Monthly Archives: November 2015

Court: Swedish ISPs can’t be forced to block Sweden’s Pirate Bay

Meanwhile, Germany says broadband providers may be liable in piracy claims. In brief ISPs in Sweden cannot be forced to block access to the Pirate Bay – the Swedish search engine used worldwide for pirating software, movies and music. The … Continue reading

Posted in Cyber Security | Tagged | Leave a comment

Book review: Network Attacks and Exploitation: A Framework

Books on hacking, defense, and attacking are very hit and miss. Matthew Monte’s new title Network Attacks and Exploitation: A Framework surpasses the “hit” category for a home run. One chapter into the book Network Attacks and Exploitation: A Frameworkby … Continue reading

Posted in Cyber Security | Tagged | Leave a comment

Reuse of Encryption Keys Plagues 9 Percent of All HTTPS Hosts on the Internet

New survey shows industry-wide bad practices when it comes to encryption, firmware design, and IoT security. Millions of IoT devices and HTTPS websites are vulnerable to private key attacks because of encryption key reuse, says SEC Consult in its most recentstudy. … Continue reading

Posted in Cyber Security | Tagged | Leave a comment

Malware tricks that you may not know about

There is a constant cat and mouse game between malware, security software companies and computer users, and the chance of one side winning the battle seems slim at best. Malwarebytes revealed recently on Malwarebytes Unpacked how Vonteera, a malware previously … Continue reading

Posted in Malware | Tagged | Leave a comment

Hilton Hotels Hit by Cyber Attack

US hotel chain Hilton revealed Tuesday that hackers stole credit card information from some of its point-of-sale computer systems. Hilton did not reveal the extent of the breach, but warned anyone who used credit cards at Hilton Worldwide hotels between … Continue reading

Posted in Cyber Security | Tagged | Leave a comment

Diferentes tipos de formatos de la imagen de un disco duro virtual

Vamos a hablar sobre formatos de disco duro virtual con ayuda de expertos de un proveedor de seguridad informática. El disco duro de una máquina virtual se implementa como los archivos, que viven en su sistema de archivo nativo de … Continue reading

Posted in Cyber Security | Tagged | Leave a comment

Criminal Ruskie BOFHs help hackers steal $790 million in three years

Twenty pro hackers grease Russia’s best crime groups. Kaspersky investigation unit boss Ruslan Stoyanov says a Russian cyber scum group of just 20 professional hackers have have made a tidy US$790 million in three years by emptying the world’s bank … Continue reading

Posted in Cyber Security | Leave a comment

Nmap 7 Brings Faster Scans, Other Improvements

Three and a half years after the release of version 6, the developers of the Nmap Security Scanner announced this week the availability of Nmap 7.0.0. Nmap, short for Network Mapper, is a free and open source tool designed for … Continue reading

Posted in Software Testing company in Mexico | Tagged | Leave a comment

PwnBin: A script for scraping Pastebin for leaked API keys, SSH credentials

Pastebins, apart from being a great help for programmers as they offer a place where one can store text online for a set period of time and share it with others, are also loved by hackers who often use them … Continue reading

Posted in Cyber Security | Leave a comment

Edgy online shoppers face Dyre Christmas as malware mutates

Bank-plundering code now hunts Windows 10 and its Edge browser. VXers have cooked up Windows 10 and Edge support for the nasty Dyre or Dyreza banking trojan. The banking bomb has ripped untold fortunes from victims and passed them into … Continue reading

Posted in Malware | Tagged , | Leave a comment