Quantcast
Channel: eternal-todo.com aggregator
Browsing all 12054 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Takin' a Walk on the Geek Side

Durante este verano no he tenido vacaciones por decisión propia. Es cierto que ya sabía que se me iban a avecinar una avalancha de proyectos durante esta temporada por lo que descansé todo lo que pude...

View Article


Image may be NSFW.
Clik here to view.

Didier Stevens: Update: rtfdump Version 0.0.4

This version has a user-friendlier handling of files that are not rtf:Last months, I’ve seen many maldocs that disguise .doc files as .rtf.rtfdump_V0_0_4.zip (https) MD5:...

View Article


SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Monday, August...

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article

Image may be NSFW.
Clik here to view.

un-excogitate.org: Of hackers and musicians

What qualities do you look for when you're hiring information security professionals, and in particular ‘hackers'? I won't pretend to be an expert at this, and certainly would prefer you read material...

View Article

Image may be NSFW.
Clik here to view.

Infosec Events: Week 35 In Review – 2016

Resources DEF CON 24 Wireless Monitoring Services– palshack.org One of the frequent things you hear leading up to DEF CON is that it is the most dangerous network in the world. Ask anyone, and they’ll...

View Article


Image may be NSFW.
Clik here to view.

Dancho Danchev's Blog - Mind Streams of Information Security Knowledge:...

Cybercriminals, continue, launching, new, cybercrime-friendly, services, aiming, to, diversify, their, portfolio, of, fraudulent, services, while, earning, tens, of, thousands of fraudulent revenue in...

View Article

Image may be NSFW.
Clik here to view.

Dancho Danchev's Blog - Mind Streams of Information Security Knowledge:...

With the carding underground continuing to flourish, for the purpose, of, monetizing commoditized underground items such as, stolen credit cards, cybercriminals continue to over-supply the market...

View Article

Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: After Illinois hack, FBI warns of more attacks...

Enlarge/ An FBI "Flash" memorandum on state Board of Elections site warns of attacks on two states so far and asks for other states to check their logs. Someone using servers in the US, England,...

View Article


SANS Internet Storm Center, InfoCON: green: Recommended Reading: Intrusion...

My Twitter feed brought a good paper to my attention, courtesy of Andrew Case @attrc, that is appropriate for your consideration, Storm Center readers.@Cyber_IR_UK stated that its the best paper Ive...

View Article


Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Meet USBee, the malware that uses USB drives...

Enlarge/ Illustration of USBee, in which an ordinary, unmodified USB drive (A) transmits information to a nearby receiver (B) through electromagnetic waves emitted from the drive data bus. (credit:...

View Article

Image may be NSFW.
Clik here to view.

/dev/random: Getting Useful Info From the Log Hell with Awk

Getting useful info from log file should be piece of cake …if the file is properly formatted! Usually, one event is written on a single line with useful info delimited by a separator or extractable...

View Article

Image may be NSFW.
Clik here to view.

KPNC: vulnerability in… WinCalc (Win7, x64)

I will never go out of business in this country. thanks to Microsoft. who would have thought that wincalcis vulnerable? I have not checked all systems yet, so this is my configuration: Windows 7...

View Article

Image may be NSFW.
Clik here to view.

PandaLabs: PowerLocker

PowerLocker, also called PrisonLocker, is a new family of ransomware which in addition to encrypting files on the victim’s computer (as with other such malware) threatens to block users’ computers...

View Article


Image may be NSFW.
Clik here to view.

Wired: Threat Level: Hacker Lexicon: What Are White Hat, Gray Hat, and Black...

Here's how to distinguish the colors of the hacker rainbow. The post Hacker Lexicon: What Are White Hat, Gray Hat, and Black Hat Hackers? appeared first on WIRED.

View Article

Image may be NSFW.
Clik here to view.

Wired: Threat Level: Matthew Keys Sentenced to Two Years for Aiding Anonymous

The former Tribune Company employee was convicted of giving Anonymous information that helped hackers access an LA Times server and alter a headline. The post Matthew Keys Sentenced to Two Years for...

View Article


Image may be NSFW.
Clik here to view.

Wired: Threat Level: A Scheme to Encrypt the Entire Web Is Actually Working

The non-profit certificate authority Let's Encrypt is enabling a sea change toward HTTPS encryption online. The post A Scheme to Encrypt the Entire Web Is Actually Working appeared first on WIRED.

View Article

SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Tuesday, August...

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article


Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: TheFatRat: La Rata Gorda lucha contra los...

Echando un ojo a muchas de las herramientas que salen diariamente en Internet relacionadas con el mundo de la seguridad me llamó la atención TheFatRat. Desarrollada por Edo Maland y ayudado en módulos...

View Article

Image may be NSFW.
Clik here to view.

Darknet - The Darkside: Emerging Threats ETOpen – Anti-malware IDS/IPS Ruleset

The ETOpen Ruleset is an excellent anti-malware IDS/IPS ruleset that enables users with cost constraints to significantly enhance their existing network-based malware detection. The ETOpen Ruleset is...

View Article

SANS Internet Storm Center, InfoCON: green: Today's Locky Variant Arrives as...

Pretty much all the Locky variants I have looked at the last couple days arrived as zipped JavaScript files. Today, I got something slightly different. While the e-mail looked the same overall, the...

View Article
Browsing all 12054 articles
Browse latest View live