Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

Are you a Sysadmin? Find out now for free!

Sophos Naked Security - 2 hodiny 13 min zpět
Even on #SysAdminDay, it's hard to get agreement on who is a sysadmin. NO PROBLEM: our 5-question quiz will find out the truth at once.

Police crack seized phones of inauguration day protesters

Sophos Naked Security - 2 hodiny 17 min zpět
The unencrypted devices have offered up a bonanza of data to police - what would your phone reveal about you?

Facebook joins heavy hitters to fund group standing up to post-truth

Sophos Naked Security - 4 hodiny 7 min zpět
Facebook is joining executives from Google as well as former head of the NSA and Hillary Clinton, among others, to support the body that looks like a version 2.0 upgrade to fact-checking

Shorting-For-Profit Viable Business Model For Security Community

Threatpost - 5 hodin 16 min zpět
MedSec CEO Justine Bone said shorting companies to profit off discovered vulnerabilities is a viable business model for the security community.
Kategorie: Hacking & Security

Today’s the day – celebrate your sysadmin superheroes!

Sophos Naked Security - 5 hodin 26 min zpět
We've barely put away the bunting from last year's Sysadmin Day and it's come round again - join us in celebrating our superheroes!

Going on holiday? Here are our tips for a security-minded trip

Sophos Naked Security - 5 hodin 42 min zpět
From taking care with hotel WiFi to keeping your cellphone safe, we've got some advice as you head off on holiday

How Hackers Cash Out Thousands of Bitcoins Received in Ransomware Attacks

The Hacker News - 7 hodin 20 min zpět
Digital currencies have emerged as a favourite tool for hackers and cyber criminals, as digital currency transactions are nearly anonymous, allowing cyber criminals to use it in underground markets for illegal trading, and to receive thousands of dollars in ransomware attacks—WannaCry, Petya, LeakerLocker, Locky and Cerber to name a few. Also, every other day we hear about some incidents of
Kategorie: Hacking & Security

Bitcoin Exchange Operator Arrested For $4 Billion Money Laundering Scheme

The Hacker News - 7 hodin 1 min zpět
Greece police have arrested a Russian man who is believed to have been the operator of the popular BTC-e Bitcoin exchange on charges of laundering more than $4 billion in bitcoin for culprits involved in hacking attacks, tax fraud and drug trafficking. A United States jury indicted 38-year-old Alexander Vinnik on Wednesday after his arrest in Greece on Tuesday at the request of US law
Kategorie: Hacking & Security

How to hack a Sysadmin – jump the IT support queue every time!

Sophos Naked Security - 7 hodin 39 min zpět
Celebrate #SysAdminDay by learning how to win friends and influence syadmins - and how to jump those pesky IT queues.

Privacy Isn't Dead. It's More Popular Than Ever

LinuxSecurity.com - 7 hodin 49 min zpět
LinuxSecurity.com: One out of every seven people on the planet uses the messaging app WhatsApp every day, according a recent blog post from the company. A billion people a day send messages to their friends and family on a service that's end-to-end encrypted by default, up from a billion per month last year.
Kategorie: Hacking & Security

'SambaCry' malware scum return with a Windows encore

LinuxSecurity.com - 7 hodin 52 min zpět
LinuxSecurity.com: Malware authors continue to chip away at Samba bugs similar to those that helped spread WannaCry/WannaCrypt.
Kategorie: Hacking & Security

How a Bug in an Obscure Chip Exposed a Billion Smartphones to Hackers

LinuxSecurity.com - 7 hodin 53 min zpět
LinuxSecurity.com: If you haven't updated your iPhone or Android device lately, do it now. Until very recent patches, a bug in a little-examined Wi-Fi chip would have allowed a hacker to invisibly hack into any one of a billion devices. Yes, billion with a b.
Kategorie: Hacking & Security

The Concept of Mobile Phone

InfoSec Institute Resources - 16 hodin 45 min zpět

INTRODUCTION The digital forensic community is striving hard to stay abreast of the current state of the art in the constantly changing technologies which we use to expose relevant clues in a probe. Mobile devices are used by almost every person today for both personal and professional means, hence carry a significant value. All sorts […]

The post The Concept of Mobile Phone appeared first on InfoSec Resources.

