Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

Hackeři loni způsobili ruským bankám škodu až 1,35 miliardy rublů

Novinky.cz - bezpečnost - 17 Únor, 2018 - 20:39
Škoda způsobená ruským bankám a platebním systémům vinou hackerských útoků mohla loni dosahovat částky až 1,35 miliardy rublů (485 miliónů korun). Oznámilo to bezpečnostní oddělení ruské centrální banky. Zaznamenáno bylo mimo jiné osm útoků, při nichž pachatelé zvyšovali kreditní limity bankovních karet, a ukradli pak celkem 950 miliónů rublů.
Kategorie: Hacking & Security

The Top 25+ Information Security Events and Conferences of 2018

InfoSec Institute Resources - 17 Únor, 2018 - 20:01

Information security (InfoSec) conferences are a great way to become familiar with new developments and later trends in technology, as well as be made aware of the recent products and services to tackle today’s challenges arising from network weaknesses. They are also an occasion to share knowledge and tips with other professionals in the field, […]

The post The Top 25+ Information Security Events and Conferences of 2018 appeared first on InfoSec Resources.

The Top 25+ Information Security Events and Conferences of 2018 was first posted on February 17, 2018 at 1:01 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Learn Ethical Hacking Online — 9 Courses At Lowest Price Ever

The Hacker News - 17 Únor, 2018 - 19:54
How to become a Professional Hacker? This is one of the most frequently asked queries we came across on a daily basis. Do you also want to learn real-world hacking techniques but don’t know where to start? This week's THN deal is for you. Today THN Deal Store has announced a new Super-Sized Ethical Hacking Bundle that let you get started your career in hacking and penetration testing
Kategorie: Hacking & Security

Top Ten Information Security Thought Leaders

InfoSec Institute Resources - 17 Únor, 2018 - 19:27

Living in an information age can be daunting. Even if you manage to cut out the noise of social media, and the unceasing barrage of ads, there is still an element of digital dependence that can torment you. We rely so heavily on the World Wide Web in daily life – everything from accessing our […]

The post Top Ten Information Security Thought Leaders appeared first on InfoSec Resources.

Top Ten Information Security Thought Leaders was first posted on February 17, 2018 at 12:27 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Top Five Open Source Intelligence (OSINT) Tools

InfoSec Institute Resources - 17 Únor, 2018 - 18:01

In this article, we will look at top five Open Source Intelligence tools. Before we jump directly on tools, it is essential to understand what is Open Source Intelligence(OSINT) and how it can benefit researchers/malware actors/organizations, etc. What is OSINT? Open Source Intelligence(OSINT) refers to a collection of data from public sources to be used […]

The post Top Five Open Source Intelligence (OSINT) Tools appeared first on InfoSec Resources.

Top Five Open Source Intelligence (OSINT) Tools was first posted on February 17, 2018 at 11:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

The Top 5 Penetration Testing Tools and Their Reporting Features

InfoSec Institute Resources - 17 Únor, 2018 - 17:29

Introduction In the Cybersecurity world today, there is one methodology that has proven to be quite effective in determining the security vulnerabilities of any business entity: Penetration Testing. It can be explicitly defined as follows: “It is the practice of testing a computer system, network, or web application, to find the vulnerabilities that an attacker […]

The post The Top 5 Penetration Testing Tools and Their Reporting Features appeared first on InfoSec Resources.

The Top 5 Penetration Testing Tools and Their Reporting Features was first posted on February 17, 2018 at 10:29 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

The Top Ten IoT Vulnerabilities

InfoSec Institute Resources - 17 Únor, 2018 - 14:38

Kevin Ashton coined the phrase the “Internet of Things” (also known as “IoT”) back in 1999. This term represented the concept of a massive system where everyday appliances would communicate with each other through omnipresent sensors. Since then, consumers have connected smart devices amongst one another at an exponential rate. By 2020, there are estimates […]

The post The Top Ten IoT Vulnerabilities appeared first on InfoSec Resources.

The Top Ten IoT Vulnerabilities was first posted on February 17, 2018 at 7:38 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

32 lawsuits filed against Intel over Spectre and Meltdown flaws

Ars Technica - 16 Únor, 2018 - 21:42

Enlarge / This may become the new default imagery for Spectre and Meltdown around Intel. (credit: Brian Turner / Flickr)

In its annual SEC filing, Intel has revealed that it's facing 32 lawsuits over the Spectre and Meltdown attacks on its processors. While the Spectre problem is a near-universal issue faced by modern processors, the Meltdown attack is specific to processors from Intel and Apple, along with certain ARM designs that are coming to market shortly.

Per Intel's filing, 30 of the cases are proposed customer class-action suits from users claiming to be harmed by the flaws. While Meltdown has effective workarounds, they come with some performance cost. Workarounds for Spectre are more difficult and similarly can harm system performance.

