Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

Apple využívá své kontroly nad iOS. Vývojáři musí povinně integrovat přihlašování skrze Apple ID

Zive.cz - bezpečnost - 17 Září, 2019 - 09:00
Apple na letošní vývojářské konferenci představil novou službu Sign in with Apple, která je konkurencí pro klasické přihlašování skrze třetí strany, typicky Facebook či Google účet. Nyní musí vývojáři pro iOS tuto službu nabízet povinně, pokud jejich aplikace registraci a přihlašování skrze ...
Kategorie: Hacking & Security

Internet věcí jako bezpečnostní problém. Chytrá elektronika bude stát za čtvrtinou útoků

Novinky.cz - bezpečnost - 17 Září, 2019 - 07:46
Do roku 2025 bude více než čtvrtina všech počítačových útoků proti podnikům založena na internetu věcí (IoT). Důvodem je to, že výrobci zanedbávají u těchto zařízení kvalitní zabezpečení, většinou kvůli úspoře nákladů. Uživatelé pak podceňují nebo vůbec neřeší aktualizace. Shodli se na tom účastníci konference HackerFest 2019.
Kategorie: Hacking & Security

Marketing Analytics Company Leaks Deep Profiles of Entire Ecuador Population

Threatpost - 16 Září, 2019 - 20:58
Julian Assange is among those impacted.
Kategorie: Hacking & Security

Asus, Lenovo and Other Routers Riddled with Remotely Exploitable Bugs

Threatpost - 16 Září, 2019 - 19:48
Independent researchers found 125 different CVEs across 13 different router and NAS models.
Kategorie: Hacking & Security

U.S. Sanctions North Korean Group Behind WannaCry, Sony Hacks

Threatpost - 16 Září, 2019 - 17:51
Three North Korean threat groups have been sanctioned in the U.S. as part of a larger U.S. initiative against North Korea-linked malicious cyber activity.
Kategorie: Hacking & Security

C Code in Assembly

InfoSec Institute Resources - 16 Září, 2019 - 16:13

Introduction Reverse engineering analysts have a good grasp of C code language and how it’s converted into assembly listings. C code was designed to function as a short form of assembly language, which, despite being time-consuming to code, had inherent efficiencies. C code was able to capitalize on some of these efficiencies by employing code […]

The post C Code in Assembly appeared first on Infosec Resources.

C Code in Assembly was first posted on September 16, 2019 at 9:13 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

New Threat Actor Fraudulently Buys Digital Certificates to Spread Malware

Threatpost - 16 Září, 2019 - 15:13
ReversingLabs identified cybercriminals duping certificate authorities by impersonating legitimate entities and then selling the certificates on the black market.
Kategorie: Hacking & Security

Getting started with ethical hacking

InfoSec Institute Resources - 16 Září, 2019 - 15:02

Introduction In this article, we’ll discuss the ways that even complete beginners with no security background can get into ethical hacking. In case you are considering ethical hacking as a career, we will discuss important educational and experience-based considerations as you attempt to choose the right path to lead you to the ethical hacking career […]

The post Getting started with ethical hacking appeared first on Infosec Resources.

Getting started with ethical hacking was first posted on September 16, 2019 at 8:02 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Hack the Box (HTB) machines walkthrough series — FriendZone

InfoSec Institute Resources - 16 Září, 2019 - 15:01

Today, we will be continuing with our exploration of Hack the Box (HTB) machines as seen in previous articles. This walkthrough is of an HTB machine named FriendZone. HTB is an excellent platform that hosts machines belonging to multiple OSes. It also has some other challenges as well. Individuals have to solve the puzzle (simple […]

The post Hack the Box (HTB) machines walkthrough series — FriendZone appeared first on Infosec Resources.

Hack the Box (HTB) machines walkthrough series — FriendZone was first posted on September 16, 2019 at 8:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Malware: What are rootkits?

