ArsTechnica: Security Content: Officials blame “sophisticated” Russian...
Sophisticated hackers use the command line with their pinkies raised and wear cashmere balaclavas. The profile of attacks on two US state voter registration systems this summer presented in an FBI...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Wednesday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleUn informático en el lado del mal: Big Data Security Tales: Los Known-Bugs en...
Por supuesto, el software que se utiliza en los entornos de Big Data es susceptible de contener fallos de seguridad que van siendo descubiertos a lo largo del tiempo. La gestión de las actualizaciones...
View ArticleArsTechnica: Security Content: Building a new Tor that can resist...
Since Edward Snowden stepped into the limelight from a hotel room in Hong Kong three years ago, use of the Tor anonymity network has grown massively. Journalists and activists have embraced the...
View ArticleArsTechnica: Security Content: Dropbox hackers stole e-mail addresses, hashed...
(credit: Jim Barton)Dropbox hurriedly warned its users last week to change their passwords if their accounts dated back prior to mid-2012. We now know why: the cloud-based storage service suffered a...
View ArticleSANS Internet Storm Center, InfoCON: green: Dropbox Breach, (Wed, Aug 31st)
Dropbox has just been added to the myriad of sites that have been hacked. It seems that back in 2012 there was a breach and around 60 million accounts were stolen. There is now evidence surfacing that...
View ArticleDarknet - The Darkside: Dropbox Hacked – 68 Million User Accounts Compromised
So was Dropbox Hacked? There was some rumours going around last week after it sent out a password reset e-mail warning to all users. It seems like it’s limited to users who were active in 2012 and the...
View ArticleSANS Internet Storm Center, InfoCON: green: Cisco Security Advisories Issued,...
If you use any of these Cisco Devices please take recommended action.WebEx Player - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-meetings-playerCisco Small...
View ArticleSANS Internet Storm Center, InfoCON: green: Angler Exploit Kits Reported,...
We have had a report from one of our readers (thanks Andrew)indicating that they are seeing Angler Exploit Kit attempts in the past 2 days appearing to be tied to Heart Internet.I am not seeing any...
View ArticleArsTechnica: Security Content: So much for counter-phishing training: Half of...
With a name or just a general description of some generic event, researchers were able to "spear-phish" half of their test subjects. (credit: Wikipedia)Security experts often talk about the importance...
View ArticleArsTechnica: Security Content: New cloud attack takes full control of virtual...
EnlargeThe world has seen the most unsettling attack yet resulting from the so-called Rowhammer exploit, which flips individual bits in computer memory. It's a technique that's so surgical and...
View ArticleUn informático en el lado del mal: Protege en tu CMS la ejecución de acciones...
En la mitología griega, Chrono es el dios que personificaba el tiempo, y de él han llegado hasta nuestro tiempo las connotaciones temporales en nuestra cultura para muchos de nuestros términos. En los...
View ArticleWired: Threat Level: Hacker Lexicon: What Are White Hat, Gray Hat, and Black...
Here's how to distinguish the colors of the hacker rainbow. The post Hacker Lexicon: What Are White Hat, Gray Hat, and Black Hat Hackers? appeared first on WIRED.
View ArticleWired: Threat Level: Matthew Keys Sentenced to Two Years for Aiding Anonymous
The former Tribune Company employee was convicted of giving Anonymous information that helped hackers access an LA Times server and alter a headline. The post Matthew Keys Sentenced to Two Years for...
View ArticleWired: Threat Level: A Scheme to Encrypt the Entire Web Is Actually Working
The non-profit certificate authority Let's Encrypt is enabling a sea change toward HTTPS encryption online. The post A Scheme to Encrypt the Entire Web Is Actually Working appeared first on WIRED.
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Thursday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleSANS Internet Storm Center, InfoCON: green: Maxmind.com (Ab)used As...
A long time ago I wrote a diary[1] about malware samples which use online geolocalization services. Such services are used to target only specific victims. If the malware detects that it is executed...
View Article/dev/random: [SANS ISC Diary] Maxmind.com (Ab)used As Anti-Analysis Technique
I published the following diary on isc.sans.org: “Maxmind.com (Ab)used As Anti-Analysis Technique“.A long time ago I wrote a diary[1] about malware samples which use online geolocalization services....
View ArticleSunbelt Blog: GFI Prime Brings More Value to Customers by Providing...
Loyalty programs are often full of great benefits for existing customers, but how many of them have you seen giving valuable software products for free in addition to the purchased ones? None? It’s...
View ArticleArsTechnica: Security Content: “Foghorn” takes users out of phish-fighting...
Enlarge/ Go ahead and click it. You know you want to. Clickers gonna click. Despite mandatory corporate training, general security awareness, and constant harping about the risks of clicking on...
View Article