Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

How anyone could have stuffed your Flickr account with photos

Sophos Naked Security - 8 Říjen, 2017 - 16:46
A high schooler poking around in Flickr found a critical flaw

Woman films her spying webcam as it talks to her

Sophos Naked Security - 8 Říjen, 2017 - 13:54
The webcam swivelled around on its own and began to speak

Edge dostal další užitečný doplněk – správce hesel 1password

Zive.cz - bezpečnost - 8 Říjen, 2017 - 09:00
Takřka před rokem oznámil Microsoft, že společnost AgileBits, tvůrci 1Password, chystají oficiální rozšíření pro internetový prohlížeč Edge v operačním systému Windows 10. Rok se s rokem sešel a rozšíření 1Password je konečně tu. Vývojáři předevčírem vypustili rozšíření do obchodu ...
Kategorie: Hacking & Security

Disqus Hacked: More than 17.5 Million Users' Details Stolen in 2012 Breach

The Hacker News - 7 Říjen, 2017 - 09:07
Another day, Another data breach disclosure. This time the popular commenting system has fallen victim to a massive security breach. Disqus, the company which provides a web-based comment plugin for websites and blogs, has admitted that it was breached 5 years ago in July 2012 and hackers stole details of more than 17.5 million users. The stolen data includes email addresses, usernames,
Kategorie: Hacking & Security

Security Industry Failing to Establish Trust

Threatpost - 6 Říjen, 2017 - 19:25
During the Virus Bulletin closing keynote, Brian Honan urged the security industry to share more, victim-shame less and work harder to establish trust.
Kategorie: Hacking & Security

Will Equifax breach spur real reform? Don’t hold your breath

Sophos Naked Security - 6 Říjen, 2017 - 17:13
It sounded like the wake-up call to end all wake-up calls.

The Challenges of Designing and Building a CIAM System

InfoSec Institute Resources - 6 Říjen, 2017 - 16:31

Once there was identity access management (IAM). It did a pretty decent job of managing our workforce access to corporate resources. Then, things changed. The Internet took off, workers started to work remotely and wanted to use their own laptops and mobile devices to check emails, etc. (BYOD).The IAM systems of old started to creak […]

The post The Challenges of Designing and Building a CIAM System appeared first on InfoSec Resources.

The Challenges of Designing and Building a CIAM System was first posted on October 6, 2017 at 9:31 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

SophosLabs’ Gabor Szappanos awarded for AKBuilder research

Sophos Naked Security - 6 Říjen, 2017 - 16:00
The Péter Szőr award recognises the best piece of technical security research published each year

U.S. Believes Russian Spies Used Kaspersky Antivirus to Steal NSA Secrets

The Hacker News - 6 Říjen, 2017 - 15:43
Do you know—United States Government has banned federal agencies from using Kaspersky antivirus software over spying fear? Though there's no solid evidence yet available, an article published by WSJ claims that the Russian state-sponsored hackers stole highly classified NSA documents from a contractor in 2015 with the help of a security program made by Russia-based security firm Kaspersky Lab
Kategorie: Hacking & Security

IoT: Hacking a Smart Bulb with Bluetooth – Advanced

InfoSec Institute Resources - 6 Říjen, 2017 - 14:00

This is the 2nd part of the Bluetooth hacking blog. I hope you have gone through the 1st part. If not, please go through it. Let’s start. Short Primer on CSR – In this section, we will be learning a bit about CSR and its interaction with the bulb so you get an idea how […]

The post IoT: Hacking a Smart Bulb with Bluetooth – Advanced appeared first on InfoSec Resources.

IoT: Hacking a Smart Bulb with Bluetooth – Advanced was first posted on October 6, 2017 at 7:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Analysis of Malicious Document 4

InfoSec Institute Resources - 6 Říjen, 2017 - 14:00

In the last part of this article series, we have seen the structure of PDF document and all the essential keywords which can be used by analysts to carry investigations and are also used by various tools to depict the nature of the document being analyzed. Below is a refresher of important keyword concerning PDF […]

The post Analysis of Malicious Document 4 appeared first on InfoSec Resources.

