Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

Impact of Cyber Security on Start-ups

InfoSec Institute Resources - 25 Květen, 2017 - 14:00

Image taken from The Fintech Times What is a start-up? A start-up is a young company that is still in its phase of developing. Start-ups are usually small and have little or no funding. Such companies try to offer a product or service that is not currently available on the market and even if it […]

The post Impact of Cyber Security on Start-ups appeared first on InfoSec Resources.

Kategorie: Hacking & Security

The Ramifications of Jailbreaking Your Smartphone

InfoSec Institute Resources - 25 Květen, 2017 - 14:00

Introduction and Overview of the Last Article The Smartphone happens to be a very valued device to not only individuals but to businesses and corporations as well. After all, it offers many conveniences, and advantages to which even using a Notebook or other type of portable computing device may not offer. In this regard, its […]

The post The Ramifications of Jailbreaking Your Smartphone appeared first on InfoSec Resources.

Kategorie: Hacking & Security

YouTube, Twitter and Facebook face curbs on hate speech videos

Sophos Naked Security - 25 Květen, 2017 - 13:14
Europe moves a step closer to limiting the spread of extremism and toxic content via social platforms

A wormable code-execution bug has lurked in Samba for 7 years. Patch now!

LinuxSecurity.com - 25 Květen, 2017 - 12:10
LinuxSecurity.com: Maintainers of the Samba networking utility just patched a critical code-execution vulnerability that could pose a severe threat to users until the fix is widely installed. The seven-year-old flaw, indexed as CVE-2017-7494, can be reliably exploited with just one line of code to execute malicious code, as long as a few conditions are met.
Kategorie: Hacking & Security

Microsoft koupí společnost Hexadite za 100 miliónů dolarů

Novinky.cz - bezpečnost - 25 Květen, 2017 - 11:20
Americký softwarový gigant Microsoft se dohodl, že zaplatí 100 miliónů dolarů (2,4 miliardy Kč) za převzetí společnosti Hexadite, působící v oblasti kybernetické bezpečnosti. Informoval o tom izraelský finanční server Calcalist.
Kategorie: Hacking & Security

A wormable code-execution bug has lurked in Samba for 7 years. Patch now!

Ars Technica - 25 Květen, 2017 - 01:30

Enlarge (credit: Guido Sorarù)

Maintainers of the Samba networking utility just patched a critical code-execution vulnerability that could pose a severe threat to users until the fix is widely installed.

The seven-year-old flaw, indexed as CVE-2017-7494, can be reliably exploited with just one line of code to execute malicious code, as long as a few conditions are met. Those requirements include vulnerable computers that (a) make file- and printer-sharing port 445 reachable on the Internet, (b) configure shared files to have write privileges, and (c) use known or guessable server paths for those files. When those conditions are satisfied, remote attackers can upload any code of their choosing and cause the server to execute it, possibly with unfettered root privileges, depending on the vulnerable platform.

"All versions of Samba from 3.5.0 onwards are vulnerable to a remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it," Samba maintainers wrote in an advisory published Wednesday. They urged anyone using a vulnerable version to install a patch as soon as possible.

Read 11 remaining paragraphs | Comments

Kategorie: Hacking & Security

Password Breaches Fueling Booming Credential Stuffing Business

Threatpost - 24 Květen, 2017 - 23:49
The market for automated credential stuffing tools is growing fast, because of a record number of breaches.
Kategorie: Hacking & Security

Android Overlay and Accessibility Features Leave Millions at Risk

Threatpost - 24 Květen, 2017 - 20:05
Researchers warn two features, not flaws, in Android can be used together to open devices up to attack.
Kategorie: Hacking & Security

To tu ještě nebylo. Specialisté ukázali, že zavirované mohou být i titulky SRT

Zive.cz - bezpečnost - 24 Květen, 2017 - 19:00
** Stáhnete si film a titulky třeba z OpenSubtitles.org ** A osud vás za ten warez záhy potrestá ** Specialisté totiž ukázali, že i v titulcích může být schovaný virus
Kategorie: Hacking & Security

