Quantcast
Channel: eternal-todo.com aggregator
Browsing all 12054 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Microsoft turns two-factor authentication into...

(credit: Microsoft)Microsoft Authenticator is a pleasant enough two-factor authentication app. You can use it to generate numeric authentication codes for accounts on Google, Facebook, Twitter, and...

View Article


Image may be NSFW.
Clik here to view.

Darknet - The Darkside: Shadow Brokers Release Dangerous NSA Hacking Tools

It’s not the first time Shadow Brokers has been on the radar with NSA Hacking Tools, in August 2016 they exposed a bunch of 0-day exploits (also from 2013). This cache of tools appears to be from 2013,...

View Article


Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Tanium exposed hospital’s IT while using its...

Enlarge/ Orion Hindawi, co-founder and chief technology officer of Tanium Inc. Information security company Tanium is a relatively well-established "next-generation" cybersecurity vendor that was...

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Cómo proteger tu cuenta de Twitter con...

Desde hace muy poco tiempo Twitter ha abierto la posibilidad de proteger tu cuenta por medio de un Segundo Factor de Autenticación basado en el uso de sistemas TOTP (Time One-Time Password) de...

View Article

Image may be NSFW.
Clik here to view.

Didier Stevens: Malicious Documents: The Matryoshka Edition

I must admit that I was (patiently) waiting for the type of malicious document I’m about to describe now. First I’m going to analyze this document with my tools, and after that I’m going to show you...

View Article


SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Thursday, April...

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article

SANS Internet Storm Center, InfoCON: green: DNS Query Length... Because Size...

In many cases, DNS remains a goldmine to detect potentially malicious activity. DNS can be used in multiple ways to bypass securitycontrols. DNS tunnelling is a common way to establish connections with...

View Article

Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Windows bug used to spread Stuxnet remains...

Enlarge (credit: Saurabh R. Patil)One of the Microsoft Windows vulnerabilities used to spread the Stuxnet worm that targeted Iran remained the most widely exploited software bug in 2015 and 2016 even...

View Article


Image may be NSFW.
Clik here to view.

/dev/random: [SANS ISC] DNS Query Length… Because Size Does Matter

I published the following diary on isc.sans.org: “DNS Query Length… Because Size Does Matter“.In many cases, DNS remains a goldmine to detect potentially malicious activity. DNS can be used in multiple...

View Article


Fortinet FortiGuard Blog: Fortinet Fabric-Ready Partner Spotlight: Attivo...

Q&A with Carolyn Crandall, CMO at Attivo Networks Fortinet sits down with Fabric-Ready Partner, Attivo Networks, to learn what’s top of mind for its customers, the key IT challenges they are...

View Article

Fortinet FortiGuard Blog: Join Fortinet at the 2017 Internet2 Global Summit:...

The 2017 Internet2 Global Summit is scheduled to take place at the Renaissance Washington, DC Downtown Hotel from April 23–26. Internet2, a consortium that operates the nation’s largest coast-to-coast...

View Article

Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Tanium CEO admits using real hospital data in...

Enlarge/ Orion Hindawi, co-founder and chief technology officer of Tanium Inc. (credit: Getty Images/Bloomberg)Following a report by The Wall Street Journal that the security vendor Tanium used a...

View Article

Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Chrome, Firefox, and Opera users beware: This...

Enlarge/ This is how a Chrome 57 displays https://www.xn--80ak6aa92e.com/. Note the https://www.apple.com in the address bar. If you're using Chrome, Firefox, or Opera to view websites, you should be...

View Article


Fortinet FortiGuard Blog: Remote Password Change Vulnerability in HPE Vertica...

Summary On March 24 2017, I discovered and reported on a remote password change vulnerability in Hewlett-Packard Enterprise’s (HPE) Vertica Analytic Database. This week, HPE released Security Bulletin...

View Article

Image may be NSFW.
Clik here to view.

/dev/random: Archive.org Abused to Deliver Phishing Pages

The Internet Archive is a well-known website and more precisely for its “WaybackMachine” service. It allows you to search for and display old versions of websites. The current Alexa ranking is 262...

View Article


SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Friday, April...

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: ¿Cómo están las protecciones contra...

Los cibercriminales usan las técnicas que más beneficios económicos les generen, sin importar que esta técnica sea antigua. Siempre que siga siendo efectiva será usada para obtener sus objetivos. Este...

View Article


SANS Internet Storm Center, InfoCON: green: Analysis of a Maldoc with...

Thanks to our readers, we get often interesting samples to analyze. This time, Frederick sent us a malicious Microsoft Word document called Invoice_6083.doc (which was delivered in a zip archive). I...

View Article

Lost In Security: El último superviviente (II) - iOS

En el pasado artículo estuvimos revisando los puntos débiles que tiene un malware a la hora de sobrevivir un reinicio del sistema, y nos centramos en OSX. Ahora toca el turno a iOS, que al ser una...

View Article

Image may be NSFW.
Clik here to view.

KPNC: vulnerability in… WinCalc (Win7, x64)

I will never go out of business in this country. thanks to Microsoft. who would have thought that wincalcis vulnerable? I have not checked all systems yet, so this is my configuration: Windows 7...

View Article
Browsing all 12054 articles
Browse latest View live