Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

iPhone’s Apple Health data used as evidence in murder trial

Sophos Naked Security - 15 Leden, 2018 - 13:44
The data showed the suspect twice "climbed stairs": what investigators said was altitude changes as the body was dragged down to a riverbank.

Your Facebook News Feed is getting an overhaul

Sophos Naked Security - 15 Leden, 2018 - 13:37
Mark Zuckerberg says the refresh will bring users more "meaningful social interactions" and less content from media and businesses.

Desítky aplikací byly zavirované. Erotickou reklamu zobrazovaly i dětem

Novinky.cz - bezpečnost - 15 Leden, 2018 - 13:15
Společnost Check Point rozkryla rozsáhlou síť podvodných aplikací, které se nabízely ke stažení prostřednictvím obchodu Google Play pro zařízení s operačním systémem Android. Úplně všechny sloužily k jedinému účelu – na napadeném zařízení zobrazovaly reklamu na erotické weby. A to i v aplikacích určených těm nejmenším.
Kategorie: Hacking & Security

F-Secure: Počítače s procesory Intel vPro lze snadno ovládnout. Zvládne to i uklízečka

Zive.cz - bezpečnost - 15 Leden, 2018 - 12:18
Na Spectre a Meltdown se už téměř zapomnělo, a tak F-Secure přispěchal s další náloží. Tentokrát se sice nejedná o bezpečnostní chybu ve funkci samotného procesoru, ovšem o to nebezpečnější. Bezpečnostní experti se totiž podívali na funkci Active Management Technology, která na čipsetech s ...
Kategorie: Hacking & Security

Monday review – the hot 22 stories of the week

Sophos Naked Security - 15 Leden, 2018 - 10:56
From police giving out infected USBs and the ex-NSA hacker hunting hate groups’ symbols online with AI tool to Apple's Spectre fix update, and more!

Congress Renews Warrantless Surveillance-And Makes It Even Worse

LinuxSecurity.com - 15 Leden, 2018 - 10:45
LinuxSecurity.com: In 2013, Edward Snowden revealed that the National Security Agency was legally collecting millions of Americans' phone calls and electronic communications-including emails, Facebook messages, and browsing histories-without a warrant. Congress has now decided not only to reauthorize these programs, but also to expand some of their most invasive techniques.
Kategorie: Hacking & Security

The "Doublespeak" of Responsible Encryption

LinuxSecurity.com - 15 Leden, 2018 - 10:44
LinuxSecurity.com: Coined by US deputy attorney general Rod Rosenstein, responsible encryption is a new name for an old argument: that public agencies fighting crime and terrorism must have access to our private communications-for our own good. In 2016, Apple defied a court order to unlock an iPhone used by a shooter in an attack in San Bernardino, California.
Kategorie: Hacking & Security

Satori IoT Botnet Exploits Zero-Day to Zombify Huawei Routers

The Hacker News - 15 Leden, 2018 - 10:42
Although the original creators of the infamous IoT malware Mirai have already been arrested and sent to jail, the variants of the notorious botnet are still in the game due to the availability of its source code on the Internet. Hackers have widely used the infamous IoT malware to quietly amass an army of unsecured internet-of-things devices, including home and office routers, that could be
Kategorie: Hacking & Security

Wi-Fi Alliance announces WPA3 to secure modern networks

LinuxSecurity.com - 15 Leden, 2018 - 10:41
LinuxSecurity.com: The Consumer Electronics Show (CES) is an odd place to announce an enterprise product, but the Wi-Fi Alliance used the massive trade show - which has more or less taken over where Comdex left off - to announce a major upgrade to Wi-Fi security.
Kategorie: Hacking & Security

How I've captured all passwords trying to ssh into my server

LinuxSecurity.com - 14 Leden, 2018 - 10:48
LinuxSecurity.com: By default ssh logs out ssh attempts , wether they're successful or not , what it doesn't do by default is log out the passwords they've tried. So i thought it would be a good idea to slightly modify ssh to log them passwords too.
Kategorie: Hacking & Security

