Monthly Archives: August 2015

Around 9 in 10 Brits Don’t Secure Devices when Connecting to WiFi Abroad

Intel Security encourages those travelling abroad to think ‘Slip-Slap-Slop-Secure’ to stay safe this summer. Nearly half (47%) do not know how to protect their devices when connecting to an open Wi-Fi network when abroad Over a third (38%) of respondents … Continue reading

Posted in Cyber Security, Vulnerabilidad | Tagged | Leave a comment

Top British Hacker For ISIS Junaid Hussain Killed in US Drone Strike

A British computer hacker, an ex-TeaMp0isoN member and a member of the so-called Islamic State (IS, previously ISIS/ISIL) believed to be killed in a recent drone air strike by the United States in Syria. The hacker was a British-bornJunaid Hussain and had been accused … Continue reading

Posted in Cyber Security | Tagged , | Leave a comment

Yet another Android Trojan spies on Chinese users

Recently, Doctor Web security researchers have detected and examined a new Android Trojan named Android.Backdoor.260.origin. This malicious program is distributed among Chinese users and is intended to spy on its victims. In particular, the Trojan can intercept SMS messages, record … Continue reading

Posted in Malware | Tagged , | Leave a comment

Researchers Uncover New Italian RAT uWarrior

Details have come to light about a new remote access Trojan called uWarrior that arrives embedded in a rigged .RTF document. Researchers with Palo Alto Networks’ research division, Unit 42, described the malware and how it appears to have emanated from an … Continue reading

Posted in Cyber Security, Malware | Tagged , | Leave a comment

High-heeled hacker builds pen-test kit into her skyscraper shoes

Mildly NSFW A Chinese hardware hacker has hidden a penetration-testing toolkit into her high-heeled shoes. The Wi-Fi-popping platforms were forged in a 3D printer, and contain compartments to smuggle hacking hardware past strict security checks in data centres and the … Continue reading

Posted in Cyber Security, Pentest | Tagged , , , | Leave a comment

Diferencia entre La validación de dominio vs validación extendida

CA es una autoridad de certificación como DigiCert, Comodo, Symantec, GoDaddy, GlobalSign, etc. Sus certificados ya vienen equipados con el sistema operativo y el navegador (consulte / etc/ssl/certs Si estás en Linux). Los mecanismos de revocación se llaman CRL y … Continue reading

Posted in Cyber Security, Software Testing company in Mexico | Tagged , , | Leave a comment

Ashley Madison Hackers: We Still Have 300GB of Data

In an interview with Motherboard, The Impact Team, the hacking group that broke into the Ashley Madison dating site has revealed it still has 300GB of data that it still hasn’t released. When the Ashley Madison hack happened in July, … Continue reading

Posted in Cyber Security | Tagged | Leave a comment

Hacking Sony PS4’s security

Analysis of PS4’s security and the state of hacking Since there haven’t been any major public announcements regarding PS4 hacking for a long time now, I wanted to explain a bit about how far PS4 hacking has come, and what … Continue reading

Posted in Cyber Security, Pentest, Pruebas de Software | Tagged | Leave a comment

Diagnosing the Details of a Malware Infection

We are constantly reading of targeted attacks and personal home computers being under the threat of malware infection. While these occurrences may sound like a single event, in reality, a malware infection encapsulates multiple stages that have been developed and … Continue reading

Posted in Cyber Security, Malware | Tagged | Leave a comment

Jacksonville-based Web.com hacked, credit card information of 93,000 customers compromised

Jacksonville-based Web.com reported a breach in one of its computer systems that may have compromised the credit card information of approximately 93,000 customers, according to a filing the company has made to the Securities and Exchange Commission. The breach happened … Continue reading

Posted in Cyber Security, Vulnerabilidad | Tagged | Leave a comment