Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

Linux 5.6 Ships With Broken Intel WiFi Driver After Network Security Fixes Go Awry>

LinuxSecurity.com - 30 Březen, 2020 - 15:43
The Linux 5.6 kernel has been released - but you probably want to hold off on this release if you use the Intel "IWLWIFI" WiFi driver. Learn why in an informative Phoronix article.
Kategorie: Hacking & Security

How hackers check to see if your website is hackable

InfoSec Institute Resources - 30 Březen, 2020 - 15:01

Introduction “Memento mori” is Latin for “Remember that you are mortal.” According to tradition, this phrase was whispered to triumphant Roman military commanders on parades, to remind them they remained fallible humans.  In these times, perhaps the tradition should be updated to whispering “you will be hacked” into the ears of website administrators. This may […]

The post How hackers check to see if your website is hackable appeared first on Infosec Resources.

How hackers check to see if your website is hackable was first posted on March 30, 2020 at 8:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Ethical hacking: Stealthy network recon techniques

InfoSec Institute Resources - 30 Březen, 2020 - 15:00

Introduction In this article, we shall discuss some stealthy reconnaissance techniques that should be employed during a hacking exercise. It’s important to know which scan to use, especially when you are getting blacklisted or having your scan results filtered out.  Many hackers use tools such as nmap without properly understanding what certain switches mean and […]

The post Ethical hacking: Stealthy network recon techniques appeared first on Infosec Resources.

Ethical hacking: Stealthy network recon techniques was first posted on March 30, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Chrome may bring back ‘www’ with option to show full URLs

Sophos Naked Security - 30 Březen, 2020 - 14:41
Google's doing so grudgingly: it still thinks that showing too much will confuse users trying to assess a site's security.

AppTrana Offers Protection to Online Businesses During Coronavirus Outbreak

The Hacker News - 30 Březen, 2020 - 14:22
These are unprecedented times, and everyone is going through a testing period, with more than 3 billion people locked down all over the world. Businesses are scrambling to stay afloat and are forced to move digital in a very short span of time without much preparation. As these businesses move digital, cyber threats are more real than ever. Every day we are hearing news about hackers taking
Kategorie: Hacking & Security

How to configure VPN in Windows 10

InfoSec Institute Resources - 30 Březen, 2020 - 14:20

Introduction This article defines Virtual Private Network (VPN) and the three basic connection types of VPN: remote user, third-party to mask source IP and user activities, and site-to-site-VPN. It also illustrates how remote user VPN is established using in-built Windows 10 VPN client. This article is designed for professionals and self-starters who want to understand […]

The post How to configure VPN in Windows 10 appeared first on Infosec Resources.

How to configure VPN in Windows 10 was first posted on March 30, 2020 at 7:20 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Should governments track your location to fight COVID-19?

Sophos Naked Security - 30 Březen, 2020 - 14:00
Google Maps data could help governments track patients that a newly-diagnosed COVID-19 sufferer has been in contact with.

Google sent ~40K warnings to targets of state-backed attackers in 2019

Sophos Naked Security - 30 Březen, 2020 - 13:50
Google has seen a rising number of attackers impersonating news outlets and journalists to spread fake news among other reporters.

Monday review – the hot 22 stories of the week

Sophos Naked Security - 30 Březen, 2020 - 11:41
From the return of the Martinelli WhatsApp hoax to the takedown of hacker forum Deer.io - and everything in between. It's roundup time.

NÚKIB varuje: Aktuální vlna solidarity okolo COVID-19 nesmí obalamutit ajťáky

Zive.cz - bezpečnost - 30 Březen, 2020 - 10:09
Národní úřad pro kybernetickou a informační bezpečnost, respektive jeho Národní centrum kybernetické bezpečnosti, na svém webu varuje před některými riziky spojenými s aktuální vlnou solidarity napříč republikou. Lidé totiž nešijí pouze roušky a netisknou jen ochranné štíty pro zdravotníky, ale ...
Kategorie: Hacking & Security

Podvodných e-shopů s rouškami přibývá, varovali bezpečnostní experti

Novinky.cz - bezpečnost - 30 Březen, 2020 - 09:54
V Česku i Evropě přibývá podvodných e-shopů, které zneužívají situace a strachu veřejnosti v souvislosti s koronavirem. Zpravidla nabízejí nedostatkové roušky, ve skutečnosti se však snaží z důvěřivců dostat jejich osobní údaje a v některých případech také peníze. Upozornili na to bezpečnostní experti z antivirové společnosti Eset.
Kategorie: Hacking & Security

