-
Archives
- May 2018
- April 2018
- March 2018
- February 2018
- December 2017
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
-
Meta
Monthly Archives: December 2015
Google Reinstates Cyber Security Android App After Receiving Angry User Emails
Cybrary security training app reinstated on the Play Store.Google Play Store administrators have gone back on their decision to ban a cyber security training app after receiving countless emails from angry users. Cybrary is an Android app that offers offline … Continue reading
Twitter Joins Facebook’s Initiative for a Smoother SHA-1 Transition
Twitter realizes it stands to lose up to 6% of its userbase.Twitter has joined Facebook and CloudFlare in petitioning the CA/B forum to address the issue of a hastened and improperly regulated SHA-1 deprecation process for older devices/browsers, which might … Continue reading
Posted in Cyber Security
Leave a comment
PRUEBAS DE PENETRACIÓN EN EL DISPOSITIVO IPHONE SIN JAILBREAK
Para configurar una plataforma móvil de pruebas de penetración generalmente se necesita un dispositivo jailbreak iOS. Jailbreak es un proceso de eliminación de las restricciones de hardware en dispositivo iOS para proporcionar acceso root a los archivos de sistema, incluyendo … Continue reading
Darkweb, a look back at 2015 events and 2016 predictions
Which are the main events observed in the darkweb during the 2015 and what to expect in the next 12 months? The DarkWeb is a set of publicly accessible content that are hosted on websites whose IP address is hidden, … Continue reading
Anonymous Hacks Asia Pacific Telecommunity Portal to Protest Against Censorship In Asia
Anonymous takes a stand against rampant online censorship tactics in numerous Asian Pacific countries Members of the Anonymous hacker collective have defaced the Asia Pacific Telecommunity website (apt.int), gained access to the site’s admin panel (running Drupal), and also managed … Continue reading
Cisco cops to enterprise IOS XE vulnerability
Cisco’s latest operating system update ships with a vulnerability that could let hackers seize control of network devices. The giant has admitted to the hole in its IOS XE release 16.1.1 that, if exploited, would let an attacker force a … Continue reading
Megaupload founder Kim Dotcom loses fight to avoid extradition to the US
New Zealand court rules German entrepreneur will have to face trial in the United States. German tech entrepreneur Kim Dotcom hs lost a bid to block his extradition from New Zealand to the United States to face charges including copyright … Continue reading
Apple Criticizes UK’s Proposed New Spying Law: Reports
Technology company Apple criticized draft British legislation designed to stiffen surveillance powers on Monday, saying the proposed bill could “spark serious international conflicts”, British media reported. Home Secretary Theresa May said November’s Investigatory Powers Bill would make existing surveillance laws … Continue reading
1337x Admin Ignores Account Hijacking Issue, Staff Leaves Torrent Portal
Drama in the pirating community as mods leave popular 1337x torrent portal and create their own clone.An unresolved security bug has forced a large part of the 1337x staff to leave the torrent portal and start their own website from … Continue reading
Posted in Cyber Security, Software Testing company in Mexico, Vulnerabilidad
Tagged TorrentFreak
Leave a comment
Several Vulnerabilities Found in eWON Industrial Routers
A researcher has identified half a dozen vulnerabilities, including ones rated high severity by ICS-CERT, in industrial routers from eWON. eWON is a Belgium-based company that specializes in industrial VPN routers and remote connectivity solutions designed for connecting industrial machines … Continue reading
Posted in Vulnerabilidad
Leave a comment