Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

Gmail už umí posílat důvěrné zprávy. Příjemci dostane heslo v SMS

Zive.cz - bezpečnost - 42 min 42 sek zpět
** Gmail přichází s novou funkcí „důvěrný režim“ ** Nabízí možnost zabezpečit přístup ke zprávě SMS kódem ** Dovoluje nastavit platnost zprávy jako na Snapchatu
Kategorie: Hacking & Security

A reminder about government-backed phishing

Google Security Blog - 6 hodin 2 sek zpět
Posted by Shane Huntley, Threat Analysis Group

TLDR: Government-backed phishing has been in the news lately. If you receive a warning in Gmail, be sure to take prompt action. Get two-factor authentication on your account. And consider enrolling in the Advanced Protection Program.

One of the main threats to all email users (whatever service you use) is phishing, attempts to trick you into providing a password that an attacker can use to sign into your account. Our ​improving ​technology has enabled ​us to ​significantly ​decrease ​the ​volume ​of ​phishing ​emails that ​get ​through to our users. ​ Automated ​protections, ​account ​security ​(like ​security ​keys), ​and specialized ​warnings give ​Gmail users industry-leading ​security.

Beyond phishing for the purposes of fraud, a small minority of users in all corners of the world are still targeted by sophisticated government-backed attackers. These attempts come from dozens of countries. Since 2012, we've shown prominent warnings within Gmail notifying users that they may be targets of these types of phishing attempts; we show thousands of these warnings every month, even if we have blocked the specific attempt.

We also send alerts to G Suite administrators if someone in their corporate network may have been the target of government-backed phishing. And we regularly post public advisories to make sure that people are aware of this risk.

This is what an account warning looks like; an extremely small fraction of users will ever see one of these, but if you receive this warning from us, it's important to take immediate action on it.
We intentionally send these notices in batches to all users who may be at risk, rather than at the moment we detect the threat itself, so that attackers cannot track some of our defense strategies. We have an expert team in our Threat Analysis Group, and we use a variety of technologies to detect these attempts. We also notify law enforcement about what we’re seeing; they have additional tools to investigate these attacks.

We hope you never receive this type of warning, but if you do, please take action right away to enhance the security of your accounts.

Even if you don’t receive such a warning, you should enable 2-step verification in Gmail. And if you think you’re at particular risk of government-backed phishing, consider enrolling in the Advanced Protection Program, which provides even stronger levels of security.
Kategorie: Hacking & Security

Canadian Telcos Patch an APT-Ready Flaw in Disability Services

Threatpost - 20 Srpen, 2018 - 22:49
An attacker could escalate privileges on the server, further penetrating the network, harvesting customer information or mounting credible social-engineering campaigns.
Kategorie: Hacking & Security

Side-Channel PoC Attack Lifts Private RSA Keys from Mobile Phones

Threatpost - 20 Srpen, 2018 - 22:42
Researchers launched a Proof-of-Concept attack on two Android mobile phones and an embedded system board.
Kategorie: Hacking & Security

Open-Source Intelligence Collection in Cloud Platforms

InfoSec Institute Resources - 20 Srpen, 2018 - 22:38

Threat Intelligence One of the most popular specialized fields within the security domain is threat intelligence. In the recent years, organizations have been focusing more and more on proactive, preventative security. Within that space, threat intelligence analysis is one of the most successful tools available. Information is collected around observed malicious infrastructure such as IPs […]

The post Open-Source Intelligence Collection in Cloud Platforms appeared first on InfoSec Resources.

Open-Source Intelligence Collection in Cloud Platforms was first posted on August 20, 2018 at 3:38 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Vulnhub Machines Walkthrough Series — Tr0ll: 2

InfoSec Institute Resources - 20 Srpen, 2018 - 22:34

Today, we’ll be continuing with our walkthrough series on interesting Vulnhub machines. In this article, we will see a walkthrough of the Tr0ll: 2 virtual machine. Note: For all these machines, I have used VMware workstation to provision the VMs. Kali Linux VM will be my attacking box. Also, remember the techniques used are solely […]

The post Vulnhub Machines Walkthrough Series — Tr0ll: 2 appeared first on InfoSec Resources.

Vulnhub Machines Walkthrough Series — Tr0ll: 2 was first posted on August 20, 2018 at 3:34 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

4 Common Security Awareness Mistakes and How to Mitigate Them

InfoSec Institute Resources - 20 Srpen, 2018 - 22:33

Introduction For any company, being aware of the cyberthreat landscape is critical. There is often the mindset that most cyberattacks can be thwarted off by procuring and implementing the latest security technologies, and while this may be true to a certain extent, it takes a high level of security awareness on the part of both […]

The post 4 Common Security Awareness Mistakes and How to Mitigate Them appeared first on InfoSec Resources.

4 Common Security Awareness Mistakes and How to Mitigate Them was first posted on August 20, 2018 at 3:33 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

5 Reasons to Prioritize Security Awareness Training in 2018

InfoSec Institute Resources - 20 Srpen, 2018 - 22:27

Victims of cyberattacks are in the news nearly every day. These organizations are big and small and represent healthcare, finance and utilities to local government and entertainment. In their 2016 Cyber Security Intelligence Index, IBM actually found that 60% of all attacks were carried out by insiders, which are employees or others with internal access […]

The post 5 Reasons to Prioritize Security Awareness Training in 2018 appeared first on InfoSec Resources.

