Lost In Security: El último superviviente (II) - iOS
En el pasado artículo estuvimos revisando los puntos débiles que tiene un malware a la hora de sobrevivir un reinicio del sistema, y nos centramos en OSX. Ahora toca el turno a iOS, que al ser una...
View ArticleKPNC: vulnerability in… WinCalc (Win7, x64)
I will never go out of business in this country. thanks to Microsoft. who would have thought that wincalcis vulnerable? I have not checked all systems yet, so this is my configuration: Windows 7...
View ArticlePandaLabs: PowerLocker
PowerLocker, also called PrisonLocker, is a new family of ransomware which in addition to encrypting files on the victim’s computer (as with other such malware) threatens to block users’ computers...
View ArticleWired: Threat Level: Hacker Lexicon: What Are White Hat, Gray Hat, and Black...
Here's how to distinguish the colors of the hacker rainbow. The post Hacker Lexicon: What Are White Hat, Gray Hat, and Black Hat Hackers? appeared first on WIRED.
View ArticleWired: Threat Level: Matthew Keys Sentenced to Two Years for Aiding Anonymous
The former Tribune Company employee was convicted of giving Anonymous information that helped hackers access an LA Times server and alter a headline. The post Matthew Keys Sentenced to Two Years for...
View ArticleWired: Threat Level: A Scheme to Encrypt the Entire Web Is Actually Working
The non-profit certificate authority Let's Encrypt is enabling a sea change toward HTTPS encryption online. The post A Scheme to Encrypt the Entire Web Is Actually Working appeared first on WIRED.
View ArticleDarknet - The Darkside: Acunetix Web Vulnerability Scanner v11 Released
Acunetix Web Vulnerability Scanner v11 has just been released with lots of exciting new features and tools. The biggest change is that v11 is now integrated with Vulnerability Management features to...
View ArticleArsTechnica: Security Content: Google warns journalists and professors: Your...
Google is warning prominent journalists and professors that nation-sponsored hackers have recently targeted their accounts, according to reports delivered in the past 24 hours over social media.The...
View ArticleUn informático en el lado del mal: La historia del bug de "Open Proxy" en...
Durante el mes del verano estuvimos haciendo unas pruebas con Faast sobre varios sitios hacking friendly para ver cómo se comportaba la nueva versión de nuestro motor. Los resultados fueron...
View ArticleArsTechnica: Security Content: US Navy warns 134,000 sailors of data breach...
Enlarge (credit: Mark Wilson/Getty Images)A data breach at the US Navy has exposed the social security numbers and names of more than 130,000 current and former sailors, officials confirmed late on...
View ArticleSANS Internet Storm Center, InfoCON: green: Extracting Shellcode From...
I updated my base64dump.py program to help with extraction of shellcode from JavaScript.base64dump now also support Unicode encoding and hexadecimal. If you have suggestions for other encodings, please...
View ArticleUn informático en el lado del mal: Hoy es el Black Friday también en @0xWord:...
Si tenías intención de comprarte alguno de los libros nuevos que hemos lanzado en 0xWord como el de Hacking Web Technologies, la 2ª Edición de Hacking iOS: iPhone & iPad, la novela de Got Root o el...
View ArticleSecutityByDefault: BLACK FRIDAY EN FORMACIÓN ONLINE DE SEGURIDAD INFORMÁTICA...
Por estas fechas, una de las costumbres americanas que parece que se han instaurado en España es el Black Friday, que hace que podamos encontrar buenos chollos en determinados sectores, sobre todo...
View ArticleSANS Internet Storm Center, InfoCON: green: Free Software Quick Security...
Free software (open source or not) is interesting for many reasons. It can be adapted to your own needs, it can be easily integrated within complex architectures but the most important remains, of...
View Article/dev/random: [SANS ISC Diary] Free Software Quick Security Checklist
I published the following diary on isc.sans.org: “Free Software Quick Security Checklist“.Free software (open source or not) is interesting for many reasons. It can be adapted to your own needs, it can...
View ArticleArsTechnica: Security Content: Cyber college for wannabe codebreakers planned...
Enlarge/ Block G is one of the largest wartime structures at the site. (credit: Qufaro)Bletchley Park—the home of codebreakers whose pioneering work helped Britain and its allies win the Second...
View ArticleArsTechnica: Security Content: Locky ransomware uses decoy image files to...
(credit: Aurich Lawson)A low-tech but cunning malware program is worrying security researchers after it started spreading rapidly in the past week through a new attack vector: by forcibly exploiting...
View ArticleFortinet FortiGuard Blog: Ready for Cyber Monday? Maybe Not?
Your 2017 Safe Holiday Shopping Guide: We will soon be in the throes of the holiday gift-buying season. A whole set of must-have connected devices have hit the stores, from smart accessories and...
View ArticleUn informático en el lado del mal: "Internet es Genial: Usémoslo bien" en Lo...
Ayer viernes participé en uno de los eventos de Lo que de verdad importa, en su edición en Madrid. Se trataba de una participación muy pequeña, de solo cinco minutos durante la que debía dar una...
View ArticleMcAfee Avert Labs: Taking a Look at W32/Ramnit
Today we’re going to take a look at an interesting file-infector virus. W32/Ramnit infects EXE, DLL and HTML files. That last one is right; W32/Ramnit also infects HTML files to replicate itself.Let’s...
View Article