Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

CoffeeMiner project lets you hack public Wi-Fi to mine cryptocoins

Sophos Naked Security - 10 Leden, 2018 - 00:20
Remember how we keep telling you that HTTPS is about more than just privacy? Well, here's a timely reminder why...coffeshop coin mining!

Microsoft January Patch Tuesday Update Fixes 16 Critical Bugs

Threatpost - 9 Leden, 2018 - 22:25
Thanks to Meltdown and Spectre, January has already been an extremely busy month of patching for Microsoft.
Kategorie: Hacking & Security

Wi-Fi Alliance launches WPA3 protocol with new security features

The Hacker News - 9 Leden, 2018 - 19:17
The Wi-Fi Alliance has finally announced the long-awaited next generation of the wireless security protocol—Wi-Fi Protected Access (WPA3). WPA3 will replace the existing WPA2—the network security protocol that has been around for at least 15 years and widely used by billions of wireless devices every day, including smartphones, laptops and Internet of things. However, WPA2 has long been
Kategorie: Hacking & Security

Anti-Virus Updates Required Ahead of Microsoft’s Meltdown, Spectre Patches

Threatpost - 9 Leden, 2018 - 18:43
Microsoft is pausing the rollout of Windows Meltdown and Spectre patches until hosted anti-virus software vendors confirms no unsupported Windows kernel calls via the addition of a registry key on PCs.
Kategorie: Hacking & Security

Four Steps to Third-Party Security Risk Mitigation Live Webinar

InfoSec Institute Resources - 9 Leden, 2018 - 16:47



The post Four Steps to Third-Party Security Risk Mitigation Live Webinar appeared first on InfoSec Resources.

Four Steps to Third-Party Security Risk Mitigation Live Webinar was first posted on January 9, 2018 at 9:47 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Bad docs and blue screens make Microsoft suspend Spectre patch for AMD machines

Ars Technica - 9 Leden, 2018 - 16:31

An Athlon 64 purchased in 2007. (credit: Fred)

Microsoft has suspended delivering the latest Windows update to certain systems with AMD processors after reports that the update was causing the machines to crash with a blue screen of death when booting. The update contains countermeasures against both the Meltdown and Spectre attacks; although AMD systems are not affected by Meltdown, they're vulnerable to Spectre.

Withdrawing or suspending delivery of Windows Updates is not uncommon; while there is some testing done by Microsoft, releasing things to a wider audience does from time to time unearth incompatibilities or bugs within the update. What is uncommon is that Microsoft is not merely suspending this update; the company has also outlined why. Specifically, Microsoft writes that:

After investigating, Microsoft has determined that some AMD chipsets do not conform to the documentation previously provided to Microsoft to develop the Windows operating system mitigations to protect against the chipset vulnerabilities known as Spectre and Meltdown.

This is an unusual act of buck-passing.

Read 1 remaining paragraphs | Comments

Kategorie: Hacking & Security

Aadhaar breaches fuelled by rogue admin accounts

Sophos Naked Security - 9 Leden, 2018 - 15:54
Not long ago trumpeted as the world’s largest biometric database, India’s Aadhaar system covering 1.2bn citizens is rapidly acquiring a less impressive reputation as the easiest to breach.

Understanding the Link Between Business, Operational & Security Risks

InfoSec Institute Resources - 9 Leden, 2018 - 15:51

When it comes to risk planning and mitigation, it is important for you as an information security professional to understand the difference between a security risk and a business risk. This is not to say the two terms are mutually exclusive, as a single risk can be one or the other, or both at the […]

The post Understanding the Link Between Business, Operational & Security Risks appeared first on InfoSec Resources.

Understanding the Link Between Business, Operational & Security Risks was first posted on January 9, 2018 at 8:51 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Apple issues Spectre fix with iOS 11.2.2 update

Sophos Naked Security - 9 Leden, 2018 - 15:09
On January 8, Apple made available iOS 11.2.2, which includes a security update for Spectre, one of the CPU-level vulnerabilities making the headlines as of late.

