Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

Chris Vickery on Amazon S3 Data Leaks

Threatpost - 1 hodina 20 min zpět
Mike Mimoso talks to Chris Vickery of Upguard of the recent rash of Amazon S3 data leaks.
Kategorie: Hacking & Security

Joomla 3.8 fixes serious LDAP authentication issue, update now

Sophos Naked Security - 1 hodina 1 min zpět
The bug allows the extraction of an affected site's credentials "in seconds"

Adobe Private PGP Key Leak a Blunder, But It Could Have Been Worse

Threatpost - 3 hodiny 5 min zpět
Adobe suffered at a minimum a PR black eye on Friday when one of its private PGP keys was inadvertently published to its Product Incident Security Response Team (PSIRT) blog.
Kategorie: Hacking & Security

SecurityIQ Update Adds Healthcare-Specific Modules, Custom Course Notifications

InfoSec Institute Resources - 3 hodiny 59 min zpět

The latest SecurityIQ update includes nine new security awareness modules for healthcare professionals, and custom course notifications to help you increase program completion rates. Read on for complete release details. 9 New Security Awareness Modules for Healthcare Professionals Staying compliant with HIPAA and PPI regulations just became simpler with SecurityIQ’s new security awareness modules for […]

The post SecurityIQ Update Adds Healthcare-Specific Modules, Custom Course Notifications appeared first on InfoSec Resources.

SecurityIQ Update Adds Healthcare-Specific Modules, Custom Course Notifications was first posted on September 25, 2017 at 7:37 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

No, Facebook spies aren’t secretly “following me”, it’s a hoax

Sophos Naked Security - 4 hodiny 56 min zpět
Typing "Facebook security" into your block list won't reveal their names

Monday review – Adobe botches, Apache bleeds and Equifax blunders

Sophos Naked Security - 6 hodin 1 min zpět
From Apache bleeding to Equifax shooting itself in the foot. Again.

1.4 Million New Phishing Sites Launched Each Month

LinuxSecurity.com - 6 hodin 18 min zpět
LinuxSecurity.com: The number of phishing attacks reach a record rate in 2017, but the majority of the phishing sites remain active for just four- to eight hours.
Kategorie: Hacking & Security

Beyond public key encryption

LinuxSecurity.com - 6 hodin 20 min zpět
LinuxSecurity.com: One of the saddest and most fascinating things about applied cryptography is how 6689264031_4c7516b3e1_zlittle cryptography we actually use. This is not to say that cryptography isn't widely used in industry - it is. Rather, what I mean is that cryptographic researchers have developed so many useful technologies, and yet industry on a day to day basis barely uses any of them.
Kategorie: Hacking & Security

Apple opravuje bezpečnostní chyby. Jsou kritické

Novinky.cz - bezpečnost - 8 hodin 19 min zpět
Počítače s logem nakousnutého jablka, smartphony, ale například i chytré hodinky. Aktuálně prakticky neexistuje produkt od společnosti Apple, jehož software by neobsahoval nějakou bezpečnostní chybu. Americký počítačový gigant totiž naráz záplatuje prakticky všechny své operační systémy.
Kategorie: Hacking & Security

Týden Živě: CyberCon 2017, děravý CCleaner a mobilní platby Android Pay

Zive.cz - bezpečnost - 24 Září, 2017 - 19:00
** V Brně se konal CyberCon ** CCleaner má ohromnou ostudu ** Google u nás vypustí Android Pay
Kategorie: Hacking & Security

Adobe security team posts public key – together with private key

Sophos Naked Security - 23 Září, 2017 - 03:23
If you generate an encryption keypair and you get a public key and a private key, which one do you think you should keep to yourself?

Tips to Avoid Social Media Website Phishers

InfoSec Institute Resources - 23 Září, 2017 - 01:44

For quite some time now, phishing has been a preferred method for malicious hackers to gather from users the information that allowed them to penetrate systems. The surge in use of social networks is now making their job even easier; scores of personal details, photos, videos, ideas and posts of any kind are available often […]

The post Tips to Avoid Social Media Website Phishers appeared first on InfoSec Resources.

