Un informático en el lado del mal: Takin' a Walk on the Geek Side
Durante este verano no he tenido vacaciones por decisión propia. Es cierto que ya sabía que se me iban a avecinar una avalancha de proyectos durante esta temporada por lo que descansé todo lo que pude...
View ArticleDidier Stevens: Update: rtfdump Version 0.0.4
This version has a user-friendlier handling of files that are not rtf:Last months, I’ve seen many maldocs that disguise .doc files as .rtf.rtfdump_V0_0_4.zip (https) MD5:...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Monday, August...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View Articleun-excogitate.org: Of hackers and musicians
What qualities do you look for when you're hiring information security professionals, and in particular ‘hackers'? I won't pretend to be an expert at this, and certainly would prefer you read material...
View ArticleInfosec Events: Week 35 In Review – 2016
Resources DEF CON 24 Wireless Monitoring Services– palshack.org One of the frequent things you hear leading up to DEF CON is that it is the most dangerous network in the world. Ask anyone, and they’ll...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
Cybercriminals, continue, launching, new, cybercrime-friendly, services, aiming, to, diversify, their, portfolio, of, fraudulent, services, while, earning, tens, of, thousands of fraudulent revenue in...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
With the carding underground continuing to flourish, for the purpose, of, monetizing commoditized underground items such as, stolen credit cards, cybercriminals continue to over-supply the market...
View ArticleArsTechnica: Security Content: After Illinois hack, FBI warns of more attacks...
Enlarge/ An FBI "Flash" memorandum on state Board of Elections site warns of attacks on two states so far and asks for other states to check their logs. Someone using servers in the US, England,...
View ArticleSANS Internet Storm Center, InfoCON: green: Recommended Reading: Intrusion...
My Twitter feed brought a good paper to my attention, courtesy of Andrew Case @attrc, that is appropriate for your consideration, Storm Center readers.@Cyber_IR_UK stated that its the best paper Ive...
View ArticleArsTechnica: Security Content: Meet USBee, the malware that uses USB drives...
Enlarge/ Illustration of USBee, in which an ordinary, unmodified USB drive (A) transmits information to a nearby receiver (B) through electromagnetic waves emitted from the drive data bus. (credit:...
View Article/dev/random: Getting Useful Info From the Log Hell with Awk
Getting useful info from log file should be piece of cake …if the file is properly formatted! Usually, one event is written on a single line with useful info delimited by a separator or extractable...
View ArticleKPNC: vulnerability in… WinCalc (Win7, x64)
I will never go out of business in this country. thanks to Microsoft. who would have thought that wincalcis vulnerable? I have not checked all systems yet, so this is my configuration: Windows 7...
View ArticlePandaLabs: PowerLocker
PowerLocker, also called PrisonLocker, is a new family of ransomware which in addition to encrypting files on the victim’s computer (as with other such malware) threatens to block users’ computers...
View ArticleWired: Threat Level: Hacker Lexicon: What Are White Hat, Gray Hat, and Black...
Here's how to distinguish the colors of the hacker rainbow. The post Hacker Lexicon: What Are White Hat, Gray Hat, and Black Hat Hackers? appeared first on WIRED.
View ArticleWired: Threat Level: Matthew Keys Sentenced to Two Years for Aiding Anonymous
The former Tribune Company employee was convicted of giving Anonymous information that helped hackers access an LA Times server and alter a headline. The post Matthew Keys Sentenced to Two Years for...
View ArticleWired: Threat Level: A Scheme to Encrypt the Entire Web Is Actually Working
The non-profit certificate authority Let's Encrypt is enabling a sea change toward HTTPS encryption online. The post A Scheme to Encrypt the Entire Web Is Actually Working appeared first on WIRED.
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Tuesday, August...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleUn informático en el lado del mal: TheFatRat: La Rata Gorda lucha contra los...
Echando un ojo a muchas de las herramientas que salen diariamente en Internet relacionadas con el mundo de la seguridad me llamó la atención TheFatRat. Desarrollada por Edo Maland y ayudado en módulos...
View ArticleDarknet - The Darkside: Emerging Threats ETOpen – Anti-malware IDS/IPS Ruleset
The ETOpen Ruleset is an excellent anti-malware IDS/IPS ruleset that enables users with cost constraints to significantly enhance their existing network-based malware detection. The ETOpen Ruleset is...
View ArticleSANS Internet Storm Center, InfoCON: green: Today's Locky Variant Arrives as...
Pretty much all the Locky variants I have looked at the last couple days arrived as zipped JavaScript files. Today, I got something slightly different. While the e-mail looked the same overall, the...
View Article