Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

Některé Tesly samovolně zrychlují, tvrdí petice. Úřady problém vyšetřují, novináři řidičům nevěří

Zive.cz - bezpečnost - 20 Leden, 2020 - 20:00
Americká Národní správa bezpečnosti silničního provozu (NHTSA) řeší petici, která obviňuje automobilku Tesla z toho, že některé její vozy mají závadu, projevující se samovolným zrychlováním. To v konečném důsledku může vést k nehodě s následky v podobě škod na majetku i na zdraví. Podle ...
Kategorie: Hacking & Security

The Performance Cost To SELinux On Fedora 31>

LinuxSecurity.com - 20 Leden, 2020 - 15:53
Following the recent AppArmor performance regression in Linux 5.5 (since resolved), some Phoronix readers had requested tests out of curiosity in looking at the performance impact of Fedora's decision to utilize SELinux by default. Here is how the Fedora Workstation 31 performance compares out-of-the-box with SELinux to disabling it.
Kategorie: Hacking & Security

Amazon’s Ring blamed hacks on consumers reusing their passwords. A lawsuit says that’s not true.>

LinuxSecurity.com - 20 Leden, 2020 - 15:48
Are you an Amazon Ring user? Plaintiffs suing the company say they created unique passwords but were hacked anyway, and that Ring's devices lack widely adopted security and privacy precautions. 
Kategorie: Hacking & Security

Citrix Releases Patches for Critical ADC Vulnerability Under Active Attack

The Hacker News - 20 Leden, 2020 - 15:24
Citrix has finally started rolling out security patches for a critical vulnerability in ADC and Gateway software that attackers started exploiting in the wild earlier this month after the company announced the existence of the issue without releasing any permanent fix. I wish I could say, "better late than never," but since hackers don't waste time or miss any opportunity to exploit
Kategorie: Hacking & Security

NIST CSF core functions: Detect

InfoSec Institute Resources - 20 Leden, 2020 - 15:01

Introduction The National Institute of Standards and Technology’s Cybersecurity Framework, or NIST CSF, was first published in 2014 to provide guidance for organizational cybersecurity defenses and risk management. This framework is renowned for its inherent flexibility and open-endedness to account for different organizational needs.  At its center, NIST CSF is comprised of five core functions. […]

The post NIST CSF core functions: Detect appeared first on Infosec Resources.

NIST CSF core functions: Detect was first posted on January 20, 2020 at 8:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

MITRE ATT&CK: Supply chain compromise

InfoSec Institute Resources - 20 Leden, 2020 - 15:00

Introduction Attackers are well known to install malicious software, or malware, onto compromised systems during a cyberattack. But what many may not know is that this is not the first opportunity attackers may have to sneak malware onto a machine. The supply chain that provides systems for organizations is also at risk of attack.  This […]

The post MITRE ATT&CK: Supply chain compromise appeared first on Infosec Resources.

MITRE ATT&CK: Supply chain compromise was first posted on January 20, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Evaluating Your Security Controls? Be Sure to Ask the Right Questions

The Hacker News - 20 Leden, 2020 - 13:22
Testing security controls is the only way to know if they are truly defending your organization. With many different testing frameworks and tools to choose from, you have lots of options. But what do you specifically want to know? And how are the findings relevant to the threat landscape you face at this moment? "Decide what you want to know and then choose the best tool for the job."
Kategorie: Hacking & Security

FBI seizes credentials-for-sale site WeLeakInfo.com

Sophos Naked Security - 20 Leden, 2020 - 13:21
The FBI has seized the domain for WeLeakInfo.com, a site that sold breached data records, after a multinational effort by law enforcement.

FBI to inform election officials about hacking attempts

Sophos Naked Security - 20 Leden, 2020 - 12:58
The FBI has announced that it will tell local election officials when hackers try to infiltrate their systems.

Teen entered ‘dark rabbit hole of suicidal content’ online

Sophos Naked Security - 20 Leden, 2020 - 12:49
Molly Russell's grieving father has backed a psychiatrists' report, saying that tech companies must be forced to hand over anonymized data.

Facebook and Instagram ban alleged ‘brainwashing’ service

Sophos Naked Security - 20 Leden, 2020 - 11:57
The Spinner personalises “subconscious influencing” for a specific target.

Monday review – the hot 27 stories of the week

Sophos Naked Security - 20 Leden, 2020 - 11:16
From nasty snakes to rickrolling the NSA, get up to date with everything we've written in the last seven days - it's weekly roundup time.

How Women’s Society of Cyberjutsu is diversifying security | Cyber Work Podcast

InfoSec Institute Resources - 20 Leden, 2020 - 09:00

Mari Galloway, CEO of Women’s Society of Cyberjutsu, and Cyber Work podcast host Chris Sienko discuss Mari’s career journey, the ethos of Women’s Society of Cyberjutsu, and insights on how to diversify the cybersecurity workforce. – View the transcript, additional episodes and promotional offers: https://www.infosecinstitute.com/podcast – Election security training: https://www.infosecinstitute.com/iq/election-security-training/ – Join us in the fight […]

The post How Women’s Society of Cyberjutsu is diversifying security | Cyber Work Podcast appeared first on Infosec Resources.

How Women’s Society of Cyberjutsu is diversifying security | Cyber Work Podcast was first posted on January 20, 2020 at 2:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Microsoft Warns of Unpatched IE Browser Zero-Day That's Under Active Attacks

The Hacker News - 18 Leden, 2020 - 16:56
Internet Explorer is dead, but not the mess it left behind. Microsoft earlier today issued an emergency security advisory warning millions of Windows users of a new zero-day vulnerability in Internet Explorer (IE) browser that attackers are actively exploiting in the wild — and there is no patch yet available for it. The vulnerability, tracked as CVE-2020-0674 and rated moderated, is a remote
Kategorie: Hacking & Security

New JhoneRAT Malware Targets Middle East

Threatpost - 17 Leden, 2020 - 23:01
Researchers say that JhoneRAT has various anti-detection techniques - including making use of Google Drive, Google Forms and Twitter.
Kategorie: Hacking & Security

Feds Cut Off Access to Billions of Breached Records with Site Takedown

Threatpost - 17 Leden, 2020 - 22:46
The WeLeakInfo "data breach notification" domain is no more.
Kategorie: Hacking & Security

Mobile Carrier Customer Service Ushers in SIM-Swap Fraud

Threatpost - 17 Leden, 2020 - 22:03
Weak challenge questions by customer service reps make it easy for fraudsters to hijack a phone line and bypass 2FA to breach accounts.
Kategorie: Hacking & Security

Threatpost Poll: Are Published PoC Exploits a Good or Bad Idea?

Threatpost - 17 Leden, 2020 - 19:39
Are publicly released proof-of-concept exploits more helpful for system defenders -- or bad actors?
Kategorie: Hacking & Security

News Wrap: PoC Exploits, Cable Haunt and Joker Malware

Threatpost - 17 Leden, 2020 - 19:03
Are publicly-released PoC exploits good or bad? Why is the Joker malware giving Google a headache? The Threatpost team discusses all this and more in this week's news wrap.
Kategorie: Hacking & Security

5 tips to avoid spear-phishing attacks

Sophos Naked Security - 17 Leden, 2020 - 18:48
Our tips will help you boost your resistance to phishing, even when the crooks make a determined effort to reel you in.
Syndikovat obsah