je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie - This domain may be for sale! - 27 min 48 sek zpět
Click here for more information

Find the best information and most relevant links on all topics related to
Kategorie: Hacking & Security - This domain may be for sale!

The H Security - 57 min 46 sek zpět
Click here for more information

Find the best information and most relevant links on all topics related to
Kategorie: Hacking & Security

Leaked NSA Hacking Tools Being Used to Hack Thousands of Vulnerable Windows PCs

The Hacker News - 22 Duben, 2017 - 17:13
Script kiddies and online criminals around the world have reportedly started exploiting NSA hacking tools leaked last weekend to compromise hundreds of thousands of vulnerable Windows computers exposed on the Internet. Last week, the mysterious hacking group known as Shadow Brokers leaked a set of Windows hacking tools targeting Windows XP, Windows Server 2003, Windows 7 and 8, and Windows
Kategorie: Hacking & Security

SMSVova Spyware Hiding in ‘System Update’ App Ejected From Google Play Store

Threatpost - 22 Duben, 2017 - 14:00
An Android app that falsely claimed to be a tool for keeping smartphones up-to-date with the latest version of the OS was found surreptitiously tracking the physical location of it users using spyware called SMSVova.
Kategorie: Hacking & Security

US Court Sentences Russian Lawmaker's Son to 27 Years in Jail for Hacking

The Hacker News - 22 Duben, 2017 - 12:25
The son of a prominent Russian lawmaker was sentenced on Friday by a US federal court to 27 years in prison after being convicted of stealing millions of US credit card numbers and causing some $170 million in damages to businesses and individuals. This sentence is so far the longest sentence ever imposed in the United States for a hacking-related case. Roman Valeryevich Seleznev, 32, the
Kategorie: Hacking & Security

Americký soud poslal ruského hackera na 27 let do vězení - bezpečnost - 22 Duben, 2017 - 11:37
Soud v americkém Seattlu v pátek poslal na 27 let do vězení ruského hackera Romana Selezňova, který internetovými krádežemi kreditních karet a dalšími online podvody způsobil škody ve výši 169 milionů dolarů (4,2 miliardy korun). Podle amerických právníků jde o zatím nejvyšší trest, který byl v USA za podobné zločiny vyměřen.
Kategorie: Hacking & Security

Russian man gets longest-ever US hacking sentence, 27 years in prison

Ars Technica - 22 Duben, 2017 - 02:19

Images of Seleznev with stacks of cash were found on his laptop following his 2014 arrest in the Maldives. (credit: Department of Justice)

Russian hacker Roman Seleznev was sentenced to 27 years in prison today. He was convicted of causing more than $169 million in damage by hacking into point-of-sale computers.

Seleznev, aka "Track2," would hack into computers belonging to both small businesses and large financial institutions, according to prosecutors. He was arrested in the Maldives in 2014 with a laptop that had more than 1.7 million credit card numbers. After an August 2016 trial, Seleznev was convicted on 38 counts, including wire fraud, intentional damage to a protected computer, and aggravated identity theft.

The sentence is quite close to the 30 years that the government asked for. Prosecutors said Seleznev deserved the harsh sentence because he was "a pioneer" who helped grow the market for stolen credit card data and because he "became one of the most revered point-of-sale hackers in the criminal underworld."

Read 6 remaining paragraphs | Comments

Kategorie: Hacking & Security

>10,000 Windows computers may be infected by advanced NSA backdoor

Ars Technica - 21 Duben, 2017 - 22:12

Enlarge / A script scanning the Internet for computers infected by DoublePulsar. On the left, a list of IPs Shodan detected having the backdoor installed. On the right are pings used to manually check if a machine is infected. (credit: Dan Tentler)

Security experts believe that tens of thousands of Windows computers may have been infected by a highly advanced National Security Agency backdoor. The NSA backdoor was included in last week's leak by the mysterious group known as Shadow Brokers.

DoublePulsar, as the NSA implant is code-named, was detected on more than 107,000 computers in one Internet scan. That scan was performed over the past few days by researchers from Binary Edge, a security firm headquartered in Switzerland. Binary Edge has more here. Separate mass scans, one done by Errata Security CEO Rob Graham and another by researchers from Below0day, detected roughly 41,000 and 30,000 infected machines, respectively. To remain stealthy, DoublePulsar doesn't write any files to the computers it infects. This design prevents it from persisting after an infected machine is rebooted. The lack of persistence may be one explanation for the widely differing results.


Read 5 remaining paragraphs | Comments

Kategorie: Hacking & Security

Skype Fixes ‘SPYKE’ Credential Phishing Remote Execution Bug

Threatpost - 21 Duben, 2017 - 22:00
Microsoft fixed a bug in Skype last month that could have allowed an attacker to execute code on the system it was running on, phish Skype credentials and crash the application.
Kategorie: Hacking & Security

News in brief: Google Home gets smarter; Hackers target South Korean missiles; Harry Huskey dies

Sophos Naked Security - 21 Duben, 2017 - 19:56
Your daily round-up of some of the other stories in the news

Multiple security holes discovered in Linksys routers

Sophos Naked Security - 21 Duben, 2017 - 19:55
As with every router vulnerability, a key issue is, “How many owners will hear about the issue and bother to update?”