News in brief: drones could be hobbled; cost of ransomware counted; Target agrees $18.5m deal

Sophos Naked Security - 24 Květen, 2017 - 18:44
Your daily round-up of some of the other stories in the news

Twitter Flaw Could Have Allowed Attacker to Tweet From Any Account

Threatpost - 24 Květen, 2017 - 18:30
Twitter fixed a flaw in its Twitter Ads service could have allowed an attacker to tweet as any user.
Kategorie: Hacking & Security

Police swoop on gang that planted banking Trojan on 1m phones

Sophos Naked Security - 24 Květen, 2017 - 18:08
The Cron gang's malware was infecting some 3,500 Android devices every day - and siphoning money out of 60 accounts every day

České nemocnice jsou na útoky ransomware zoufale nepřipraveny, varuje expert

Novinky.cz - bezpečnost - 24 Květen, 2017 - 17:23
Česká republika má štěstí, že nebyla v hledáčku tvůrců škodlivého kódu WannaCry. Tuzemská zdravotnická zařízení by dopadla hůře než v Británii.
Kategorie: Hacking & Security

Malware Network Communication Provides Better Early Warning Signal

Threatpost - 24 Květen, 2017 - 17:10
An academic paper to be presented today at IEEE posits that analysis of network signals provides a better early warning of malware than infections than current practices.
Kategorie: Hacking & Security

LastPass’s new cloud backup option – sunny skies or a brewing storm?

Sophos Naked Security - 24 Květen, 2017 - 16:25
Cloud backup for the password manager's Authenticator certainly reduces the hassle for users - but it's a security compromise

Hacker snadno ošálil sken oční duhovky na Galaxy S8. Potřeboval IR fotoaparát, čočku a tiskárnu

Zive.cz - bezpečnost - 24 Květen, 2017 - 15:20
Telefony Galaxy S8 nabízejí jako další bezpečnostní ochranu sken oční duhovky, který by měl být ještě bezpečnější než stávající metody jako PIN, heslo, rozpoznání obličeje nebo třeba otisk prstu. Hacker Jan Krisler ze skupiny CCC (Chaos Computer Club) však v krátkém videu demonstroval, že i tuto ...
Kategorie: Hacking & Security

Secure VPN Services With Lifetime Subscription (Save up to 95%) - Limited Time Deal

The Hacker News - 24 Květen, 2017 - 14:47
PRIVACY – a bit of an Internet buzzword nowadays, because the business model of the Internet has now shifted towards data collection. Today, most users surf the web unaware of the fact that websites and online services collect their personal information, including search histories, location, and buying habits and make millions by sharing your data with advertisers and marketers. If this is
Kategorie: Hacking & Security

Risks and Benefits of Security Policy Templates

InfoSec Institute Resources - 24 Květen, 2017 - 14:00

1. Introduction Many small and large organizations prefer to download ready-made security policy templates instead of hiring experienced professionals for drafting their security policies from scratch. While the use of templates can certainly save human and financial resources, it may also cause financial and reputational harm to the organizations relying solely on templates. Security policies […]

The post Risks and Benefits of Security Policy Templates appeared first on InfoSec Resources.

Kategorie: Hacking & Security

Tutorial for Building and Reverse Engineering Simple Virtual Machine Protection

InfoSec Institute Resources - 24 Květen, 2017 - 14:00

1. Introduction The virtual machine protection refers to the kind of software protection technology by which the original executable and readable code are translated into a string of pseudo-code byte stream, and a virtual machine is embedded into the program to interpret and execute that pseudo-code byte stream. The difference between virtual machine protection technology […]

The post Tutorial for Building and Reverse Engineering Simple Virtual Machine Protection appeared first on InfoSec Resources.

Kategorie: Hacking & Security
Syndikovat obsah