Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

Elsevier exposes users’ emails and passwords online

Sophos Naked Security - 20 Březen, 2019 - 12:40
The science publisher is blaming a misconfigured server that exposed a constant stream of its users’ credentials.

CUJO Smart Firewall vulnerabilities exposed home networks to critical attacks

LinuxSecurity.com - 20 Březen, 2019 - 11:32
Security researchers have uncovered a swathe of serious vulnerabilities in a firewall system developed by CUJO which has been designed to prevent cyberattackers from infiltrating home networks.
Kategorie: Hacking & Security

PuTTY Releases Important Software Update to Patch 8 High-Severity Flaws

The Hacker News - 20 Březen, 2019 - 10:41
The popular SSH client program PuTTY has released the latest version of its software that includes security patches for 8 high-severity security vulnerabilities. PuTTY is one of the most popular and widely used open-source client-side programs that allows users to remotely access computers over SSH, Telnet, and Rlogin network protocols. Almost 20 months after releasing the last version of
Kategorie: Hacking & Security

Cardinal RAT Resurrected to Target FinTech Firms

Threatpost - 19 Březen, 2019 - 22:07
A long-quiet malware family has been spotted targeting financial technology firms, armed with new obfuscation techniques to avoid detection.
Kategorie: Hacking & Security

Host of Flaws Found in CUJO Smart Firewall

Threatpost - 19 Březen, 2019 - 21:43
Some of the flaws would allow remote code-execution.
Kategorie: Hacking & Security

Podcast: The High-Risk Threats Behind the Norsk Hydro Cyberattack

Threatpost - 19 Březen, 2019 - 20:40
Threatpost talks to Phil Neray with CyberX about Tuesday's ransomware attack on aluminum producer Norsk Hydro, and how it compares to past manufacturing attacks like Triton, WannaCry and more.
Kategorie: Hacking & Security

Old Tech Spills Digital Dirt on Past Owners

Threatpost - 19 Březen, 2019 - 19:31
Researcher buys old computers, flash drives, phones and hard drives and finds only two properly wiped devices out of 85 examined.
Kategorie: Hacking & Security

Android Q — Google Adds New Mobile Security and Privacy Features

The Hacker News - 19 Březen, 2019 - 19:19
Google has recently released the first beta version of Android Q, the next upcoming version of Google's popular mobile operating system, with a lot of new privacy improvements and other security enhancements. Android Q, where Q has not yet been named, offers more control over installed apps, their access, and permissions, and location settings; more support for passive authentication like face
Kategorie: Hacking & Security

Youve Been Pwned! Best Practices to Prevent Your Email Account from Being Compromised in a Data Breach

LinuxSecurity.com - 19 Březen, 2019 - 19:12
An Interview with Dave Wreski, CEO of Guardian Digital
Kategorie: Hacking & Security

New scam accuses you of child abuse, offers to remove evidence

Sophos Naked Security - 19 Březen, 2019 - 19:06
This scam is both intimidating and disturbing - the crooks are presenting themselves as corrupt CIA officials who will take a bribe.

Ransomware Attack Forces Aluminum Manufacturer to Shutdown Systems Worldwide

The Hacker News - 19 Březen, 2019 - 18:05
Photo by Terje Pedersen / NTB scanpix One of the world's largest producers of aluminum has been forced to shut down several of its plants across Europe and the U.S. after an "extensive cyber attack" hit its operations, leaving companies' IT systems unusable. According to a press release shared by Aluminum giant Norsk Hydro today, the company has temporarily shut down several plants and
Kategorie: Hacking & Security

Researcher Says NSA’s Ghidra Tool Can Be Used for RCE

Threatpost - 19 Březen, 2019 - 16:26
Researchers have released a proof-of-concept showing how a XXE vulnerability can be exploited to attack Ghidra project users.
Kategorie: Hacking & Security

Norsk Hydro Calls Ransomware Attack ‘Severe’

Threatpost - 19 Březen, 2019 - 15:53
When asked if the company plans to pay the ransom, its CFO said its main strategy is to use the backup data stored in the system.
Kategorie: Hacking & Security

Microsoft won’t patch Windows registry warning problem

Sophos Naked Security - 19 Březen, 2019 - 15:52
A security researcher has found a way to tinker with Windows’ core settings while persuading users to accept the changes.

Gargantuan Gnosticplayers breach swells to 863 million records

Sophos Naked Security - 19 Březen, 2019 - 15:40
Another 26m records stolen from another six online companies brings this hacker's total number of records to 863m from 38 websites.

Top 30 Security Auditor Interview Questions and Answers for 2019

InfoSec Institute Resources - 19 Březen, 2019 - 14:03

Introduction Security auditors are an essential part of modern businesses. They help to facilitate and manage security changes in an organization, identify security threats and act as a valuable security resource for your IT systems and teams. Not all security auditor roles are internal ones, which means that many security auditors work at a consultancy […]

The post Top 30 Security Auditor Interview Questions and Answers for 2019 appeared first on Infosec Resources.

Top 30 Security Auditor Interview Questions and Answers for 2019 was first posted on March 19, 2019 at 8:03 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Protecting Against Social Engineering Attacks

InfoSec Institute Resources - 19 Březen, 2019 - 14:01

Most people think of hacking as using malware and coding to bypass security defenses and steal data or money. Social engineers take a different approach, targeting the human instead of the software to achieve their goals. How Social Engineering Works Social engineers take advantage of knowledge of human behavior to perform their attacks. A person’s […]

The post Protecting Against Social Engineering Attacks appeared first on Infosec Resources.

Protecting Against Social Engineering Attacks was first posted on March 19, 2019 at 8:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

DDoS Attacks 101

InfoSec Institute Resources - 19 Březen, 2019 - 14:00

Cybercrime is expected to cost businesses over $8 trillion over the next three years, according to the findings of a study by Juniper Research. But while large-scale phishing and ransomware attempts have many companies worried over internet security, there’s another type of cyberattack that’s on the rise — and it’s increasingly used by adversaries to […]

The post DDoS Attacks 101 appeared first on Infosec Resources.

DDoS Attacks 101 was first posted on March 19, 2019 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

ThreatList: DDoS Attack Sizes Drop 85 Percent Post FBI Crackdown

Threatpost - 19 Březen, 2019 - 13:00
The FBI's crackdown on 15 DDoS-for-hire sites appears to have had an impact on DDoS attacks, the average size for which dropped 85 percent in the fourth quarter of 2018, a new report found.
Kategorie: Hacking & Security

Court: Embarrassing leaks of internal Facebook emails are fishy

Sophos Naked Security - 19 Březen, 2019 - 12:50
The leaks point to a plot, a Calif. court said, ordering pikini app maker Six4Three to hand over its lawyers' chats with the ICO.
Syndikovat obsah