je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.


Detektory kouře s hlasem matky probudí děti lépe než siréna - bezpečnost - 3 Listopad, 2018 - 17:30
** Spící děti probudí lépe než zvuk detektoru kouře hlas jejich matky ** Rozdíl je přitom velmi markantní: 52 % proti 91 % ** Aplikace výsledků do výroby čidel může zachránit dětské životy
Kategorie: Hacking & Security

How is Cybercrime Impacting the Financial Sector? — CyberSpeak Podcast

InfoSec Institute Resources - 3 Listopad, 2018 - 02:09

On this episode of the CyberSpeak with InfoSec Institute podcast, Todd Weller, chief strategy officer at Bandura Systems, discusses cybercrime in the financial sector and how to build a security awareness program on a budget. In the podcast, Weller and host Chris Sienko discuss: How has cybersecurity in the financial sector changed over time? (1:15) […]

The post How is Cybercrime Impacting the Financial Sector? — CyberSpeak Podcast appeared first on InfoSec Resources.

How is Cybercrime Impacting the Financial Sector? — CyberSpeak Podcast was first posted on November 2, 2018 at 8:09 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at
Kategorie: Hacking & Security

Facebook Blames Malicious Extensions in Breach of 81K Private Messages

Threatpost - 2 Listopad, 2018 - 21:39
Investigators posed as buyers and were offered the messages at 10 cents per Facebook account.
Kategorie: Hacking & Security

Announcing some security treats to protect you from attackers’ tricks

Google Security Blog - 2 Listopad, 2018 - 18:53
Posted by Jonathan Skelker, Product Manager

It’s Halloween ???? and the last day of Cybersecurity Awareness Month ????, so we’re celebrating these occasions with security improvements across your account journey: before you sign in, as soon as you’ve entered your account, when you share information with other apps and sites, and the rare event in which your account is compromised.

We’re constantly protecting your information from attackers’ tricks, and with these new protections and tools, we hope you can spend your Halloween worrying about zombies, witches, and your candy loot—not the security of your account.

Protecting you before you even sign in
Everyone does their best to keep their username and password safe, but sometimes bad actors may still get them through phishing or other tricks. Even when this happens, we will still protect you with safeguards that kick-in before you are signed into your account.

When your username and password are entered on Google’s sign-in page, we’ll run a risk assessment and only allow the sign-in if nothing looks suspicious. We’re always working to improve this analysis, and we’ll now require that JavaScript is enabled on the Google sign-in page, without which we can’t run this assessment.

Chances are, JavaScript is already enabled in your browser; it helps power lots of the websites people use everyday. But, because it may save bandwidth or help pages load more quickly, a tiny minority of our users (0.1%) choose to keep it off. This might make sense if you are reading static content, but we recommend that you keep Javascript on while signing into your Google Account so we can better protect you. You can read more about how to enable JavaScript here.
Keeping your Google Account secure while you’re signed in
Last year, we launched a major update to the Security Checkup that upgraded it from the same checklist for everyone, to a smarter tool that automatically provides personalized guidance for improving the security of your Google Account.
We’re adding to this advice all the time. Most recently, we introduced better protection against harmful apps based on recommendations from Google Play Protect, as well as the ability to remove your account from any devices you no longer use.More notifications when you share your account data with apps and sites
It’s really important that you understand the information that has been shared with apps or sites so that we can keep you safe. We already notify you when you’ve granted access to sensitive information — like Gmail data or your Google Contacts — to third-party sites or apps, and in the next few weeks, we’ll expand this to notify you whenever you share any data from your Google Account. You can always see which apps have access to your data in the Security Checkup.
Helping you get back to the beginning if you run into trouble
In the rare event that your account is compromised, our priority is to help get you back to safety as quickly as possible. We’ve introduced a new, step-by-step process within your Google Account that we will automatically trigger if we detect potential unauthorized activity.
We'll help you:
  • Verify critical security settings to help ensure your account isn’t vulnerable to additional attacks and that someone can’t access it via other means, like a recovery phone number or email address.
  • Secure your other accounts because your Google Account might be a gateway to accounts on other services and a hijacking can leave those vulnerable as well.
  • Check financial activity to see if any payment methods connected to your account, like a credit card or Google Pay, were abused.
  • Review content and files to see if any of your Gmail or Drive data was accessed or mis-used.
Online security can sometimes feel like walking through a haunted house—scary, and you aren't quite sure what may pop up. We are constantly working to strengthen our automatic protections to stop attackers and keep you safe you from the many tricks you may encounter. During Cybersecurity Month, and beyond, we've got your back.
Kategorie: Hacking & Security

Cisco Security Appliance Zero-Day Found Actively Exploited in the Wild

Threatpost - 2 Listopad, 2018 - 17:50
A high severity zero-day flaw exists in Cisco System's SIP inspection engine.
Kategorie: Hacking & Security

Soukromé konverzace z Facebooku jsou na prodej, hackeři chtějí zpeněžit své úlovky - bezpečnost - 2 Listopad, 2018 - 17:18
Další způsob, jak hackeři nakládají s kradenými daty, odhalila tento týden televize BBC. Ruští útočníci podle ní vystavili na internet reklamu, že mají k prodeji tisíce soukromých zpráv z účtů Facebooku, které získali skrze infikovaný doplněk do prohlížeče. Reklamní nabídka se objevila na jednom ...
Kategorie: Hacking & Security

ThreatList: Fewer Big DDoS Attacks in Q3, Overall Rate Holds Steady

Threatpost - 2 Listopad, 2018 - 16:16
Meanwhile, Saturday now is the most “dangerous” day of the week for DDoS attacks.
Kategorie: Hacking & Security

Another day, another update, another iPhone lockscreen bypass

Sophos Naked Security - 2 Listopad, 2018 - 15:24
Researcher José Rodríguez beats the lockscreen to display contact phone numbers and email addresses.