The other two cases are securities lawsuits that claim that Intel made misleading public statements during the six-month period after the company was notified of the problems but before the attacks were made public.

Read 2 remaining paragraphs | Comments

Kategorie: Hacking & Security

PowerShell Language Modes-Part 1

InfoSec Institute Resources - 16 Únor, 2018 - 21:28

In this article, we will discuss various PowerShell language modes. In Part 1 we will look at all the basics around PowerShell language and its various types. In Part 2 we will look at some of the bypasses which have been discovered in the previous version of Windows. What is Language Mode and its types? […]

The post PowerShell Language Modes-Part 1 appeared first on InfoSec Resources.

PowerShell Language Modes-Part 1 was first posted on February 16, 2018 at 2:28 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Privacy Concerns About Emotional Chatbots

InfoSec Institute Resources - 16 Únor, 2018 - 21:11

Introduction Artificial Intelligence (AI) is evolving at an enormous speed and takes an increasingly more substantial part of our everyday life (think of the fully commercialized transactional robots Siri or Alexa as well intelligent agents in healthcare, automotive, and gaming industries). Being a classical representation of high-level machine intelligence, humanized, fully responsive machines perceiving and […]

The post Privacy Concerns About Emotional Chatbots appeared first on InfoSec Resources.

Privacy Concerns About Emotional Chatbots was first posted on February 16, 2018 at 2:11 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Consequences of the Late Announcement of Cyber-security Incidents

InfoSec Institute Resources - 16 Únor, 2018 - 20:57

Introduction Cyber-security attacks that are becoming more and more common among various types and sizes of organizations may have serious effects on electronic communication networks, provision of services, and national security. Although significant breaches that affect many users or extensively disrupt the functioning of an organization usually receive extensive media coverage, smaller security incidents may […]

The post Consequences of the Late Announcement of Cyber-security Incidents appeared first on InfoSec Resources.

Consequences of the Late Announcement of Cyber-security Incidents was first posted on February 16, 2018 at 1:57 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Apple Rushes Fix for Latest ‘Text Bomb’ Bug As Abuse Spreads

Threatpost - 16 Únor, 2018 - 20:44
Apple said it is working on a fix for the latest text bomb bug that crashes a number of iOS and Mac apps that display specific Telugu language characters.   
Kategorie: Hacking & Security

Telegram IM security flaw – what you see is NOT always what you get

Sophos Naked Security - 16 Únor, 2018 - 19:23
Crooks revived an old visual trick to disguise files that would otherwise look dangerous right away.

Google’s big plans for email will give it even more power

Sophos Naked Security - 16 Únor, 2018 - 15:59
Google's about to make your inbox a much more interesting place

Nová verze démona Quagga 1.2.3

CSIRT.cz - 16 Únor, 2018 - 14:42
Kategorie: Hacking & Security

Security Considerations Surrounding CryptoMining as a Service

InfoSec Institute Resources - 16 Únor, 2018 - 14:00

Virtual Currency Mining Undoubtedly, one of the more interesting news stories to follow over the last year has been the rise (and currently: the fall) of cryptocurrencies. Bitcoin, of course, is the best-known variety, but other currencies such as Litecoin (up about 8000%), ripple (up over 10,000%) and Ethereum (up about 8500%) also saw a […]

The post Security Considerations Surrounding CryptoMining as a Service appeared first on InfoSec Resources.

Security Considerations Surrounding CryptoMining as a Service was first posted on February 16, 2018 at 7:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Why Chrome’s ad filter isn’t an adblocker

Sophos Naked Security - 16 Únor, 2018 - 12:38
Optimistic news coverage has described this as the arrival of adblocking in Chrome, it isn't.

New EU Privacy Law May Weaken Security

LinuxSecurity.com - 16 Únor, 2018 - 12:03
LinuxSecurity.com: Companies around the globe are scrambling to comply with new European privacy regulations that take effect a little more than three months from now. But many security experts are worried that the changes being ushered in by the rush to adhere to the law may make it more difficult to track down cybercriminals and less likely that organizations will be willing to share data about new online threats.
Kategorie: Hacking & Security

Meltdown-Spectre flaws: We've found new attack variants, say researchers

LinuxSecurity.com - 16 Únor, 2018 - 11:43
LinuxSecurity.com: Researchers have developed a tool to uncover new ways of attacking the Meltdown and Spectre CPU side-channel flaws, which may force chipmakers like Intel to re-examine already difficult hardware mitigations.
Kategorie: Hacking & Security

Raw sockets backdoor gives attackers complete control of some Linux servers

LinuxSecurity.com - 16 Únor, 2018 - 11:42
LinuxSecurity.com: A stealthy backdoor undetected by antimalware providers is giving unknown attackers complete control over at least 100 Linux servers that appear to be used in business production environments, warn researchers.
Kategorie: Hacking & Security
Syndikovat obsah