Del 12 al 15 de octubre se celebra #Hackmeeting17 Actividades: https://t.co/IZV17SeilK
Lugar: C/ Gobernador 39, Madrid -La Ingobernable-
Lugar: C/ Gobernador 39, Madrid -La Ingobernable-
Hackers Used Government Servers in DNSMessenger Attacks
http://feedproxy.google.com/~r/Securityweek/~3/3GpqAvvHyKE/hackers-used-government-servers-dnsmessenger-attacks
http://feedproxy.google.com/~r/Securityweek/~3/3GpqAvvHyKE/hackers-used-government-servers-dnsmessenger-attacks
Securityweek
Hackers Used Government Servers in DNSMessenger Attacks | SecurityWeek.Com
A recently discovered DNSMessenger campaign is abusing compromised U.S. state government servers to host malware, Cisco Talos security researchers say.
Hallada una vulnerabilidad grave en RubyGems que permite la ejecución de código en remoto
https://www.muyseguridad.net/2017/10/13/vulnerabilidad-grave-rubygems-codigo-remoto/
https://www.muyseguridad.net/2017/10/13/vulnerabilidad-grave-rubygems-codigo-remoto/
MuySeguridad
Hallada una vulnerabilidad grave en RubyGems que permite la ejecución de código en remoto
Hallada en RubyGems una deserialización de objetos inseguros que abría la puerta a la ejecución de código en remoto.
Project Zero
Over The Air - Exploiting The Wi-Fi Stack on #Apple Devices
https://googleprojectzero.blogspot.com.es/2017/09/over-air-vol-2-pt-1-exploiting-wi-fi.html
https://googleprojectzero.blogspot.com.es/2017/10/over-air-vol-2-pt-2-exploiting-wi-fi.html
https://googleprojectzero.blogspot.com.es/2017/10/over-air-vol-2-pt-3-exploiting-wi-fi.html
Over The Air - Exploiting The Wi-Fi Stack on #Apple Devices
https://googleprojectzero.blogspot.com.es/2017/09/over-air-vol-2-pt-1-exploiting-wi-fi.html
https://googleprojectzero.blogspot.com.es/2017/10/over-air-vol-2-pt-2-exploiting-wi-fi.html
https://googleprojectzero.blogspot.com.es/2017/10/over-air-vol-2-pt-3-exploiting-wi-fi.html
Blogspot
Over The Air - Vol. 2, Pt. 1: Exploiting The Wi-Fi Stack on Apple Devices
Posted by Gal Beniamini, Project Zero Earlier this year we performed research into Broadcom’s Wi-Fi stack. Due to the ubiquity of Broa...
Hash-Based Signatures
1: https://t.co/RJQr8vaiYw
2 : https://t.co/hGYKfnIkdz
3 : https://t.co/ylmsNpXCms
1: https://t.co/RJQr8vaiYw
2 : https://t.co/hGYKfnIkdz
3 : https://t.co/ylmsNpXCms
www.cryptologie.net
Hash-Based Signatures Part I: One-Time Signatures (OTS)
Lamport
On October 18th 1979, Leslie Lamport published his concept of One Time Signatures.
Most signature schemes rely in part on one-way functions, typically hash functions, for their security proofs. The beauty of Lamport scheme was that this signature…
On October 18th 1979, Leslie Lamport published his concept of One Time Signatures.
Most signature schemes rely in part on one-way functions, typically hash functions, for their security proofs. The beauty of Lamport scheme was that this signature…
Microsoft Office Attack Runs Malware Without Needing Macros
https://t.co/jJUrIiG0MM
#microsoft #office #infosec
https://t.co/jJUrIiG0MM
#microsoft #office #infosec
BleepingComputer
Microsoft Office Attack Runs Malware Without Needing Macros
Malware authors don't necessarily need to trick users to enable macros to run malicious code. An alternative technique exists, one that takes advantage of another legitimate Office feature.
#ENISA
European Union Agency for Network and Information Security.
https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material/technical-operational/
European Union Agency for Network and Information Security.
https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material/technical-operational/
DoubleLocker—A New Ransomware That Not Just Encrypts Your Data On Android But Also Changes Lock PIN
https://t.co/BbQASUhwkI
https://t.co/BbQASUhwkI
The Hacker News
New Ransomware Not Just Encrypts Your Android But Also Changes PIN Lock
DoubleLocker Android Ransomware Not Just Encrypts Your Android Phone But Also Changes Lock PIN
El Servicio de Seguridad de Ucrania alerta de una posible nueva situación similar a la de junio con el Petya
https://t.co/1QpgL0z8ZN
https://t.co/1QpgL0z8ZN
Otra visión del registro.
https://www.fwhibbit.es/otra-vision-del-registro-yo-lo-hago-con-registryexplorer-y-tu
https://www.fwhibbit.es/otra-vision-del-registro-yo-lo-hago-con-registryexplorer-y-tu
fwhibbit.es
Otra visión del Registro: Yo lo hago con #RegistryExplorer ¿Y tú?
Hola secuaces: Antes de empezar... quiero pedir disculpas por la extensión de este artículo. En mi defensa diré que contiene muchas imágenes…
Forwarded from Una al día
Multiples vulnerabilidades en JanTek JTC-200
http://unaaldia.hispasec.com/2017/10/multiples-vulnerabilidades-en-jantek.html
http://unaaldia.hispasec.com/2017/10/multiples-vulnerabilidades-en-jantek.html
Hispasec
Multiples vulnerabilidades en JanTek JTC-200
Boletín de noticias de seguridad informática unaaldia, ofrecido por Hispasec