Popular browsers made to cough up browsing history

Sophos Naked Security - 2 Listopad, 2018 - 14:42
Only one browser stood fast against a set of new browser history attacks.

První virus se šířil internetem před 30 lety. Způsobil milionové škody - bezpečnost - 2 Listopad, 2018 - 14:23
Přesně před 30 lety, ve středu 2. listopadu 1988, se začal internetem šířit vůbec první počítačový virus. Autor, tehdy 23letý student Cornellovy univerzity Robert Tappane Morris, s ním nechtěl škodit, přesto se nakonec musel z jeho šíření zodpovídat před soudem.
Kategorie: Hacking & Security

Hrozí vám exekuce, oprášili podvodníci starý trik - bezpečnost - 2 Listopad, 2018 - 13:59
Na pozoru by se měli mít lidé před e-maily, ve kterých se kybernetičtí podvodníci vydávají za zaměstnance exekutorského úřadu. V posledních dnech se s nimi totiž doslova roztrhl pytel, jak varovala Exekutorská komora.
Kategorie: Hacking & Security

Google’s stealthy sign-in sentry can pick up pilfered passwords

Sophos Naked Security - 2 Listopad, 2018 - 13:24
The search giant's secret sauce can see when somebody's using your stolen password.

Report reveals one-dimensional support for two-factor authentication

Sophos Naked Security - 2 Listopad, 2018 - 12:19
34 popular consumer websites were put to the 2FA test.

Hackeři se dostali k soukromým zprávám uživatelů Facebooku - bezpečnost - 2 Listopad, 2018 - 11:02
Hackeři se očividně dostali k soukromým zprávám nejméně 81 000 uživatelů Facebooku a zveřejnili je na webu. V pátek o tom informoval portál BBC, který uvedl, že internetoví piráti tvrdí, že jejich databáze čítá 120 000 facebookových účtů. Společnost Facebook, která stejnojmennou sociální síť provozuje, nicméně sdělila, že její bezpečnostní opatření narušena nebyla. Předpokládá se tedy, že hackeři informace získali pomocí škodlivých rozšíření internetových prohlížečů.
Kategorie: Hacking & Security

Accused CIA Leaker Faces New Charges of Leaking Information From Prison

The Hacker News - 2 Listopad, 2018 - 10:16
Joshua Adam Schulte, a 30-year-old former CIA computer programmer who was indicted over four months ago for masterminding the largest leak of classified information in the agency's history, has now been issued three new charges. The news comes just hours after Schulte wrote a letter to the federal judge presiding over his case, accusing officials at Manhattan Metropolitan Correctional Center of
Kategorie: Hacking & Security

Tesla v režimu autopilota nabourala do stojícího auta, majitel podává žalobu - bezpečnost - 2 Listopad, 2018 - 08:33
** Tesla Model S nabourala na dálnici do stojícího auta ** V tu chvíli jela v režimu autopilota, zatímco řidič odpočíval ** Hudson nyní žaluje Teslu, že slibuje něco, co neplní
Kategorie: Hacking & Security

Node 1: CTF Walkthrough

InfoSec Institute Resources - 1 Listopad, 2018 - 23:23

In this article, we will learn to solve a Capture the Flag (CTF) challenge which was posted on VulnHub by Rob. According to the information given in the description by the author of the challenge, this CTF is a medium-level boot-to-root challenge in which you need to capture two flags. The first flag needs to […]

The post Node 1: CTF Walkthrough appeared first on InfoSec Resources.

Node 1: CTF Walkthrough was first posted on November 1, 2018 at 5:23 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at
Kategorie: Hacking & Security

Yi IoT Home Camera Riddled with Code-Execution Vulnerabilities

Threatpost - 1 Listopad, 2018 - 22:50
Five of them allow remote compromise of the IoT gadgets, so attackers can intercept video feeds and more.
Kategorie: Hacking & Security

GDPR’s First 150 Days Impact on the U.S.

Threatpost - 1 Listopad, 2018 - 22:31
Weighing the impact of GDPR and how the historic legislation has shaped privacy protection measures in the U.S., so far.
Kategorie: Hacking & Security

Two New Bluetooth Chip Flaws Expose Millions of Devices to Remote Attacks

The Hacker News - 1 Listopad, 2018 - 19:48
Security researchers have unveiled details of two critical vulnerabilities in Bluetooth Low Energy (BLE) chips embedded in millions of access points and networking devices used by enterprises around the world. Dubbed BleedingBit, the set of two vulnerabilities could allow remote attackers to execute arbitrary code and take full control of vulnerable devices without authentication, including
Kategorie: Hacking & Security
Syndikovat obsah