Analysis of Malicious Document 4 was first posted on October 6, 2017 at 7:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Cyber – Bullying Threats, Prevention, and Solutions

InfoSec Institute Resources - 6 Říjen, 2017 - 14:00

Description: Dr. Sameer Hinduja and Dr. Justin Patchin at the Cyberbullying Research Center define cyberbullying as “willful and continuous harm done using any electronic devices such as a computer, cell phone, etc.” and it is especially popular among teenagers. Cyberstalking and cyber-harassment are forms of cyberbullying perpetrated mostly by adults. The professor of children’s mental […]

The post Cyber – Bullying Threats, Prevention, and Solutions appeared first on InfoSec Resources.

Cyber – Bullying Threats, Prevention, and Solutions was first posted on October 6, 2017 at 7:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Apple Allows Uber to Use a Powerful Feature that Lets it Record iPhone Screen

The Hacker News - 6 Říjen, 2017 - 13:41
If you are an iPhone user and use Uber app, you would be surprised to know that widely popular ride-hailing app can record your screen secretly. Security researcher Will Strafach recently revealed that Apple selectively grants (what's known as an "entitlement") Uber a powerful ability to use the newly introduced screen-recording API with intent to improve the performance of the Uber app on
Kategorie: Hacking & Security

Suspected Dark Web drug dealer undone by his own beard

Sophos Naked Security - 6 Říjen, 2017 - 13:13
You can't hide behind your beard, even on the dark web

Nejobávanější trojský kůň může za každý 13. útok v Česku

Novinky.cz - bezpečnost - 6 Říjen, 2017 - 13:07
Jedním z nejobávanějších virů současnosti je trojský kůň Chromex. Několik posledních měsíců se totiž pravidelně umísťoval na předních příčkách žebříčku nejrozšířenějších škodlivých kódů, v září mu dokonce kraloval – může za každý 13. útok v Česku. Vyplývá to z pravidelné statistiky antivirové společnosti Eset.
Kategorie: Hacking & Security

Update your Androids, the October patches are out

Sophos Naked Security - 6 Říjen, 2017 - 12:51
It's time to give Android's Media Framework some TLC

On encryption, the UK sets a collision course with Europe

LinuxSecurity.com - 6 Říjen, 2017 - 12:17
LinuxSecurity.com: Is encryption a threat to law and order, or an essential tool for staying secure online? Two events this week show how much disagreement there still is about it.
Kategorie: Hacking & Security

Severe flaws in DNS app create hacking risk for routers, smartphones, computers, IoT

LinuxSecurity.com - 6 Říjen, 2017 - 12:15
LinuxSecurity.com: Google researchers disclosed seven serious flaws in an open-source DNS software package Dnsmasq, which is is commonly preinstalled on routers, servers, smartphones, IoT devices and operating systems such the Linux distributions Ubuntu and Debian. The most severe of the vulnerabilities could be remotely exploited to run malicious code and hijack the device.
Kategorie: Hacking & Security

Another W3C API exposing users to browser snitching

LinuxSecurity.com - 6 Říjen, 2017 - 12:12
LinuxSecurity.com: Yet another W3C API can be turned against the user, privacy boffin Lukasz Olejnik has warned - this time, it's in how browsers store and check credit card data.
Kategorie: Hacking & Security

Step aside, Windows! Open source and Linux are IT's new security headache

LinuxSecurity.com - 6 Říjen, 2017 - 11:52
LinuxSecurity.com: Windows has long been the world's biggest malware draw, exploited for decades by attackers. It continues today: The Carbon Black security firm analyzed 1,000 ransomware samples over the last six months and found that nearly 99% of them targeted Windows.
Kategorie: Hacking & Security
Syndikovat obsah