5 Reasons to Prioritize Security Awareness Training in 2018 was first posted on August 20, 2018 at 3:27 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Vulnhub Machines Walkthrough Series — Tr0ll: 1

InfoSec Institute Resources - 20 Srpen, 2018 - 22:22

Today, we’ll be continuing with our walkthrough series on interesting Vulnhub machines. In this article we will see a walkthrough of the Tr0ll: 1 virtual machine. Note: For all these machines, I have used VMware Workstation to provision the VMs. Kali Linux VM will be my attacking box. Also, remember the techniques used are solely […]

The post Vulnhub Machines Walkthrough Series — Tr0ll: 1 appeared first on InfoSec Resources.

Vulnhub Machines Walkthrough Series — Tr0ll: 1 was first posted on August 20, 2018 at 3:22 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Top 5 Open-Source and Commercial Secure Code Review Tools

InfoSec Institute Resources - 20 Srpen, 2018 - 22:04

  Code review is an indispensable part of the development process. And as such, code review tools are an indispensable part of the development team. Below is a list of the top five open-source and commercial secure code review tools. Open Source #5 – Codebrag Codebrag is a good code review tool if you are […]

The post Top 5 Open-Source and Commercial Secure Code Review Tools appeared first on InfoSec Resources.

Top 5 Open-Source and Commercial Secure Code Review Tools was first posted on August 20, 2018 at 3:04 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Top 4 Best Practices for Protecting Your Business from Third-Party Risks

InfoSec Institute Resources - 20 Srpen, 2018 - 21:54

Enterprises rely heavily on third-party vendors for faster time to market, improved profitability and reduced costs. However, third-party partnerships come with varying risks, including financial, information security, reputational and regulatory risks. If a business outsources important functions to third parties or uses them in its data handling or network chain, the risks are compounded by […]

The post Top 4 Best Practices for Protecting Your Business from Third-Party Risks appeared first on InfoSec Resources.

Top 4 Best Practices for Protecting Your Business from Third-Party Risks was first posted on August 20, 2018 at 2:54 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Darkhotel Exploits Microsoft Zero-Day VBScript Flaw

Threatpost - 20 Srpen, 2018 - 18:39
The recently-patched flaw could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
Kategorie: Hacking & Security

GandCrab’s Rotten EGGs Hatch Ransomware in South Korea

Threatpost - 20 Srpen, 2018 - 18:07
This could mark yet another reinvention for the VenusLocker group, which has mostly been focused on cryptomining this year.
Kategorie: Hacking & Security

Google hasí problém s ukládáním polohy úpravou nápovědy. Bude to stačit?

Zive.cz - bezpečnost - 20 Srpen, 2018 - 18:00
** Google sledoval polohu uživatelů, i když mu to zakázali ** Nejprve tvrdil, že je vše v nejlepším pořádku ** Pak ale změnit popisek v oficiální nápovědě. Bude to stačit?
Kategorie: Hacking & Security

Firefox axes add-ons, developer pushes back

Sophos Naked Security - 20 Srpen, 2018 - 13:12
Mozilla has wiped 23 extensions from its directory of Firefox browser add-ons after finding what it says were inappropriate functions in the code.

How to Become a Computer Forensics Investigator (CyberSpeak Podcast)

InfoSec Institute Resources - 20 Srpen, 2018 - 13:00

On this episode of the CyberSpeak with InfoSec Institute podcast, Paraben CEO Amber Schroader discusses her path to becoming a computer forensics investigator and provides advice to those who may be considering computer forensics as a career. In the podcast, Schroader and Chris Sienko, host of CyberSpeak with InfoSec Institute, discuss: The beginnings of her interest […]

The post How to Become a Computer Forensics Investigator (CyberSpeak Podcast) appeared first on InfoSec Resources.

How to Become a Computer Forensics Investigator (CyberSpeak Podcast) was first posted on August 20, 2018 at 6:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Los Angeles to use body scanners on metro riders

Sophos Naked Security - 20 Srpen, 2018 - 13:00
Subway and bus riders will be randomly scanned as the city becomes the first in the country to use the technology to thwart suicide bombers.

Google employees protest work on censored search engine for China

Sophos Naked Security - 20 Srpen, 2018 - 12:38
Hundreds signed a letter raising concerns about the moral and ethical issues of Google helping China with its censorship.

Adblocking and browser privacy can be bypassed, researchers find

Sophos Naked Security - 20 Srpen, 2018 - 12:34
Virtually every desktop browser and adblocker can have its ad-tracking privacy or security bypassed by at least one software technique, a new study has found.

Corporate pre-crime: The ethics of using AI to identify future insider threats

LinuxSecurity.com - 20 Srpen, 2018 - 12:07
LinuxSecurity.com: To protect corporate networks against malware, data exfiltration and other threats, security departments have systems in place to monitor email traffic, URLs and employee behaviors. With artificial intelligence (AI) and machine learning, this data can also be used to make predictions.
Kategorie: Hacking & Security
Syndikovat obsah