InfoSec Institute Resources - 16 Září, 2019 - 15:00

Introduction Those looking to take advantage of computer users dream of being able to access computer systems of others without being detected. Couple that with elevated privileges, and you have yourself a veritable attacker’s fantasy. That is probably why so many attackers and cybercriminals rely on rootkits to make their dreams come true.  This article […]

The post Malware: What are rootkits? appeared first on Infosec Resources.

Malware: What are rootkits? was first posted on September 16, 2019 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

How Cloud-Based Automation Can Keep Business Operations Secure

The Hacker News - 16 Září, 2019 - 13:57
The massive data breach at Capital One – America's seventh-largest bank, according to revenue – has challenged many common assumptions about cloud computing for the first time. Ironically, the incident, which exposed some 106 million Capital One customers' accounts, has only reinforced the belief that the cloud remains the safest way to store sensitive data. "You have to compare [the cloud]
Kategorie: Hacking & Security

iPhone lockscreen bypass: iOS 13 tricked into showing your contacts

Sophos Naked Security - 16 Září, 2019 - 13:43
This time, José Rodríguez came up with a way to trick the iOS 13 beta into showing its address book without the need to unlock the screen.

Google fixes Chromebook 2FA flaw in ‘built-in security key’

Sophos Naked Security - 16 Září, 2019 - 13:35
Google has discovered a flaw in a Chromebook security feature which allows owners to press their device’s power button to initiate U2F 2FA.

Simjacker silent phone hack could affect a billion users

Sophos Naked Security - 16 Září, 2019 - 13:24
The shadowy world of phone-surveillance-for-hire became a little clearer last week following the discovery of a phone exploit called Simjacker.

Tiny Pacific nation forges ahead with national cryptocurrency

Sophos Naked Security - 16 Září, 2019 - 13:00
The Marshall Islands is facing rising seas and financial isolation. But critics say their get-rich-quick cryptocurrency scheme won't work.

Google fixes Chromebook 2FA flaw in built-in security key'

LinuxSecurity.com - 16 Září, 2019 - 12:28
Are you a Chromebook user? Google has discovered a serious flaw in a Chromebook security feature which allows owners to press their devices power button to initiate U2F two-factor authentication (2FA). Learn more:
Kategorie: Hacking & Security

How Cloud-Based Automation Can Keep Business Operations Secure

LinuxSecurity.com - 16 Září, 2019 - 12:15
Cloud computing has the potential to greatly improve an organization's security posture; however, many companies have the tendency to become overly-reliant on cloud computing services like Amazon Web Services to oversee all aspects of security, instead of taking full responsibility for their data security. Learn more:
Kategorie: Hacking & Security

Monday review – the hot 23 stories of the week

Sophos Naked Security - 16 Září, 2019 - 11:28
From Intel's SSH-stealing NetCAT bug to Mozilla's VPN - and everything in between. It's the weekly roundup.

Kdo útočil na australský parlament? Stopy vedou do Číny

Novinky.cz - bezpečnost - 16 Září, 2019 - 11:01
Čína stála za hackerským útokem na australský parlament a tři největší politické strany před květnovými parlamentními volbami. Zjištění vyplývá ze zprávy australských tajných služeb, o níž v pondělí s odvoláním na zdroje obeznámené s obsahem dokumentu informovala agentura Reuters.
Kategorie: Hacking & Security

Alissa Knight talks API security, formjacking and hacking | Cyber Work Podcast

InfoSec Institute Resources - 16 Září, 2019 - 09:00

Alissa Knight, Senior Analyst at Aite Group, discusses API security, the Magecart hacking group, recent breaches, formjacking skimmers and her upcoming book. In the podcast, Knight and host Chris Sienko discuss: – What’s been happening since you’ve been on the podcast last? (3:10) – You’ve been on an international tour, sharing vulnerabilities you’ve discovered on […]

The post Alissa Knight talks API security, formjacking and hacking | Cyber Work Podcast appeared first on Infosec Resources.

Alissa Knight talks API security, formjacking and hacking | Cyber Work Podcast was first posted on September 16, 2019 at 2:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security
Syndikovat obsah