Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

Námořní pěchota Spojených států amerických testuje novou paralyzující střelu s miniaturním padákem

Zive.cz - bezpečnost - 1 hodina 3 min zpět
Američtí mariňáci testují novou pozoruhodnou zbraň zvanou SPECTER (Small arms Pulsed Electronic Tetanization at Extended Range). Ta dokáže pomocí elektřiny paralyzovat cíl vzdálený až 100 metrů. Současné tasery mají dosah značně menší. SPECTER je v podstatě speciální projektil, který může být ...
Kategorie: Hacking & Security

BEC Hotshot with Opulent Social Media Presence to Face U.S. Charges

Threatpost - 7 Červenec, 2020 - 23:01
The Nigerian native has been extradited from Dubai after a string of over-the-top Instagram posts.
Kategorie: Hacking & Security

Keeper Threat Group Rakes in $7M from Hundreds of Compromised E-Commerce Sites

Threatpost - 7 Červenec, 2020 - 22:05
Researchers warn that Keeper, using Magecart code, will launch increasingly sophisticated attacks against online merchants worldwide in the coming months.
Kategorie: Hacking & Security

Cerberus Banking Trojan Unleashed on Google Play

Threatpost - 7 Červenec, 2020 - 18:27
The Cerberus malware can steal banking credentials, bypass security measures and access text messages.
Kategorie: Hacking & Security

Top 9 free security training tools

InfoSec Institute Resources - 7 Červenec, 2020 - 17:20

Cybersecurity training is one of the best defenses against cyber attacks targeting organizations and individuals alike. Although security training is a tried-and-true defense against cyber attacks and data breaches, security training is not one-size-fits all. Every organization faces unique threats based on their industry, cybersecurity tools and security policies and protocols. Every individual employee is […]

The post Top 9 free security training tools appeared first on Infosec Resources.

Top 9 free security training tools was first posted on July 7, 2020 at 10:20 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Citrix Bugs Allow Unauthenticated Code Injection, Data Theft

Threatpost - 7 Červenec, 2020 - 16:44
Admins should patch their Citrix ADC and Gateway installs immediately.
Kategorie: Hacking & Security

Company web names hijacked via outdated cloud DNS records

Sophos Naked Security - 7 Červenec, 2020 - 16:09
Why hack into a server when you can just send vistors to a fake alternative instead?

Credit-Card Skimmer Has Unlikely Target: Microsoft ASP.NET Sites

Threatpost - 7 Červenec, 2020 - 15:25
A campaign discovered by Malwarebytes Labs in mid-April has lifted credentials from a number of e-commerce portals.
Kategorie: Hacking & Security

Security risks of outdated encryption: Is your data really secure?

InfoSec Institute Resources - 7 Červenec, 2020 - 15:02

Introduction They say that those who fail to learn history are doomed to repeat it. A salient factor in the defeat of Austria by Prussia in the 1866 Austro-Prussian war was the Prussian army’s standardization of the (then) modern, rapid firing, bolt-action Dreyse needle-gun. In contrast, the Austrian army persisted with the use of outdated […]

The post Security risks of outdated encryption: Is your data really secure? appeared first on Infosec Resources.

Security risks of outdated encryption: Is your data really secure? was first posted on July 7, 2020 at 8:02 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Cookies: An overview of associated privacy and security risks

InfoSec Institute Resources - 7 Červenec, 2020 - 15:00

Introduction Anyone who regularly browses the internet must have seen some sort of pop-up or other form of alert about the use of cookies. Some sites even give you the option to accept cookies completely or only partially. So, there is an important question to answer: is it safe to enable cookies? In truth, the […]

The post Cookies: An overview of associated privacy and security risks appeared first on Infosec Resources.

Cookies: An overview of associated privacy and security risks was first posted on July 7, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Microsoft Launches Free Linux Forensics and Rootkit Malware Detection Service

The Hacker News - 7 Červenec, 2020 - 14:40
Microsoft has announced a new free-to-use initiative aimed at uncovering forensic evidence of sabotage on Linux systems, including rootkits and intrusive malware that may otherwise go undetected. The cloud offering, dubbed Project Freta, is a snapshot-based memory forensic mechanism that aims to provide automated full-system volatile memory inspection of virtual machine (VM) snapshots, with
Kategorie: Hacking & Security

First-Ever Russian BEC Gang, Cosmic Lynx, Uncovered

Threatpost - 7 Červenec, 2020 - 13:00
Researchers warn that Cosmic Lynx targets firms that don't use DMARC and uses a "mergers and acquisitions" pretext that can lead to large sums of money being stolen.
Kategorie: Hacking & Security

Flashy Nigerian Instagram star extradited to US to face BEC charges

Sophos Naked Security - 7 Červenec, 2020 - 11:27
It's a short jump from a Rolls Royce ride to extradition from the UAE. Goodbye, Dubai, goodbye, Palazzo Versace, hello, Chicago jail cell.

Kybernetické hrozby se nevyhýbají ani platformě macOS

Novinky.cz - bezpečnost - 7 Červenec, 2020 - 11:23
V souvislosti s bezpečnostními hrozbami se nejčastěji zmiňuje operační systém Windows. Kyberzločinci se na tuto platformu zaměřují jednoduše kvůli tomu, že je nejpopulárnější. To ale neznamená, že by se škodlivé kódy vyhýbaly konkurenčním systémům – záškodníci číhají také na macOS.
Kategorie: Hacking & Security

Facebook, WhatsApp a Telegram nedají údaje uživatelů v Hongkongu

Novinky.cz - bezpečnost - 7 Červenec, 2020 - 06:03
Provozovatelé sociálních či komunikačních sítí Facebook, WhatsApp a Telegram dali najevo, že odmítnou splnit požadavek čínských úřadů, aby jim poskytli data svých uživatelů v Hongkongu. Tyto webové platformy naznačily, že zvažují dopad kontroverzního nového bezpečnostního zákona, který pro autonomní oblast Hongkongu 30. června schválil Peking.
Kategorie: Hacking & Security

Android Users Hit with ‘Undeletable’ Adware

Threatpost - 6 Červenec, 2020 - 22:10
Researchers say that 14.8 percent of Android users who were targeted with mobile malware or adware last year were left with undeletable files.
Kategorie: Hacking & Security

Admins Urged to Patch Critical F5 Flaw Under Active Attack

Threatpost - 6 Červenec, 2020 - 21:06
Security experts and the U.S. Cyber Command are urging admins to update a critical flaw in F5 Networks, which is under active attack.
Kategorie: Hacking & Security

Lazarus Group Adds Magecart to the Mix

Threatpost - 6 Červenec, 2020 - 19:18
North Korea-based APT is targeting online payments made by American and European shoppers.
Kategorie: Hacking & Security

Purple Fox EK Adds Microsoft Exploits to Arsenal

Threatpost - 6 Červenec, 2020 - 17:21
Two exploits for Microsoft vulnerabilities have been added to the Purple Fox EK, showing ongoing development.
Kategorie: Hacking & Security

Cato MDR: Managed Threat Detection and Response Made Easy

The Hacker News - 6 Červenec, 2020 - 16:41
Lately, we can't help noticing an endless cycle where the more enterprises invest in threat prevention; the more hackers adapt and continue to penetrate enterprises. To make things worse, detecting these penetrations still takes too long with an average dwell time that exceeds 100 (!) days. To keep the enterprise protected, IT needs to figure out a way to break this endless cycle without
Kategorie: Hacking & Security
Syndikovat obsah