Fourth Fappening Hacker Admits to Stealing Celebrity Pics From iCloud Accounts

The Hacker News - 13 Leden, 2018 - 15:25
Almost three years after the massive leakage of high-profile celebrities' nude photos—well known as "The Fappening" or "Celebgate" scandal—a fourth hacker has been charged with hacking into over 250 Apple iCloud accounts belonged to Hollywood celebrities. A federal court has accused George Garofano, 26, of North Branford, of violating the Computer Fraud and Abuse Act, who had been arrested by
Kategorie: Hacking & Security

Skype Finally Adds End-to-End Encryption for Private Conversations

The Hacker News - 13 Leden, 2018 - 00:25
Good news for Skype users who are concerned about their privacy. Microsoft is collaborating with popular encrypted communication company Signal to bring end-to-end encryption support to Skype messenger. End-to-end encryption assured its users that no one, not even the company or server that transmits the data, can decrypt their messages. Signal Protocol is an open source cryptographic protocol
Kategorie: Hacking & Security

Intel AMT Loophole Allows Hackers to Gain Control of Some PCs in Under a Minute

Threatpost - 12 Leden, 2018 - 21:24
Researchers say an unprotected Management Engine BIOS Extension can allow an attacker the ability to configure Intel’s AMT feature for remote access by a hacker.
Kategorie: Hacking & Security

An Examination of the Security Threats Posed to a Mobile Wallet Infrastructure-Part 2

InfoSec Institute Resources - 12 Leden, 2018 - 20:34

Introduction It is essential to keep in mind that the use of a Mobile Wallet encompasses an entire payment infrastructure, to which it is prone to many other Security issues and vulnerabilities. Our last article started to examine these major components, as well as the threats that are posed to them. In this article, we […]

The post An Examination of the Security Threats Posed to a Mobile Wallet Infrastructure-Part 2 appeared first on InfoSec Resources.

An Examination of the Security Threats Posed to a Mobile Wallet Infrastructure-Part 2 was first posted on January 12, 2018 at 1:34 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Warning: New Undetectable DNS Hijacking Malware Targeting Apple macOS Users

The Hacker News - 12 Leden, 2018 - 18:38
A security researcher has revealed details of a new piece of undetectable malware targeting Apple's Mac computers—reportedly first macOS malware of 2018. Dubbed OSX/MaMi, an unsigned Mach-O 64-bit executable, the malware is somewhat similar to DNSChanger malware that infected millions of computers across the world in 2012. DNSChanger malware typically changes DNS server settings on infected
Kategorie: Hacking & Security

SQL Injection Protection in Cloud Systems

InfoSec Institute Resources - 12 Leden, 2018 - 17:44

SQL Injection Structural Query Language (SQL) is a language used to program and manage data in relational databases. Originating in 1986, SQL has gained so much popularity due to its practicality and ease of use that these days most databases are formed around an implementation of SQL, for instance, MySQL or Microsoft SQL Server. Databases […]

The post SQL Injection Protection in Cloud Systems appeared first on InfoSec Resources.

SQL Injection Protection in Cloud Systems was first posted on January 12, 2018 at 10:44 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Cryptocurrency as the lure, an ISO as the attachment – why not open it?

Sophos Naked Security - 12 Leden, 2018 - 17:12
Phishers are using the hot topic of cryptocurrency as a means to an end in cybercrime, not merely as the end itself...

Man charged with spying on thousands of Mac users for 13 years

Sophos Naked Security - 12 Leden, 2018 - 15:45
The technical description of the “Fruitfly” malware is spyware - but perhaps the term creepware would be more appropriate.

Apps Exposing Children to Porn Ads Booted From Google Play

Threatpost - 12 Leden, 2018 - 15:36
Researchers identified 60 apps on Google Play infected with AdultSwine malware that in some cases displayed graphic adult-themed ads on apps intended for children.
Kategorie: Hacking & Security

New Intel AMT Security Issue Lets Hackers Gain Full Control of Laptops in 30 Seconds

The Hacker News - 12 Leden, 2018 - 15:34
It's been a terrible new-year-starting for Intel. Researchers warn of a new attack which can be carried out in less than 30 seconds and potentially affects millions of laptops globally. As Intel was rushing to roll out patches for Meltdown and Spectre vulnerabilities, security researchers have discovered a new critical security flaw in Intel hardware that could allow hackers to access
Kategorie: Hacking & Security
Syndikovat obsah