Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

Personally Identifiable Information and Distributed Ledgers

InfoSec Institute Resources - 15 Červen, 2018 - 20:32

PII (personally identifiable information) is a valuable component of every individual’s life. Governments and organizations take significant efforts to protect this data on the local and international level. As information technologies evolve, though, the issue of safeguarding PII becomes increasingly complex. PII is assuming importance in the modern business processes based on the KYC (Know […]

The post Personally Identifiable Information and Distributed Ledgers appeared first on InfoSec Resources.

Personally Identifiable Information and Distributed Ledgers was first posted on June 15, 2018 at 1:32 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Federal agencies are at high information security risk

InfoSec Institute Resources - 15 Červen, 2018 - 20:20

1. Introduction Governments all over the world urge private companies to take security measures to protect the personal data of their citizens. For example, the recently adopted EU General Data Protection Regulation (GDPR) obliges organizations collecting personal data from EU residents to adopt information security measures protecting the collected information. However, governments need to be […]

The post Federal agencies are at high information security risk appeared first on InfoSec Resources.

Federal agencies are at high information security risk was first posted on June 15, 2018 at 1:20 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

SHOCK! HORROR! SURPRISE! Bitcoin priceplosion may have been market manipulation

Sophos Naked Security - 15 Červen, 2018 - 19:40
Researchers claim that Bitcoin's 2017 price spike was built on little besides hot air and dodgy dealing.

Apple iPhone’s USB Restricted Mode gives Feds a cracking headache

Sophos Naked Security - 15 Červen, 2018 - 19:08
The next version of iOS looks set to block all communication through the lightning port if the phone hasn’t been unlocked for an hour.

How a National Healthcare Provider Mitigates Spearphishing With SecurityIQ’s PhishNotify

InfoSec Institute Resources - 15 Červen, 2018 - 17:12

Executive Summary: Client: Managed healthcare service provider with clients in over 30 states. It employees 194 corporate employees and 743 clinicians. Contract Size: 900 learner seats Products Used: SecurityIQ phishing simulations, HIPAA, PHI and general awareness training modules and the PhishNotify™ suspicious email reporting plugin. Protected health information (PHI) brings a hefty price on the […]

The post How a National Healthcare Provider Mitigates Spearphishing With SecurityIQ’s PhishNotify appeared first on InfoSec Resources.

How a National Healthcare Provider Mitigates Spearphishing With SecurityIQ’s PhishNotify was first posted on June 15, 2018 at 10:12 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

SecurityIQ Update Adds CDN Capabilities, Training Link Generator and 47 New Modules!

InfoSec Institute Resources - 15 Červen, 2018 - 16:41

New SecurityIQ features include a dedicated CDN to support international teams, training link generator ensuring all of your learners have access to your awareness program, plus easily customize your courses with 47 new content resources!   Dedicated Content Delivery Network (CDN): A SecurityIQ exclusive, training modules now serve from a dedicated Content Delivery Network (CDN). […]

The post SecurityIQ Update Adds CDN Capabilities, Training Link Generator and 47 New Modules! appeared first on InfoSec Resources.

SecurityIQ Update Adds CDN Capabilities, Training Link Generator and 47 New Modules! was first posted on June 15, 2018 at 9:41 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Top Threats to Online Voting from a Cybersecurity Perspective

InfoSec Institute Resources - 15 Červen, 2018 - 16:30

Last year, NASA set up an online voting campaign to pick a name for an astronomical object, a small ice-covered asteroid roving through a remote part of the Solar system. Although the New Horizons space probe has yet to take a picture of it, thousands of people have thus learned about the newly discovered astronomical […]

The post Top Threats to Online Voting from a Cybersecurity Perspective appeared first on InfoSec Resources.

Top Threats to Online Voting from a Cybersecurity Perspective was first posted on June 15, 2018 at 9:30 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

CISSP CAT Exam Deep Dive: Study Tips from InfoSec Institute Alum Joe Wauson

InfoSec Institute Resources - 15 Červen, 2018 - 15:50

Joe Wauson is a Cyber Operations Planner at the United States Air Force. Currently based out of Germany, Joe enrolled in InfoSec Institute’s live online Certified Information Systems Security Professional (CISSP) Boot Camp to help him prepare for the new CISSP CAT exam. Time zone differences meant Joe’s class started in the afternoon and ended […]

The post CISSP CAT Exam Deep Dive: Study Tips from InfoSec Institute Alum Joe Wauson appeared first on InfoSec Resources.

CISSP CAT Exam Deep Dive: Study Tips from InfoSec Institute Alum Joe Wauson was first posted on June 15, 2018 at 8:50 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Football app tracks illegal broadcasts using your microphone and GPS

Sophos Naked Security - 15 Červen, 2018 - 15:30
La Liga is asking users for their consent to turn on the new, eavesdroppy-feeling function, but many users aren't exactly thrilled.