Hackers Exploit Zero-Day Bugs in Draytek Devices to Target Enterprise Networks

The Hacker News - 29 Březen, 2020 - 20:22
Cybersecurity researchers with Qihoo 360's NetLab today unveiled details of two recently spotted zero-day cyberattack campaigns in the wild targeting enterprise-grade networking devices manufactured by Taiwan-based DrayTek. According to the report, at least two separate groups of hackers exploited two critical remote command injection vulnerabilities (CVE-2020-8515) affecting DrayTek Vigor
Kategorie: Hacking & Security

Kritická zranitelnost ohrožuje uživatele Windows 7

Novinky.cz - bezpečnost - 28 Březen, 2020 - 15:33
Kritickou bezpečnostní chybu ve Windows odhalili tento týden bezpečnostní výzkumníci. Týká se nejen nejnovějších desítek, ale také starších a již nepodporovaných systémů, jako je například Windows 7. Pro starší verze svého systému již Microsoft aktualizaci nevydá, varoval český Národní bezpečnostní tým CSIRT.CZ.
Kategorie: Hacking & Security

Kyberútoky na nemocnice nejsou nijak výjimečné

Novinky.cz - bezpečnost - 27 Březen, 2020 - 17:08
Na konci loňského roku se hackerům podařilo ochromit počítačové systémy benešovské nemocnice, letos pak přelstili zabezpečení nemocnice v Brně. Jak ukazuje analýza antivirové společnosti Kaspersky, podobné útoky nejsou ale ve světě vůbec výjimečné.
Kategorie: Hacking & Security

Apple Unpatched VPN Bypass Bug Impacts iOS 13, Warn Researchers

Threatpost - 27 Březen, 2020 - 16:43
The vulnerability can be exploited to reveal limited traffic data including a device’s IP address.
Kategorie: Hacking & Security

Android apps are snooping on your installed software

Sophos Naked Security - 27 Březen, 2020 - 15:25
Android apps are snooping on other software on your device - and that could tell shady advertising companies more about you than you'd like.

Firefox 76 will have option to enforce HTTPS-only connections

Sophos Naked Security - 27 Březen, 2020 - 15:22
The aim is to block the browser from reaching the small number of sites that cling to HTTP, closing security risks.

Race Condition Vulnerabilities

InfoSec Institute Resources - 27 Březen, 2020 - 14:52

Introduction to race conditions Race condition vulnerabilities are an artifact of parallel processing. The ability to run multiple different execution threads in parallel can create vulnerabilities that would not exist in single-threaded programs. The impact of these vulnerabilities range from exploitable errors to leakage of sensitive information via side effects, like in the Meltdown vulnerability. […]

The post Race Condition Vulnerabilities appeared first on Infosec Resources.

Race Condition Vulnerabilities was first posted on March 27, 2020 at 7:52 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Apple chystá přihlašování obličejem na MacBooky a iMacy. I počítače by měly dostat výřez obrazovky jako iPhone

Zive.cz - bezpečnost - 27 Březen, 2020 - 14:44
Apple představil své přihlašování obličejem Face ID v iPhonech již v roce 2017, prozatím se ale rozšířilo pouze do iPadů. Nyní se objevil patent, ve kterém firma ukazuje implementaci technologie v rámci Macbooků a iMaců. Přihlašování obličejem jako takové je poměrně staré – mezi první ...
Kategorie: Hacking & Security

Buffer Overflow Vulnerabilities

InfoSec Institute Resources - 27 Březen, 2020 - 14:19

Introduction to buffer overflows Buffer overflows are considered the most dangerous vulnerability according to the CWE Top 25 list in 2019. They received a score of 75.56, almost 30 full points higher than the second-ranking vulnerability (cross-site scripting). The reason for this high score is that a buffer overflow vulnerability, if exploited, grants an attacker […]

The post Buffer Overflow Vulnerabilities appeared first on Infosec Resources.

Buffer Overflow Vulnerabilities was first posted on March 27, 2020 at 7:19 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security
Syndikovat obsah