Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

Facebook needs fixing, says Mark Zuckerberg

Sophos Naked Security - 8 Leden, 2018 - 17:07
Mark Zuckerberg has set himself a doozy of a personal challenge for 2018

Star Wars: The Last Jedi – the security review

Sophos Naked Security - 8 Leden, 2018 - 16:30
We take an objective look at the security angles in Star Wars: The Last Jedi.

Ex-NSA hacker builds AI tool to hunt hate groups’ symbols online

Sophos Naked Security - 8 Leden, 2018 - 15:30
She's teaching NEMESIS to find white nationalists' so-called dog whistles - the Black Sun and Pepe the frog memes - with object recognition.

A Look at Data Security Compliance & Regulations by Industry

InfoSec Institute Resources - 8 Leden, 2018 - 14:58

Introduction Understanding and complying with regulations provides companies with business opportunities and reduces risk. To many, information security looks to be governed by an ever-changing plethora of laws, policies and regulations; each somewhat relevant and apparently originating in a different jurisdiction. If it appears complex, that’s because it is: we are dealing with a non-technical […]

The post A Look at Data Security Compliance & Regulations by Industry appeared first on InfoSec Resources.

A Look at Data Security Compliance & Regulations by Industry was first posted on January 8, 2018 at 7:58 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Monday review – the hot 15 stories of the week

Sophos Naked Security - 8 Leden, 2018 - 11:20
From the Intel CPU flaw and the IP address errors leading to wrongful arrests to Microsoft's plans to be "password free", and more!

Hackers target Winter Olympics with new custom-built fileless malware

LinuxSecurity.com - 8 Leden, 2018 - 10:44
LinuxSecurity.com: Hackers are targeting the upcoming Winter Olympics with a phishing and malware campaign directed at the organisations that provide infrastructure and other support for the Games.
Kategorie: Hacking & Security

How to hack public Wi-Fi to mine for cryptocurrency

LinuxSecurity.com - 8 Leden, 2018 - 10:43
LinuxSecurity.com: A researcher has published a proof-of-concept (PoC) project called CoffeeMiner which shows how threat actors can exploit public Wi-Fi networks to mine cryptocurrencies.
Kategorie: Hacking & Security

Is a Good Offense the Best Defense Against Hackers?

LinuxSecurity.com - 8 Leden, 2018 - 10:42
LinuxSecurity.com: The proposed Active Cyber Defense Certainty (ACDC) Act has its pros and cons. But it's not the only option for protecting your company's digital assets.
Kategorie: Hacking & Security

Experts Weigh In On Spectre Patch Challenges

Threatpost - 8 Leden, 2018 - 05:21
Mitigating Spectre and Meltdown flaws won't be easy, but experts say exploits targeting Spectre will be hard to patch against.
Kategorie: Hacking & Security

Hackerský útok se nedá vyloučit, experti budou během voleb v pohotovosti

Novinky.cz - bezpečnost - 6 Leden, 2018 - 08:30
Brněnský úřad pro kybernetickou bezpečnost bude v době konání prezidentských voleb v polovině ledna v pohotovosti. K zásahu bude připraveno až 25 odborníků. Mluvčí úřadu Radek Holý řekl, že se nedá vyloučit další hackerský útok. Takový atak po ukončení sněmovních voleb loni v říjnu způsobil výpadky volebních webů Českého statistického úřadu (ČSÚ) a vyšetřuje ho policie.
Kategorie: Hacking & Security

How to Phish Like a Hacker with SecurityIQ

InfoSec Institute Resources - 5 Leden, 2018 - 21:31

SecurityIQ clients understand that the best way to beat hackers is to think like them. To help you improve your phishing simulation difficulty and effectiveness, we’ve gathered four frequently asked phishing questions and answers below. Recommendations are made using our team’s expertise and real data on hacker activity from ProofPoint’s 2017 Human Factor Report. What […]

The post How to Phish Like a Hacker with SecurityIQ appeared first on InfoSec Resources.

