Forwarded from Derecho de la Red
📧 "Roban credenciales de Gmail a través de phising de LinkedIn"
https://www.hackread.com/linkedin-phishing-scam-stealing-gmail-data-via-google-doc/
https://www.hackread.com/linkedin-phishing-scam-stealing-gmail-data-via-google-doc/
HackRead
LinkedIn Phishing Scam Steals Gmail Credentials Through Google Docs
LinkedIn, a business and employment-oriented social networking website contain personal information of more than 500 million users from around the world ma
Forwarded from Derecho de la Red
☠️ "Nueva modalidad delictiva: "Sé quien eres", la estafa de Instagram que persigue a los adolescentes."
http://www.lasexta.com/noticias/ciencia-tecnologia/robos-secuestros-y-ciberacoso-el-peligro-de-se-quien-eres-la-nueva-estafa-de-instagram-que-persigue-a-los-adolescentes_2017091859bfd81a0cf209c229bcfd6c.html
http://www.lasexta.com/noticias/ciencia-tecnologia/robos-secuestros-y-ciberacoso-el-peligro-de-se-quien-eres-la-nueva-estafa-de-instagram-que-persigue-a-los-adolescentes_2017091859bfd81a0cf209c229bcfd6c.html
laSexta.com
Robos, secuestros y ciberacoso: el peligro de 'sé quién eres', la estafa de Instagram que persigue a los adolescentes
El último timo de Instagram se beneficia de la información personal publicada diariamente en esta red social. El punto de mira son los adolescentes y el cebo adivinar quiénes son y qué les gusta. Pero ¿cuál es el objetivo?
HVACKer - Bridging the Air-Gap by Manipulating the Environment Temperature
by Yisroel Mirsky and Mordechai Guri and Yuval Elovici
http://www.sicherheitsforschung-magdeburg.de/uploads/journal/MJS_055_Mirsky_AirgapTemperature.pdf
by Yisroel Mirsky and Mordechai Guri and Yuval Elovici
http://www.sicherheitsforschung-magdeburg.de/uploads/journal/MJS_055_Mirsky_AirgapTemperature.pdf
Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malicious sample and automatically generates a list of mutexes that could be used to as “vaccines” against the sample.
https://github.com/MinervaLabsResearch/Mystique
https://github.com/MinervaLabsResearch/Mystique
GitHub
MinervaLabsResearch/Mystique
Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malicious sample and automatically generates a list of mutexes tha...
Un buen sitio para resolver alguna duda tecnica que tengais sobre algo en concreto es el stackexchange sobre seguridad informática, que os recomendamos desde aqui.
https://security.stackexchange.com
https://security.stackexchange.com
Information Security Stack Exchange
Q&A for information security professionals
Supongo que si seguís el canal es porque entendéis la importancia de la seguridad en un entorno conectado permanentemente a Internet.
Una de las capas de seguridad es utilizar una VPN.
Aquí tenéis unas guías-tutoriales para que podáis configurar VPN en distintos SO:
"Cómo configurar una VPN PPTP en Ubuntu" https://www.xatakamovil.com/conectividad/como-configurar-una-vpn-pptp-en-ubuntu
"Cómo crear nuestra propia red VPN en Ubuntu" https://www.xatakamovil.com/conectividad/como-crear-nuestra-propia-red-vpn-en-ubuntu
"Cómo configurar una VPN PPTP en Windows 7" https://www.xatakamovil.com/conectividad/como-configurar-una-vpn-pptp-en-windows-7
"Cómo crear nuestra propia red VPN en Windows 7" https://www.xatakamovil.com/conectividad/como-crear-nuestra-propia-red-vpn-en-windows-7
"Cómo configurar una VPN PPTP en OS X Lion" https://www.xatakamovil.com/conectividad/como-configurar-una-vpn-pptp-en-os-x-lion
Una de las capas de seguridad es utilizar una VPN.
Aquí tenéis unas guías-tutoriales para que podáis configurar VPN en distintos SO:
"Cómo configurar una VPN PPTP en Ubuntu" https://www.xatakamovil.com/conectividad/como-configurar-una-vpn-pptp-en-ubuntu
"Cómo crear nuestra propia red VPN en Ubuntu" https://www.xatakamovil.com/conectividad/como-crear-nuestra-propia-red-vpn-en-ubuntu
"Cómo configurar una VPN PPTP en Windows 7" https://www.xatakamovil.com/conectividad/como-configurar-una-vpn-pptp-en-windows-7
"Cómo crear nuestra propia red VPN en Windows 7" https://www.xatakamovil.com/conectividad/como-crear-nuestra-propia-red-vpn-en-windows-7
"Cómo configurar una VPN PPTP en OS X Lion" https://www.xatakamovil.com/conectividad/como-configurar-una-vpn-pptp-en-os-x-lion
Xataka Móvil
Cómo configurar una VPN PPTP en Ubuntu
En este tutorial aprenderemos a configurar una red VPN PPTP en Ubuntu 11.10, de modo que podamos conectarnos a una red segura y navegar con total seguridad
Forwarded from canyoupwn.me
Malware Analysis Cheats And Tools list
http://haxf4rall.com/2017/05/31/malware-analysis-cheats-and-tools-list/
http://haxf4rall.com/2017/05/31/malware-analysis-cheats-and-tools-list/
Haxf4rall
Malware Analysis Tools and Cheat list
A large number of computer intrusions involve some form of malicious software (malware), which finds its way to the victim’s workstation or to a server. When investigating the incident, the IT resp…
Forwarded from Underc0de Links via @like
Asi son las fases que sigue el CCleaner con malware incrustado.
Forwarded from x000's Channel
https://www.youtube.com/watch?v=JsTptu56GM8
How Computers Compress Text: Huffman Coding and Huffman Trees
Online YouTube video.
How Computers Compress Text: Huffman Coding and Huffman Trees
Online YouTube video.
YouTube
How Computers Compress Text: Huffman Coding and Huffman Trees
Computers store text (or, at least, English text) as eight bits per character. There are plenty of more efficient ways that could work: so why don't we use them? And how can we fit more text into less space? Let's talk about Huffman coding, Huffman trees…
Forwarded from x000's Channel
https://medium.com/towards-data-science/deep-learning-basic-mathematics-for-deep-learning-a82981e95e3b
Basic Mathematics for Deep Learning.
Blog post.
Basic Mathematics for Deep Learning.
Blog post.
Medium
Deep Learning: Basic Mathematics for Deep Learning
Before getting started with neural networks and deep learning, lets discuss about the basic mathematics required to understand them.