Researchers claim China trying to hack South Korea missile defense efforts

Ars Technica - 21 Duben, 2017 - 17:33

Enlarge / South Korea is deploying Lockheed Martin's THAAD missile defense system, and that's sparked the ire of the Chinese government, as well as military and "hacktivist" hacking groups, according to FireEye. (credit: US Army)

Chinese government officials have been very vocal in their opposition to the deployment of the Terminal High-Altitude Air Defense (THAAD) system in South Korea, raising concerns that the anti-ballistic missile system's sensitive radar sensors could be used for espionage. And according to researchers at the information security firm FireEye, Chinese hackers have transformed objection to action by targeting South Korean military, government, and defense industry networks with an increasing number of cyberattacks. Those attacks included a denial of service attack against the website of South Korea's Ministry of Foreign Affairs, which the South Korean government says originated from China.

FireEye's director of cyber-espionage analysis John Hultquist told the Wall Street Journal that FireEye had detected a surge in attacks against South Korean targets from China since February, when South Korea announced it would deploy THAAD in response to North Korean missile tests. The espionage attempts have focused on organizations associated with the THAAD deployment. They have included "spear-phishing" e-mails carrying attachments loaded with malware along with "watering hole" attacks that put exploit code to download malware onto websites frequented by military, government, and defense industry officials.

FireEye claims to have found evidence that the attacks were staged by two groups connected to the Chinese military. One, dubbed Tonto Team by FireEye, operates from the same region of China as previous North Korean hacking operations. The other is known among threat researchers as APT10, or "Stone Panda"—the same group believed to be behind recent espionage efforts against US companies lobbying the Trump administration on global trade. These groups have also been joined in attacks by two "patriotic hacking" groups not directly tied to the Chinese government, Hultquist told the Journal—including one calling itself "Denounce Lotte Group" targeting the South Korean conglomerate Lotte. Lotte made the THAAD deployment possible through a land swap with the South Korean government.

Read on Ars Technica | Comments

Kategorie: Hacking & Security

Threatpost News Wrap, April 21, 2017

Threatpost - 21 Duben, 2017 - 17:20
Last Friday's ShadowBrokers dump, Microsoft ditching passwords, and a new car dongle hack are all discussed.
Kategorie: Hacking & Security

Google Pleads for Better Cross-Border Exchange of Digital Evidence

Threatpost - 21 Duben, 2017 - 16:30
Google asked for MLAT reform, and released its biannual Transparency Report revealing it received a record number of government requests for user data.
Kategorie: Hacking & Security

UK government reports on business breaches and it’s not pretty

Sophos Naked Security - 21 Duben, 2017 - 15:40
Almost half have experienced a cyber attack while a third do not have anyone at board level tasked with cyber security.

Mirai and Hajime Locked Into IoT Botnet Battle

Threatpost - 21 Duben, 2017 - 15:26
A white hat hacker is believed responsible for the Hajime IoT botnet because its main objective appears to be to secure IoT devices vulnerable to the notorious Mirai malware.
Kategorie: Hacking & Security

Microsoft: velký update pro Windows vydáme každý březen a září - bezpečnost - 21 Duben, 2017 - 14:03
Pravidelné velké updaty systému slíbil Microsoft dlouho před příchodem samotných Windows 10, nicméně v posledním blogpostu upřesňuje přesný plán. Podle něj budou velké aktualizace uživatelům doručovány dvakrát ročně vždy ve stejné měsíce. Zatámco Anniversary Update dorazil minulý rok v srpnu a ...
Kategorie: Hacking & Security

Domain Fronting

InfoSec Institute Resources - 21 Duben, 2017 - 14:00

In this article, we are going to learn about a very interesting and powerful technique known as Domain Fronting which is a circumvention technique based on HTTPS that hides the true destination from the censor. What is Domain Fronting? Domain fronting is a technique to circumvent the censorship employed for certain domains(censorship may be for […]

The post Domain Fronting appeared first on InfoSec Resources.

Kategorie: Hacking & Security

Top 10 Open-Source Security Tools Released by Tech Giants

InfoSec Institute Resources - 21 Duben, 2017 - 14:00

We have always wondered how tech giants have been able to keep their security so tight? Do they use the same tools that are available for the rest of us? Alternatively, they have allocated a small portion of their massive resources dedicated to coming up with something different? Finally, we have our answers. Many tech […]

The post Top 10 Open-Source Security Tools Released by Tech Giants appeared first on InfoSec Resources.

Kategorie: Hacking & Security

Navy and Marines crack down on nude photo sharing

Sophos Naked Security - 21 Duben, 2017 - 12:23
The crackdown on nonconsensual nudes follows the discovery of the private Facebook group "Marines United"
Syndikovat obsah