How to Phish Like a Hacker with SecurityIQ was first posted on January 5, 2018 at 2:31 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Chyby v procesorech: jak vám zpomalí počítač, co mohou ohrozit a jak se bránit

Zive.cz - bezpečnost - 5 Leden, 2018 - 20:27
V procesorech používaných v počítačích, ale i mobilních telefonech, byly objeveny závažné bezpečnostní chyby. Týká se to procesorů Intel, ale i AMD nebo čipů architektury ARM používaných v mobilních zařízeních. Chcete-li se o objevených chybách dozvědět více, přečtěte si naše starší články, které ...
Kategorie: Hacking & Security

10 Ways GDPR Will Affect Data Collection and Use In 2018

InfoSec Institute Resources - 5 Leden, 2018 - 19:21

Introduction The General Data Protection Regulation (GDPR) is almost upon us. May 25th, 2018 is the auspicious day that begins the enactment of the regulation. In a survey carried out earlier this year by TrustArc (1), 61% of companies were not ready to implement GDPR. Research carried out a little later in the year by […]

The post 10 Ways GDPR Will Affect Data Collection and Use In 2018 appeared first on InfoSec Resources.

10 Ways GDPR Will Affect Data Collection and Use In 2018 was first posted on January 5, 2018 at 12:21 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Microsoft could soon be “password free”

Sophos Naked Security - 5 Leden, 2018 - 17:04
Is it the beginning of the end for passwords?

How Cyber Insurance Can Safeguard Your Business – A General Guide

InfoSec Institute Resources - 5 Leden, 2018 - 15:57

Cyber insurance is also known as cyber liability insurance coverage. It helps businesses and individuals protect themselves from Internet- and IT infrastructure-based risks. Interestingly, these types of risks are not covered by traditional, commercial liability policies. This is the primary reason any business with any sort of online presence cannot afford to go without cyber […]

The post How Cyber Insurance Can Safeguard Your Business – A General Guide appeared first on InfoSec Resources.

How Cyber Insurance Can Safeguard Your Business – A General Guide was first posted on January 5, 2018 at 8:57 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Google Play Removes 22 Malicious ‘LightsOut’ Apps From Marketplace

Threatpost - 5 Leden, 2018 - 15:39
Google removed 22 malicious adware apps ranging from flashlights, call recorders to wifi signal boosters that together were downloaded up to 7.5 million times from the Google Play marketplace.
Kategorie: Hacking & Security

JPMorgan doesn’t trust YouTube to keep its ads out of sketchy channels

Sophos Naked Security - 5 Leden, 2018 - 15:17
Following ads appearing next to hate-filled/extremist content, the bank says it's not relying on Google to protect its brand.

An Examination of the Security Threats Posed to a Mobile Wallet Infrastructure

InfoSec Institute Resources - 5 Leden, 2018 - 15:00

Introduction Our last article reviewed in depth just what precisely a Mobile Wallet is, and how it works. In summary, it is essentially a mobile app from which you can download from either the App Store or Google Play. Once it has been installed onto your wireless device, you enter in your credit card information, […]

The post An Examination of the Security Threats Posed to a Mobile Wallet Infrastructure appeared first on InfoSec Resources.

An Examination of the Security Threats Posed to a Mobile Wallet Infrastructure was first posted on January 5, 2018 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Meltdown and Spectre: Here’s what Intel, Apple, Microsoft, others are doing about it

Ars Technica - 5 Leden, 2018 - 14:52

Enlarge (credit: Jen)

The Meltdown and Spectre flaws—two related vulnerabilities that enable a wide range of information disclosure from every mainstream processor, with particularly severe flaws for Intel and some ARM chips—were originally revealed privately to chip companies, operating system developers, and cloud computing providers. That private disclosure was scheduled to become public some time next week, enabling these companies to develop (and, in the case of the cloud companies, deploy) suitable patches, workarounds, and mitigations.

With researchers figuring out one of the flaws ahead of that planned reveal, that schedule was abruptly brought forward, and the pair of vulnerabilities was publicly disclosed on Wednesday, prompting a rather disorderly set of responses from the companies involved.

There are three main groups of companies responding to the Meltdown and Spectre pair: processor companies, operating system companies, and cloud providers. Their reactions have been quite varied.

Read 52 remaining paragraphs | Comments

Kategorie: Hacking & Security

Baterie v noteboocích můžou vzplanout! HP svolává k výměně zdarma

Zive.cz - bezpečnost - 5 Leden, 2018 - 14:29
Americký výrobce počítačů HP oznámil celosvětový dobrovolný program svolávání a případné výměny problematických Li-ion baterií do notebooků či pracovních stanic. Důvodem je možné riziko nadměrného přehřívání baterie či dokonce vzniku požáru. Svolávání se týká vybraných notebooků či pracovních ...
Kategorie: Hacking & Security
Syndikovat obsah