Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

Passcodes are protected by Fifth Amendment, says court

Sophos Naked Security - 1 Listopad, 2018 - 13:04
The government isn't really after the password, after all; it's after any potential evidence it protects. In other words: fishing expedition.

Facebook is still approving fake political ads

Sophos Naked Security - 1 Listopad, 2018 - 12:56
Just a couple of weeks before the US midterm elections, journalists have revealed that Facebook is continuing to approve fake advertisements from fake sources.

Update now! Apple releases security fixes for iOS, MacOS, Safari, others

Sophos Naked Security - 1 Listopad, 2018 - 12:50
If you own any kind of Apple device or software, you may want to check to see if you have an update waiting for you.

US indicts alleged Chinese spies for hacking aerospace companies

Sophos Naked Security - 1 Listopad, 2018 - 12:40
The DOJ described five years of stealing turbofan engine designs that relied on insiders, state-sponsored hackers, phishing and malware.

RoboCops: AI on the rise in policing to predict crime and uncover lies

Sophos Naked Security - 1 Listopad, 2018 - 12:33
PrediPol uses predictive policing algorithms, VeriPol analyzes fake-report text. Who ya gonna call?

Golden Eye 1: CTF Walkthrough, Part 2

InfoSec Institute Resources - 31 Říjen, 2018 - 23:28

In this article, we will continue the “GoldenEye” Capture-The-Flag challenge. This CTF was posted on VulnHub by its author, Creosote. As per the description given by the author, this is an intermediate-level machine designed as one of the OSCP vulnerable machines. The goal of this challenge is to read the flags in the root directory. […]

The post Golden Eye 1: CTF Walkthrough, Part 2 appeared first on InfoSec Resources.

Golden Eye 1: CTF Walkthrough, Part 2 was first posted on October 31, 2018 at 5:28 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Best Practices for Threat Hunting in Large Networks

InfoSec Institute Resources - 31 Říjen, 2018 - 22:59

When we think of modern threat hunting, we think about proactively looking for exceptional situations across the network. Rather than waiting for an incident to occur, threat hunters work proactively, assuming attackers are already inside the network and attempt to track them down. Threat hunters make educated assumptions, such as “PowerShell remoting is used to […]

The post Best Practices for Threat Hunting in Large Networks appeared first on InfoSec Resources.

Best Practices for Threat Hunting in Large Networks was first posted on October 31, 2018 at 4:59 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Top 30 Malware Analyst Interview Questions and Answers for 2018

InfoSec Institute Resources - 31 Říjen, 2018 - 22:44

Introduction The importance of malware analysts in the world today needs no introduction. With that said, the questions that one may be asked on a job interview for this position do need an introduction. The questions that one may be asked in the course of a malware analyst job interview can come from a veritable […]

The post Top 30 Malware Analyst Interview Questions and Answers for 2018 appeared first on InfoSec Resources.

Top 30 Malware Analyst Interview Questions and Answers for 2018 was first posted on October 31, 2018 at 4:44 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

The Regulatory Impacts of Phishing Attacks

InfoSec Institute Resources - 31 Říjen, 2018 - 22:14

Phishing attacks can be a daily threat to everyone both in their personal and professional lives. The fact that a successful phishing attack can compromise an account and force a password reset is well-known. Here, we’ll be talking about how phishing threatens an organization’s compliance with regulations designed to protect the sensitive information under their […]

The post The Regulatory Impacts of Phishing Attacks appeared first on InfoSec Resources.

The Regulatory Impacts of Phishing Attacks was first posted on October 31, 2018 at 4:14 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

CamuBot Banking Malware Stands out for Its Ability to Bypass Biometric Authentication

InfoSec Institute Resources - 31 Říjen, 2018 - 22:10

A few days ago, security experts from IBM X-Force spotted a new strain of malware, tracked under the name CamuBot and targeting Brazilian bank customers. The malicious code immediately caught the attention of the researchers because it attempts to bypass biometric account protections. The Brazilian underground is characterized by its offering of banking Trojans. Many forms […]

The post CamuBot Banking Malware Stands out for Its Ability to Bypass Biometric Authentication appeared first on InfoSec Resources.

CamuBot Banking Malware Stands out for Its Ability to Bypass Biometric Authentication was first posted on October 31, 2018 at 4:10 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

VulnHub Machines Walkthrough Series: SkyTower

InfoSec Institute Resources - 31 Říjen, 2018 - 21:29

Continuing with our series on VulnHub walkthroughs, in this article we will see a walkthrough of another interesting VulnHub machine. This one is called “SkyTower.” Note: For all these machines, I have used the VMware workstation to provision VMs. Kali Linux VM will be my attacking box. Also, the techniques used are solely for educational […]

The post VulnHub Machines Walkthrough Series: SkyTower appeared first on InfoSec Resources.

VulnHub Machines Walkthrough Series: SkyTower was first posted on October 31, 2018 at 3:29 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

VulnHub Machines Walkthrough Series: VulnOSV2

InfoSec Institute Resources - 31 Říjen, 2018 - 20:51

In this article series, we will be looking at some interesting VulnHub virtual machines. This time, we will take a look at a VulnHub machine called VulnOSV2. Note: For all these machines I have used VMware workstation to provision VMs. Kali Linux VM will be my attacking box. Also, the techniques used are solely for […]

The post VulnHub Machines Walkthrough Series: VulnOSV2 appeared first on InfoSec Resources.

VulnHub Machines Walkthrough Series: VulnOSV2 was first posted on October 31, 2018 at 2:51 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Spooky miasmic gas bricks hospital iPhones (mwah ha ha ha)

Sophos Naked Security - 31 Říjen, 2018 - 18:34
Apple devices haunted by helium.

Apple Fixes Multiple macOS, iOS Bugs Including a Quirky FaceTime Vulnerability

Threatpost - 31 Říjen, 2018 - 17:52
Security updates across all Apple platforms released alongside its new products.
Kategorie: Hacking & Security

Kraken Ransomware Upgrades Distribution with RaaS Model

Threatpost - 31 Říjen, 2018 - 16:38
Affiliates pocket 80 percent of every ransom payment.
Kategorie: Hacking & Security

How one man could have taken over any business on Facebook

Sophos Naked Security - 31 Říjen, 2018 - 14:23
The recently patched flaw would have enabled anyone to make themselves an administrator for any Facebook business account.

Škodlivé kódy se mohou šířit přes Word, varovali bezpečnostní experti

Novinky.cz - bezpečnost - 31 Říjen, 2018 - 13:22
Kritickou chybu v populárním textovém editoru Word, za kterým stojí americký softwarový gigant Microsoft, objevili bezpečnostní experti ze společnosti Cymulate. Zranitelnost mohou útočníci zneužít k propašování škodlivého kódu do cizího počítače.
Kategorie: Hacking & Security

Google’s stealthy reCAPTCHA v3 detects humans – no questions asked

Sophos Naked Security - 31 Říjen, 2018 - 12:52
After 20 years of waiting you'll no longer feel your will to live drain away as you solve tedious visual puzzles. Maybe.

Crypto exchange collapses, victims accuse it of exit scam

Sophos Naked Security - 31 Říjen, 2018 - 12:30
Another day, another exchange goes down - but was it a hack or an exit scam?

Mirai author fined $8.6million, gets 6 months house arrest

Sophos Naked Security - 31 Říjen, 2018 - 11:29
An Alaskan court has handed one of the Mirai authors a huge fine.
Syndikovat obsah