US tightens rules on border search

Sophos Naked Security - 9 Leden, 2018 - 14:46
Your chances of being searched at a US border crossing are now at an all-time high. But the chances that border agents will be pulling data from your devices declined this past week - at least by a little.

Každý den kolují internetem statisíce virů

Novinky.cz - bezpečnost - 9 Leden, 2018 - 14:35
Bezpečnostní odborníci z antivirové společnosti Kaspersky Lab spočítali, že každý den koluje internetem rekordních 360 000 virů. Toto číslo je alarmující i s ohledem na to, že o rok dříve to bylo o 11,5 % méně. Uživatelé by tak nejrůznější počítačové hrozby rozhodně neměli podceňovat.
Kategorie: Hacking & Security

Spyware user tracked boyfriend to have him killed by hitman

Sophos Naked Security - 9 Leden, 2018 - 13:17
The plan was going well, until the "hitman" turned out to be working for the FBI.

Facebook bug could have exposed your phone number to marketers

Sophos Naked Security - 9 Leden, 2018 - 13:06
Self-service ad-targeting tools could have squeezed users' phone numbers from their email addresses... verrrrry sloooowly.

Apple Releases Spectre Patches for Safari, macOS and iOS

Threatpost - 8 Leden, 2018 - 22:57
Apple releases patches addressing the Spectre vulnerability impacting its macOS, iPhone, iPad and iPod touch.
Kategorie: Hacking & Security

Jak oprava chyb procesorů zpomalí počítače: testy ukazují, že to není až takové drama

Zive.cz - bezpečnost - 8 Leden, 2018 - 19:59
** Oprava hardwarové chyby procesorů Intel ovlivňuje jejich výkon ** V běžných aplikacích a hrách je rozdíl nepatrný nebo není žádný ** V serverech a datacentrech to ale může být velký problém
Kategorie: Hacking & Security

Expert Interview: How to Launch an Effective Security Awareness Training Program

InfoSec Institute Resources - 8 Leden, 2018 - 19:51

Bryce Austin of TCE Strategy is a CISM-certified cybersecurity authority and internationally recognized professional speaker. In this Q&A, we sat down with Bryce to discuss security awareness training strategies and best practices that other infosec leaders can apply to their own training programs.   Many infosec leaders struggle to capture buy-in for security awareness initiatives. […]

The post Expert Interview: How to Launch an Effective Security Awareness Training Program appeared first on InfoSec Resources.

Expert Interview: How to Launch an Effective Security Awareness Training Program was first posted on January 8, 2018 at 12:51 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

5 Steps to Create a Security Culture within your Organization

InfoSec Institute Resources - 8 Leden, 2018 - 19:15

Introduction We have a problem Houston…and its name is cybercrime. In 2017, we saw some of the biggest breaches of all time, including the Equifax breach, which left the company reeling from a 38% share price drop (1), and Verizon, where 14 million customer records were exposed. In the latest Ponemon Institute report, “Cost of […]

The post 5 Steps to Create a Security Culture within your Organization appeared first on InfoSec Resources.

5 Steps to Create a Security Culture within your Organization was first posted on January 8, 2018 at 12:15 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

New Rules Announced for Border Inspection of Electronic Devices

Threatpost - 8 Leden, 2018 - 19:12
The U.S. Customs and Border Patrol announced new restrictions on when agents can copy data from digital devices at border crossing points.
Kategorie: Hacking & Security

Top 10 Threats to Healthcare Security

InfoSec Institute Resources - 8 Leden, 2018 - 19:03

The year 2017 was the year that cyberattacks made healthcare sick. In the UK, a catastrophic ransomware attack in the form of WannaCry caused havoc across at least 16 health trusts, with hospitals and doctor surgeries being affected. According to research by Accenture , the healthcare industry was one of the worst affected by soaring […]

The post Top 10 Threats to Healthcare Security appeared first on InfoSec Resources.

Top 10 Threats to Healthcare Security was first posted on January 8, 2018 at 12:03 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security
Syndikovat obsah