Quantcast
Channel: eternal-todo.com aggregator
Browsing all 12054 articles
Browse latest View live

SANS Internet Storm Center, InfoCON: green: BGP Hijacking: The Internet is...

The Internet is a network of networks. Each Autonomous system (AS) connects to the internet using a router that speaks the Border Gateway Protocol (BGP) to disseminate and receive routing information....

View Article


Fortinet FortiGuard Blog: Staying Compliant in Financial Services and How...

Today’s cybersecurity threats target all parts of the network and nearly every device attached to it, making the potential threat landscape virtually boundless. When you pair technically skilled...

View Article


Image may be NSFW.
Clik here to view.

Darknet - The Darkside: pemcracker – Tool For Cracking PEM Files

pemcracker is a tool for cracking PEM files that are encrypted and have a password. The purpose is to attempt to recover the password for encrypted PEM files while utilising all the CPU cores. Inspired...

View Article

Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Russian-controlled telecom hijacks financial...

Enlarge/ A map that visualizes network changes being announced by Rostelecom. (credit: BGPmon)On Wednesday, large chunks of network traffic belonging to MasterCard, Visa, and more than two dozen other...

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Y con Siri "sí, no, no, sí, sí" puedes...

Tal vez el título de este artículo te ha dejado un poco extrañado, pero esto es exactamente lo que yo sentí cuando intenté comprobar cómo funciona el control de Siri sobre Facebook. O lo que es lo...

View Article


Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Lawsuit: Fox News group hacked, surveilled,...

Andrea Tantaros claims that she was stalked and harassed by multiple Twitter accounts that were coordinated by Fox News executives after she filed a sexual harassment suit. Her new lawsuit also claims...

View Article

SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Friday, April...

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article

SANS Internet Storm Center, InfoCON: green: Another Day, Another Obfuscation...

We got many samples from our readers and wethank them for this. It helps us to find how attackers are improving their techniques to bypass security controls and to fool the victims. Often the provided...

View Article


honeyblog: 2011 Honeynet Project Security Workshop Slides + Videos

The slides and videos from the 2011 Honeynet Project Security Workshop (Paris) are now available! You can get the material from http://www.honeynet.org/SecurityWorkshops/2011_Paris. About the...

View Article


Lost In Security: Españoles por la BlackHat

Siguiendo con la estela del artículo publicado 'Españoles por la Phrack', vuelvo a la carga con un artículo parecido, pero en este caso sobre una de las conferencias de seguridad que más conoce la...

View Article

Lost In Security: El último superviviente (II) - iOS

En el pasado artículo estuvimos revisando los puntos débiles que tiene un malware a la hora de sobrevivir un reinicio del sistema, y nos centramos en OSX. Ahora toca el turno a iOS, que al ser una...

View Article

Image may be NSFW.
Clik here to view.

KPNC: vulnerability in… WinCalc (Win7, x64)

I will never go out of business in this country. thanks to Microsoft. who would have thought that wincalcis vulnerable? I have not checked all systems yet, so this is my configuration: Windows 7...

View Article

Fortinet FortiGuard Blog: Executive Insights: Achieving Digital Trust in a...

Cybersecurity is at a critical tipping point.  With massive volumes of data being generated and analyzed across the globe every day from a variety of sources and devices, an entirely new approach to...

View Article


Image may be NSFW.
Clik here to view.

Darknet - The Darkside: Hajime Botnet Reaches 300,000 Hosts With No Malicious...

This is not the first IoT heavy botnet, Mirai takes that title, the interesting part is the Hajime botnet appears to be benign. So far no malicious functions have been detected in the codebase, other...

View Article

SANS Internet Storm Center, InfoCON: green: KNOW before NO, (Fri, Apr 28th)

A good friend told me that anengagedinformation security professional is one wholeads with the KNOW instead of the NO. This comment struck me and has resonated wellfor the lastseveral years. It...

View Article


Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Vente a crear tecnología con nosotros en...

Este mes de AbrilElevenPaths ha cumplido cuatro años, y dentro de poco hará un año desde que me nombraron Chief Data Officer en Telefónica, para que me ocupara de los proyectos de Big Data en la casa,...

View Article

:

View Article


Image may be NSFW.
Clik here to view.

McAfee Avert Labs: Taking a Look at W32/Ramnit

Today we’re going to take a look at an interesting file-infector virus. W32/Ramnit infects EXE, DLL and HTML files. That last one is right; W32/Ramnit also infects HTML files to replicate itself.Let’s...

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Eventos, conferencias y cursos del 3 al 6...

A pesar de que la semana que viene es un tanto extraña por el puente de vacaciones en el que estamos inmersos, hay algunas actividades que van a tener lugar en esos días, y en concreto yo voy a...

View Article

Image may be NSFW.
Clik here to view.

Un informático en el lado del mal: Cómo las invitaciones a grupos de...

La privacidad de tu WhatsApp comienza con tu número de teléfono. Con él se crea tu cuenta y a él van asociadas cosas como tu estado, como tu foto o tu mensaje por defecto. Además, por ser el...

View Article
Browsing all 12054 articles
Browse latest View live