Forgotten your password? Don’t login at all! [Chet Chat Podcast 271]

Sophos Naked Security - 15 Červen, 2018 - 15:20
Here's the latest episode of the Chet Chat podcast. Enjoy...

GnuPG Flaw in Encryption Tools Lets Attackers Spoof Anyone's Signature

The Hacker News - 15 Červen, 2018 - 11:52
A security researcher has discovered a critical vulnerability in some of the world's most popular and widely used email encryption clients that use OpenPGP standard and rely on GnuPG for encrypting and digitally signing messages. The disclosure comes almost a month after researchers revealed a series of flaws, dubbed eFail, in PGP and S/Mime encryption tools that could allow attackers to
Kategorie: Hacking & Security

DDoS Amped Up: DNS, Memcached Attacks Rise

LinuxSecurity.com - 15 Červen, 2018 - 11:02
LinuxSecurity.com: Record-breaking distributed denial-of-service (DDoS) attacks are on a tear this year, and new data shows that DNS amplification attacks have jumped 700% worldwide since 2016.
Kategorie: Hacking & Security

23,000 Compromised in HealthEquity Data Breach

LinuxSecurity.com - 15 Červen, 2018 - 10:57
LinuxSecurity.com: Sometimes all it takes is one employee to spark a cybersecurity wildfire, as HealthEquity learned this week. The company, which handles more than 3.4 million health savings accounts, suffered a data breach when an unauthorized person accessed an employee's email account.
Kategorie: Hacking & Security

Bojíte se žraloků? Mobilní aplikace vám řekne, zda máte důvod

Zive.cz - bezpečnost - 15 Červen, 2018 - 08:00
V naší domovině je napadení žralokem vysoce nepravděpodobné, ale v mnoha zemích na světě je to hrozba, kterou není dobré brát na lehkou váhu. Například na australských plážích mohou tito mořští predátoři pro plavce a surfaře představovat opravdu vážné nebezpečí. Na potenciálním řešení pracuje ...
Kategorie: Hacking & Security

Gaining Shell Access via UART Interface Part 3

InfoSec Institute Resources - 14 Červen, 2018 - 20:00

This is the 3rd post in IoT-Hacking-Shell-via-UART series. I hope you have gone through the first two parts. If not, please go through them. In this part, I will explain how I was able to gain shell access on a smart camera via UART interface. About the Device – I already had a camera with […]

The post Gaining Shell Access via UART Interface Part 3 appeared first on InfoSec Resources.

Gaining Shell Access via UART Interface Part 3 was first posted on June 14, 2018 at 1:00 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Apple Removes iPhone USB Access Feature, Blocking Out Hackers, Law Enforcement

Threatpost - 14 Červen, 2018 - 19:27
The move escalates tensions between the phone giant and federal law enforcement when it comes to mobile security.
Kategorie: Hacking & Security

The Decline of Ransomware and the Rise of Cryptocurrency Mining Malware

InfoSec Institute Resources - 14 Červen, 2018 - 19:00

1. Introduction ISACA, an international association focused on IT governance, has recently released its annual study “State of Cybersecurity.” The study relates to the year 2018 and is based on feedback provided by 2,366 security leaders. It found that, while in the last year 62% of the respondents experienced ransomware attacks, only 45% of them […]

The post The Decline of Ransomware and the Rise of Cryptocurrency Mining Malware appeared first on InfoSec Resources.

The Decline of Ransomware and the Rise of Cryptocurrency Mining Malware was first posted on June 14, 2018 at 12:00 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

The $99 digital padlock that kept crooks out… for 2 whole seconds

Sophos Naked Security - 14 Červen, 2018 - 18:45
Thinking of designing a $99 digital padlock? Here's how NOT to do it.

Mechanics Behind Ransomware-as-a-Service

InfoSec Institute Resources - 14 Červen, 2018 - 18:30

Introduction Ransomware is an increasingly serious concern, and this problem is getting worse over time. Initially, this malware began to compromise fixed targets such as individuals, but now the focus has changed and became much broader — from individuals to organizations. Hospitals, for instance, have become under attack by cyber attackers that carried out malicious […]

The post Mechanics Behind Ransomware-as-a-Service appeared first on InfoSec Resources.

Mechanics Behind Ransomware-as-a-Service was first posted on June 14, 2018 at 11:30 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Gaining Shell Access via UART Interface Part 2

InfoSec Institute Resources - 14 Červen, 2018 - 18:00

This is the 2nd post in IoT-Hacking-Shell-via-UART series. I hope you have gone through the first part. If not, please go through it. In this post, I will cover Baud Rate, lab setup for performing UART exploitation and how one can identify UART pins for exploitation. This part aims to cover the remaining theory of […]

The post Gaining Shell Access via UART Interface Part 2 appeared first on InfoSec Resources.

Gaining Shell Access via UART Interface Part 2 was first posted on June 14, 2018 at 11:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security
Syndikovat obsah