Tips to Avoid Social Media Website Phishers was first posted on September 22, 2017 at 6:44 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

10 Digital Forensics Tools – The Lesser Known

InfoSec Institute Resources - 23 Září, 2017 - 00:41

For years Digital Forensics has played a significant role in the security domain. Being an integral part of the process, various tools have been developed over the years to make the forensic investigator’s work easier. Since most people are aware of tools such as EnCase, The Sleuth Kit, Caine, etc. that are used in the […]

The post 10 Digital Forensics Tools – The Lesser Known appeared first on InfoSec Resources.

10 Digital Forensics Tools – The Lesser Known was first posted on September 22, 2017 at 5:41 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

CCleaner: Ještě větší průšvih, než jsme si mysleli

Zive.cz - bezpečnost - 23 Září, 2017 - 00:00
** Nejprve to vypadalo jako vážný, ale jen izolovaný problém ** Pak se to nafouklo do obřích rozměrů ** CCLeaner má problém a Avast ostudu
Kategorie: Hacking & Security

Cybersecurity as an ethical obligation

InfoSec Institute Resources - 22 Září, 2017 - 23:59

1. Introduction An ethical obligation is a standard that defines a moral course of action. Many professions are subject to comprehensive sets of ethical obligations which, if violated, may lead to sanctions. For example, the Code of Medical Ethics adopted by the American Medical Association sets forth the values to which every physician commits himself/herself […]

The post Cybersecurity as an ethical obligation appeared first on InfoSec Resources.

Cybersecurity as an ethical obligation was first posted on September 22, 2017 at 4:59 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Computer Forensics: Mobile Forensics

InfoSec Institute Resources - 22 Září, 2017 - 23:32

Is There a Need for Mobile Device Forensics? The use of Mobile devices in criminal investigations and similar activity has been present and widely recognized for some years. The forensic method and study of mobile devices is relatively new dates from the early 2000s. Just as the regular population uses mobile devices, so do the […]

The post Computer Forensics: Mobile Forensics appeared first on InfoSec Resources.

Computer Forensics: Mobile Forensics was first posted on September 22, 2017 at 4:32 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Expected Ransomware Evolution in Coming Years

InfoSec Institute Resources - 22 Září, 2017 - 23:08

The tech world has been stricken with digital assaults this year and ransomware has been at the focal point of everything. So far, this year we have seen two record-softening attacks occur up to a matter of months. In May the WannaCry ransomware contaminated a huge number of PCs, disturbing doctor’s facilities, banks, and organizations. […]

The post Expected Ransomware Evolution in Coming Years appeared first on InfoSec Resources.

Expected Ransomware Evolution in Coming Years was first posted on September 22, 2017 at 4:08 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Become an Entry-Level Cybersecurity Analyst

InfoSec Institute Resources - 22 Září, 2017 - 22:29

Cybersecurity is a growing issue. The greater frequency of attacks and their higher sophistication require companies to utilize the services of true subject matter experts readily available to apply best practices for securing business assets. Many are the professional figures sought nowadays to help secure networks, but lately, Cybersecurity Analysts are in high demand. The […]

The post Become an Entry-Level Cybersecurity Analyst appeared first on InfoSec Resources.

Become an Entry-Level Cybersecurity Analyst was first posted on September 22, 2017 at 3:29 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Security+ Exam Information: Performance-Based Questions

InfoSec Institute Resources - 22 Září, 2017 - 22:09

IT security is vital to organizations as cloud computing, and mobile devices have revolutionized the way we do business. With the immense amounts of data transmitted and stored on networks all over the world, it is necessary to have effective security practices in place. That is where CompTIA Security+ comes in. CompTIA Security+ certification is […]

The post Security+ Exam Information: Performance-Based Questions appeared first on InfoSec Resources.

Security+ Exam Information: Performance-Based Questions was first posted on September 22, 2017 at 3:09 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Verizon Wireless Internal Credentials, Infrastructure Details Exposed in Amazon S3 Bucket

Threatpost - 22 Září, 2017 - 21:56
Verizon is the latest company to leak confidential data through an exposed Amazon S3 bucket.
Kategorie: Hacking & Security
Syndikovat obsah