je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.


DNS Manipulation in Venezuela in regards to the Humanitarian Aid Campaign

Kaspersky Securelist - 13 Únor, 2019 - 14:42

Venezuela is a country facing an uncertain moment in its history. Reports suggests it is in significant need of humanitarian aid.

On February 10th, Mr. Juan Guaidó made a public call asking for volunteers to join a new movement called “Voluntarios por Venezuela” (Volunteers for Venezuela). According to the media, it already numbers thousands of volunteers, willing to help international organizations to deliver humanitarian aid to the country. How does it work? Volunteers sign up and then receive instructions about how to help. The original website asks volunteers to provide their full name, personal ID, cell phone number, and whether they have a medical degree, a car, or a smartphone, and also the location of where they live:

This website appeared online on February 6th. Only a few days later, on February 11th, the day after the public announcement of the initiative, another almost identical website appeared with a very similar domain name and structure.

In fact, the false website is a mirror image of the original website,

Both the original and the false website use SSL from Let’s Encrypt. The differences are as follows:

Original website Deception website First day on the Internet, Feb 6th First day on the Internet, Feb 11th Whois information:

Registered on the name of Sigerist Rodriguez on Feb 4, 2019 Whois information:

Registered via GoDaddy using Privacy Protection feature on Feb 11, 2019 Hosted on Amazon Web Services Hosted first on GoDaddy and then on DigitalOcean

Now, the scariest part is that these two different domains with different owners are resolved within Venezuela to the same IP address, which belongs to the fake domain owner:

That means it does not matter if a volunteer opens a legitimate domain name or a fake one, in the end will introduce their personal information into a fake website.

Both domains if resolved outside Venezuela present different results:

Kaspersky Lab blocks the fake domain as phishing.

In this scenario, where the DNS servers are manipulated, it’s strongly recommended to use public DNS servers such as Google DNS servers ( and or CloudFlare and APNIC DNS servers ( and It’s also recommended to use VPN connections without a 3rd party DNS.

620 million records from 16 websites listed for sale on the Dark Web

Sophos Naked Security - 13 Únor, 2019 - 14:26
Some of the breaches are new, while some were reported last year. The sites include MyFitnessPal, MyHeritage, Whitepages and more.

Security firm beats Adobe by patching reader flaw first

Sophos Naked Security - 13 Únor, 2019 - 14:11
Adobe has patched a flaw that enabled attackers to slurp a user’s network authentication details - but not before someone else patched it first.

Hackers Destroyed VFEmail Service – Deleted Its Entire Data and Backups

The Hacker News - 13 Únor, 2019 - 12:22
What could be more frightening than a service informing you that all your data is gone—every file and every backup servers are entirely wiped out? The worst nightmare of its kind. Right? But that's precisely what just happened this week with, a US-based secure email provider that lost all data and backup files for its users after unknown hackers destroyed its entire U.S.
Kategorie: Hacking & Security

Researchers Implant "Protected" Malware On Intel SGX Enclaves

The Hacker News - 13 Únor, 2019 - 11:14
Cybersecurity researchers have discovered a way to hide malicious code in Intel SGX enclaves, a hardware-based memory encryption feature in modern processors that isolates sensitive code and data to protect it from disclosure or modification. In other words, the technique allows attackers to implant malware code in a secure memory that uses protection features of SGX which are otherwise
Kategorie: Hacking & Security

Populární elektrokoloběžku Xiaomi lze hacknout. Na dálku můžete zapnout brzdy i akceleraci - bezpečnost - 13 Únor, 2019 - 07:45
Oblíbená elektrická koloběžka Xiaomi M365 obsahuje vážnou bezpečnostní chybu, kvůli které ji lze na dálku hacknout. Na svém blogu na to upozornila bezpečnostní firma Zimperium. Lze na ní takto zapnou brzdy i akceleraci a člověku, který ji právě využívá, ublížit. Pracovníci Zimperium chybu ...
Kategorie: Hacking & Security

Hacknout nemocnici? Stačí bílý plášť a počítač - bezpečnost - 13 Únor, 2019 - 07:01
Odborník na kybernetickou bezpečnost Petr Samek v rozhovoru pro Právo upozornil na některá rizika, která může mít sdílený lékový záznam. Češi jsou podle něj ve vztahu k citlivým údajům v kyberprostoru málo obezřetní.
Kategorie: Hacking & Security

Siemens Warns of Critical Remote-Code Execution ICS Flaw

Threatpost - 12 Únor, 2019 - 23:59
The affected SICAM 230 process control system is used as an integrated energy system for utility companies, and as a monitoring system for smart-grid applications.
Kategorie: Hacking & Security

Double-Stuffed: Dunkin’ Hit by Another Credential-Stuffing Attack

Threatpost - 12 Únor, 2019 - 22:37
Dunkin' Donuts' loyalty program was hit with a credential stuffing attack that targeted names, email addresses, 16-digit DD Perks account numbers and DD Perks QR codes.
Kategorie: Hacking & Security

Microsoft Patches Zero-Day Browser Bug Under Active Attack

Threatpost - 12 Únor, 2019 - 22:34
In its February Patch Tuesday bulletin Microsoft patches four public bugs and one that under active attack.
Kategorie: Hacking & Security

Researchers use Intel SGX to put malware beyond the reach of antivirus software

Ars Technica - 12 Únor, 2019 - 21:54

Intel Skylake die shot. (credit: Intel)

Researchers have found a way to run malicious code on systems with Intel processors in such a way that the malware can't be analyzed or identified by antivirus software, using the processor's own features to protect the bad code. As well as making malware in general harder to examine, bad actors could use this protection to, for example, write ransomware applications that never disclose their encryption keys in readable memory, making it substantially harder to recover from attacks.

