Quantcast
Channel: eternal-todo.com aggregator
Browsing all 12054 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Samsung’s Tizen is riddled with security...

Enlarge/ Samsung's Smart TV interface, which seems to be running on Tizen. (credit: Samsung)Tizen, the open source operating system that Samsung uses on a range of Internet-of-Things devices and...

View Article


The Security Shoggoth: Malware Analysis Course on Pluralsight!

Since 2010, I have been running my Introduction to Malware Analysis course at various conferences and organizations, and have taught over 200 students. I've heard from many of my former students that...

View Article


SANS Internet Storm Center, InfoCON: green: Encryption inside Utility...

Industrial control systems are sensitive systems that must make decisions in real time to ensure the operation of the industrial process they govern. The latency and reliability in packet transmission...

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Fileless 2: Un nuevo (sí, uno más otra...

Hace unos meses Enigma0x3 publicaba un Bypass UAC distinto a los conocidos hasta el momento, se trataba de un bypass UAC Fileless, es decir, sin necesidad de subir una DLL o un binario al equipo para...

View Article

SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Wednesday,...

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article


SANS Internet Storm Center, InfoCON: green: Whitelists: The Holy Grail of...

As a defender, take the time to put yourself in the place of a bad guy for a few minutes. Youre writing some malicious code and you need to download payloads from the Internet or hide your code on a...

View Article

Image may be NSFW.
Clik here to view.

/dev/random: [SANS ISC] Whitelists: The Holy Grail of Attackers

I published the following diary on isc.sans.org: “Whitelists: The Holy Grail of Attackers“.As a defender, take the time to put yourself in the place of a bad guy for a few minutes. You’re writing some...

View Article

Fortinet FortiGuard Blog: Video Gallery: Ladi Adefala and Hussein Syed...

On February 21, Hussein Syed, Chief Information Security Officer at Barnabas Health System, and Ladi Adefala, Senior Security Strategist at Fortinet, led a roundtable discussion at HIMSS17 about the...

View Article


Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Android devices can be fatally hacked by...

Enlarge (credit: IntelFreePress)A broad array of Android phones is vulnerable to attacks that use booby-trapped Wi-Fi signals to achieve full device takeover, a researcher has demonstrated.The...

View Article


Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Certificate Transparency Checker para...

La iniciativa de Certificate Transparency viene impulsada desde el equipo de seguridad de Google y busca justo lo que el nombre pone: Que haya transparencia sobre los certificados digitales que se...

View Article

Image may be NSFW.
Clik here to view.

SANS Internet Storm Center, InfoCON: green: Java Struts2 Vulnerability Used...

[We do have a special webcast about the Struts2 Vulnerability scheduled for 11am ET today. Sign up here]Since about a month, we are tracking numerous attempts to exploit the Java Struts2 vulnerability...

View Article

SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Thursday, April...

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article

Lost In Security: Españoles por la BlackHat

Siguiendo con la estela del artículo publicado 'Españoles por la Phrack', vuelvo a la carga con un artículo parecido, pero en este caso sobre una de las conferencias de seguridad que más conoce la...

View Article


Lost In Security: El último superviviente (II) - iOS

En el pasado artículo estuvimos revisando los puntos débiles que tiene un malware a la hora de sobrevivir un reinicio del sistema, y nos centramos en OSX. Ahora toca el turno a iOS, que al ser una...

View Article

Fortinet FortiGuard Blog: Fortinet Fabric-Ready Partner Spotlight: Silver...

Q&A with Fraser Street, VP of Technical Alliances at Silver Peak Fortinet sits down with Fabric-Ready Partner, Silver Peak to learn what’s top of mind for its customers, the key IT challenges they...

View Article


Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Researchers find China tried infiltrating...

Enlarge/ Chinese President Xi Jinping meets with the prime minister of Finland, Juha Sipila, during an official visit in Helsinki, Finland, on April 5, 2017. President Xi is traveling to the US today....

View Article

Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Rash of in-the-wild attacks permanently...

Enlarge (credit: Guinnog)Researchers have uncovered a rash of ongoing attacks designed to damage routers and other Internet-connected appliances so badly that they become effectively inoperable.PDoS...

View Article


Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Ataque de Growth Hacking con WhatsApp...

Hace ya varias semanas apareció la nueva actualización de WhatsApp conlos famosos “Estados”. La experiencia nos ha dicho que con cada nueva modificación del código y con la ampliación de funciones,...

View Article

Image may be NSFW.
Clik here to view.

Didier Stevens: Quickpost: Using My Bash Bunny To “Snag Creds From A Locked...

FYI: This is nothing new, I’m just documenting how I configured and used my new Bash Bunny for “SNAGGING CREDS FROM LOCKED MACHINES” as Mubix explained.After setting up my Bash Bunny, I used it on a...

View Article

SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Friday, April...

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article
Browsing all 12054 articles
Browse latest View live


Latest Images