Un informático en el lado del mal: DiskFiltration & USBee: Nuevos técnicas...
El grupo de investigación de la Universidad de Ben-Gurion ha vuelto a publicar nuevos trabajos sobre como resolver la comunicación en entornos Air-Gapped, o lo que es lo mismo, cómo conseguir que...
View ArticleArsTechnica: Security Content: Golden State Warriors Android app constantly...
EnlargeThe official Android app for the NBA's Golden State Warriors continuously listens in on users' private conversations without permission, according to a federal lawsuit that alleges the practice...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Friday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticlePandaLabs: PowerLocker
PowerLocker, also called PrisonLocker, is a new family of ransomware which in addition to encrypting files on the victim’s computer (as with other such malware) threatens to block users’ computers...
View ArticleArsTechnica: Security Content: New OS X security updates patch same zero-days...
Enlarge (credit: Apple)Late last week, Apple released iOS 9.3.5 to patch three zero-day bugs that could be used to access personal data on an infected phone. Dubbed "Trident," the bugs were used to...
View ArticleSANS Internet Storm Center, InfoCON: green: Apple Patches "Trident"...
About a week ago, Apple patched three vulnerabilities in iOS that had been used in a targeted exploit. This set of vulnerabilities, also known as Trident, affected WebKitand the iOS kernel. Given the...
View ArticleArsTechnica: Security Content: Over 40 million usernames, passwords from 2012...
Enlarge/ If you haven't changed your password for Last.fm since 2012, it's long past time—the passwords are now easily grabbed from the Internet. The contents of a March 2012 breach of the music...
View ArticleArsTechnica: Security Content: OpenOffice, after years of neglect, could shut...
The latest version of OpenOffice. OpenOffice, once the premier open source alternative to Microsoft Office, could be shut down because there aren't enough developers to update the office suite. Project...
View ArticleInfosec Events: Information Security Events For September
Here are information security events in North America this month: Information Security Conference (ISC 2016) : September 7 to 9 in Honolulu, HI, USA SecureWorld Cincinnati 2016 : September 8 in...
View ArticleArsTechnica: Security Content: Feds pin brazen kernel.org intrusion on...
Enlarge (credit: Ildar Sagdejev)In August 2011, multiple servers used to maintain and distribute the Linux operating system kernel were infected with malware that gave an unknown intruder almost...
View ArticleNiels Provos: Help to Translate my Videos into your language
If you speak another language besides English, you can help me translate my video subtitles into your language. Your contribution will be publicly credited on the video. Please, help.
View ArticleUn informático en el lado del mal: El soporte de #Grindr "leakea" e-mails de...
Las técnicas de doxing se utilizan para desenmascarar usuarios detrás de perfiles anónimos u ocultos en redes sociales, pero también para localizar a personas a través de diferentes redes sociales. Los...
View ArticleMcAfee Avert Labs: Taking a Look at W32/Ramnit
Today we’re going to take a look at an interesting file-infector virus. W32/Ramnit infects EXE, DLL and HTML files. That last one is right; W32/Ramnit also infects HTML files to replicate itself.Let’s...
View Articlehoneyblog: 2011 Honeynet Project Security Workshop Slides + Videos
The slides and videos from the 2011 Honeynet Project Security Workshop (Paris) are now available! You can get the material from http://www.honeynet.org/SecurityWorkshops/2011_Paris. About the...
View ArticleLost In Security: Españoles por la BlackHat
Siguiendo con la estela del artículo publicado 'Españoles por la Phrack', vuelvo a la carga con un artículo parecido, pero en este caso sobre una de las conferencias de seguridad que más conoce la...
View ArticleLost In Security: El último superviviente (II) - iOS
En el pasado artículo estuvimos revisando los puntos débiles que tiene un malware a la hora de sobrevivir un reinicio del sistema, y nos centramos en OSX. Ahora toca el turno a iOS, que al ser una...
View ArticleKPNC: vulnerability in… WinCalc (Win7, x64)
I will never go out of business in this country. thanks to Microsoft. who would have thought that wincalcis vulnerable? I have not checked all systems yet, so this is my configuration: Windows 7...
View ArticleADD / XOR / ROL: Essays about management in large(r) organisations (1):...
Even though I often profess that my primary interests are technical, by this point in my life I have been exposed to a variety of different organisations and management styles: From the self-organizing...
View ArticleUn informático en el lado del mal: Conferencias B-Sides en Medellín (Online &...
Durante este mes de septiembre tendrá lugar en Colombia un encuentro digno de asistir. Se trata de una nueva edición de las charlas B-Sides Colombia, esta vez en la ciudad de Medellín. El evento es...
View Article