-
Archives
- May 2018
- April 2018
- March 2018
- February 2018
- December 2017
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
-
Meta
Monthly Archives: November 2015
Court: Swedish ISPs can’t be forced to block Sweden’s Pirate Bay
Meanwhile, Germany says broadband providers may be liable in piracy claims. In brief ISPs in Sweden cannot be forced to block access to the Pirate Bay – the Swedish search engine used worldwide for pirating software, movies and music. The … Continue reading
Book review: Network Attacks and Exploitation: A Framework
Books on hacking, defense, and attacking are very hit and miss. Matthew Monte’s new title Network Attacks and Exploitation: A Framework surpasses the “hit” category for a home run. One chapter into the book Network Attacks and Exploitation: A Frameworkby … Continue reading
Reuse of Encryption Keys Plagues 9 Percent of All HTTPS Hosts on the Internet
New survey shows industry-wide bad practices when it comes to encryption, firmware design, and IoT security. Millions of IoT devices and HTTPS websites are vulnerable to private key attacks because of encryption key reuse, says SEC Consult in its most recentstudy. … Continue reading
Malware tricks that you may not know about
There is a constant cat and mouse game between malware, security software companies and computer users, and the chance of one side winning the battle seems slim at best. Malwarebytes revealed recently on Malwarebytes Unpacked how Vonteera, a malware previously … Continue reading
Hilton Hotels Hit by Cyber Attack
US hotel chain Hilton revealed Tuesday that hackers stole credit card information from some of its point-of-sale computer systems. Hilton did not reveal the extent of the breach, but warned anyone who used credit cards at Hilton Worldwide hotels between … Continue reading
Diferentes tipos de formatos de la imagen de un disco duro virtual
Vamos a hablar sobre formatos de disco duro virtual con ayuda de expertos de un proveedor de seguridad informática. El disco duro de una máquina virtual se implementa como los archivos, que viven en su sistema de archivo nativo de … Continue reading
Criminal Ruskie BOFHs help hackers steal $790 million in three years
Twenty pro hackers grease Russia’s best crime groups. Kaspersky investigation unit boss Ruslan Stoyanov says a Russian cyber scum group of just 20 professional hackers have have made a tidy US$790 million in three years by emptying the world’s bank … Continue reading
Posted in Cyber Security
Leave a comment
Nmap 7 Brings Faster Scans, Other Improvements
Three and a half years after the release of version 6, the developers of the Nmap Security Scanner announced this week the availability of Nmap 7.0.0. Nmap, short for Network Mapper, is a free and open source tool designed for … Continue reading
PwnBin: A script for scraping Pastebin for leaked API keys, SSH credentials
Pastebins, apart from being a great help for programmers as they offer a place where one can store text online for a set period of time and share it with others, are also loved by hackers who often use them … Continue reading
Posted in Cyber Security
Leave a comment
Edgy online shoppers face Dyre Christmas as malware mutates
Bank-plundering code now hunts Windows 10 and its Edge browser. VXers have cooked up Windows 10 and Edge support for the nasty Dyre or Dyreza banking trojan. The banking bomb has ripped untold fortunes from victims and passed them into … Continue reading