programa "Las tardes del ciudadano García" y hablar de todo un poco. La...

View Article

SANS Internet Storm Center, InfoCON: green: Cisco ASA SNMP Remote Code...

Looking back through all the vulnerabilities announced this week, one caught my eye. CVE-2016-6366 is a vulnerability in the Cisco ASA products which could allow a remote attacker to remotely execute...

View Article

Lost In Security: Españoles por la BlackHat

Siguiendo con la estela del artículo publicado 'Españoles por la Phrack', vuelvo a la carga con un artículo parecido, pero en este caso sobre una de las conferencias de seguridad que más conoce la...

View Article

Image may be NSFW.
Clik here to view.

Didier Stevens: Update: xor-kpa.py Version 0.0.3 With Man Page

This new version has a man page now (option -m):Usage: xor-kpa.py [options] filename-plaintext [filename-ciphertext] XOR known-plaintext attack Predefined plaintext: dos: This program cannot be run in...

View Article


SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Monday, August...

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Alejandro Ramos se incorpora a Telefónica...

Hoy lunes 22 de Agosto es el primer día en el que Telefónica estrena un nuevo CISO dentro de la estructura del equipo de Seguridad Corporativa. Como ya os he anticipado en el título, el nuevo CISO será...

View Article


Image may be NSFW.
Clik here to view.

Infosec Events: Week 34 In Review – 2016

Events RelatedImpressions From DEF CON 24: The Machines Are Rising– securityintelligence.com DEF CON 24, the world’s largest hacker conference, ended Aug. 7, and I must say I enjoyed every moment of...

View Article

Image may be NSFW.
Clik here to view.

Darknet - The Darkside: IGHASHGPU – GPU Based Hash Cracking – SHA1, MD5 & MD4

IGHASHGPU is an efficient and comprehensive command line GPU based hash cracking program that enables you to retrieve SHA1, MD5 and MD4 hashes by utilising ATI and nVidia GPUs. It even works with...

View Article


Image may be NSFW.
Clik here to view.

SANS Internet Storm Center, InfoCON: green: Red Team Tools Updates: hashcat...

Two kits favored by red teams and penetration testers have been updated recently, namely hashcat and SpiderFoot. Hashcat and SpiderFoot together read like a Robert Redford/Paul Newman movie title (yes,...

View Article

Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Hints suggest an insider helped the NSA...

This is not what NSA's TAO is doing right now. A group called the Shadow Brokers made headlines this month by leaking a hacking tool belonging to the NSA's Tailored Access Operations (TAO) team. Now...

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Nuevo Módulo para Metasploit: Windows 7&10...

Hace unos días publicamos información sobre la vulnerabilidad descubierta por Matt Graeber y Enigma0x3 que permitía realizar un Bypass de UAC en entornos Windows 7 & Windows 10. Me puse manos a la...

View Article
Browsing all 12054 articles
Browse latest View live


Latest Images