Kategorie: Hacking & Security

Attack Uses Docker Containers To Hide, Persist, Plant Malware

Threatpost - 17 hodin 6 min zpět
Abuse of the Docker API allows remote code execution on targeted system, which enables hackers to escalate and persists thanks to novel attacks called Host Rebinding Attack and Shadow Containers.
Kategorie: Hacking & Security

The Bottom Line – Security Awareness Training as a Revenue Generator

InfoSec Institute Resources - 27 Červenec, 2017 - 23:45

One of the roadblocks that IT managers often encounter when trying to implement IT security awareness training initiatives is justifying expenses associated with the program. Businesses live and die by return on investment (ROI) and rightfully so. Executives insist upon proof that any outlay of resources will have a positive impact on the bottom line. […]

The post The Bottom Line – Security Awareness Training as a Revenue Generator appeared first on InfoSec Resources.

Kategorie: Hacking & Security

What You Need to Know When Prepping for the PMP

InfoSec Institute Resources - 27 Červenec, 2017 - 22:39

The registration process for the PMP examination is pretty straightforward, but it is not uncommon for people wishing to take the project management examination to be confused about how to go about registering. Based on experience and frequently asked questions, this article aims to provide answers to some of the most commonly asked questions about […]

The post What You Need to Know When Prepping for the PMP appeared first on InfoSec Resources.

Kategorie: Hacking & Security

ShadowBrokers Remain an Enigma

Threatpost - 27 Červenec, 2017 - 21:31
As we approach the first anniversary of the ShadowBrokers, their true identity and source of their stolen NSA exploits remains a mystery.
Kategorie: Hacking & Security

News in brief: US indicts Russian BTC-e ‘mastermind’; Blu still phoning home; bug bounty offers $250k

Sophos Naked Security - 27 Červenec, 2017 - 19:55
Your daily round-up of some of the other stories in the news

Ukradnou peníze, aniž by si toho někdo všimnul. Podvodníci chystají nový útok

Novinky.cz - bezpečnost - 27 Červenec, 2017 - 19:51
Počítačoví piráti neustále hledají cesty, jak přelstít uživatele a připravit je o peníze. Přesně k tomu slouží i nově objevený škodlivý kód zvaný NukeBot. Ten nejprve ukradne přihlašovací údaje k internetovému bankovnictví, aby následně mohli kyberzločinci účet vysát. Aniž by si toho někdo všimnul. Upozornili na to bezpečnostní experti antivirové společnosti Kaspersky Lab.
Kategorie: Hacking & Security

Stealthy Google Play apps recorded calls and stole e-mails and texts

Ars Technica - 27 Červenec, 2017 - 19:22

Enlarge (credit: portal gda)

Google has expelled 20 Android apps from its Play marketplace after finding they contained code for monitoring and extracting users' e-mail, text messages, locations, voice calls, and other sensitive data.

The apps, which made their way onto about 100 phones, exploited known vulnerabilities to "root" devices running older versions of Android. Root status allowed the apps to bypass security protections built into the mobile operating system. As a result, the apps were capable of surreptitiously accessing sensitive data stored, sent, or received by at least a dozen other apps, including Gmail, Hangouts, LinkedIn, and Messenger. The now-ejected apps also collected messages sent and received by Whatsapp, Telegram, and Viber, which all encrypt data in an attempt to make it harder for attackers to intercept messages while in transit.

The apps also contained functions allowing for:

Read 5 remaining paragraphs | Comments

Kategorie: Hacking & Security
Syndikovat obsah