The research, performed at Graz University of Technology by Michael Schwarz, Samuel Weiser, and Daniel Gruss (one of the researchers behind last year's Spectre attack), uses a feature that Intel introduced with its Skylake processors called SGX ("Software Guard eXtensions"). SGX enables programs to carve out enclaves where both the code and the data the code works with are protected to ensure their confidentiality (nothing else on the system can spy on them) and integrity (any tampering with the code or data can be detected). The contents of an enclave are transparently encrypted every time they're written to RAM and decrypted upon being read. The processor governs access to the enclave memory: any attempt to access the enclave's memory from code outside the enclave is blocked; the decryption and encryption only occurs for the code within the enclave.

SGX has been promoted as a solution to a range of security concerns when a developer wants to protect code, data, or both, from prying eyes. For example, an SGX enclave running on a cloud platform could be used to run custom proprietary algorithms, such that even the cloud provider cannot determine what the algorithms are doing. On a client computer, the SGX enclave could be used in a similar way to enforce DRM (digital rights management) restrictions; the decryption process and decryption keys that the DRM used could be held within the enclave, making them unreadable to the rest of the system. There are biometric products on the market that use SGX enclaves for processing the biometric data and securely storing it such that it can't be tampered with.

Read 15 remaining paragraphs | Comments

Kategorie: Hacking & Security

Critical WordPress Plugin Flaw Allows Complete Website Takeover

Threatpost - 12 Únor, 2019 - 21:29
Users of the popular plugin, Simple Social Buttons, are encouraged to update to version 2.0.22.
Kategorie: Hacking & Security

Attackers Completely Destroy VFEmail’s Secure Mail Infrastructure

Threatpost - 12 Únor, 2019 - 21:25
"Every file server is lost, every backup server is lost.”
Kategorie: Hacking & Security

Microsoft Patch Tuesday — February 2019 Update Fixes 77 Flaws

The Hacker News - 12 Únor, 2019 - 20:41
Microsoft has issued its second Patch Tuesday for this year to address a total of 77 CVE-listed security vulnerabilities in its Windows operating systems and other products, 20 of which are rated critical, 54 important and 3 moderate in severity. February security update addresses flaws in Adobe Flash Player, Internet Explorer, Edge, Windows, MS Office, and Office Services and Web Apps,
Kategorie: Hacking & Security

New Unpatched macOS Flaw Lets Apps Spy On Your Safari Browsing History

The Hacker News - 12 Únor, 2019 - 19:52
A new security vulnerability has been discovered in the latest version of Apple's macOS Mojave that could allow a malicious application to access data stored in restricted folders which are otherwise not accessible to every app. Discovered by application developer Jeff Johnson on February 8, the vulnerability is unpatched at the time of writing and impacts all version of macOS Mojave,
Kategorie: Hacking & Security

Major Container Security Flaw Threatens Cascading Attacks

Threatpost - 12 Únor, 2019 - 19:28
A fundamental component of container technologies like Docker, cri-o, containerd and Kubernetes contains an important vulnerability that could cause cascading attacks.
Kategorie: Hacking & Security

Xiaomi M365 Electric Scooter Hacked and Remotely Controlled

Threatpost - 12 Únor, 2019 - 19:16
Hackers up to 100 meters away could take over Xiaomi M365 scooters to brake or accelerate them.
Kategorie: Hacking & Security

Adobe Releases February 2019 Patch Updates For 75 Vulnerabilities

The Hacker News - 12 Únor, 2019 - 18:21
Welcome back! Adobe has today released its monthly security updates to address a total of 75 security vulnerabilities across its various products, 71 of which resides in Adobe Acrobat and Reader alone. February 2019 patch Tuesday updates address several critical and important vulnerabilities in Adobe Acrobat Reader DC, Adobe Coldfusion, Creative Cloud Desktop Application, and Adobe Flash
Kategorie: Hacking & Security

Earning Network+ CEUs

InfoSec Institute Resources - 12 Únor, 2019 - 17:04

Networking is a dynamic field that requires facing new challenges and keeping on top of the latest security trends and advancements. Cyber-pests are continually developing sophisticated attacks to compromise corporate network security. On the other hand, IT professionals require new ideas and techniques to deal with these culpable attacks. Staying current with up-to-date networking technologies […]

The post Earning Network+ CEUs appeared first on InfoSec Resources.

Earning Network+ CEUs was first posted on February 12, 2019 at 10:04 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at
Kategorie: Hacking & Security
Syndikovat obsah