Mauricio

1,714 Added | 1 Magazine | 9 Likes | 23 Followers | @immontilla | Mauricio Montilla Figueroa. Developer. Cyber Security Enthusiast. Madrid. Spain.

Locking Down PowerShell To Foil Attackers: 3 Essentials

Microsoft Taps Machine Learning To Better Combat Fileless Malware Jeremy Kirk (jeremy_kirk) • February 19, 2018<p>Microsoft's PowerShell scripting …

Machine Learning

HBO to dramatize Stuxnet cyber attack in upcoming drama

The Israeli-American cyber attack on Iran will be the focus of a new miniseries.<p>A man holds a laptop computer as cyber code is projected on him. …

Cybersecurity

Google disclosed Microsoft security flaw before a patch was ready

Google revealed a Microsoft Edge security flaw, before a patch is available, on Monday. While this particular security issue probably wouldn’t have …

Information Security

Google found another bug in Microsoft’s Edge browser

Google tasks its Project Zero time with finding security issues and loopholes within other companies' products, and they're pretty effective at what they do. Now, Google has made public a medium-level security issue within Microsoft's Edge browser. The vulnerability was first discovered back in …

Information Security

How to Stop Ads from Hijacking Your iOS Browser

If I had a dollar for every time my iPhone's browser was redirected to a spam page offering free stuff, I'd be able to afford all the gadgets I want. …

Consumer Tech

Reweaving the Web

The movement to decentralize the Internet<p>Last spring, the government of <b>Turkey</b> did a terrible thing: It blocked its citizens’ access to <b>Wikipedia</b> on national security grounds. But then, one of the more amazing and wonderful things in Internet history happened: Activists, using a new open-source …

Blockchain

Facebook faces massive fines over data collection in Belgium

The social network will be fined €250,000 a day until the data is purged<p>Facebook has come under fire from a Belgium court which has threatened it …

Privacy

Amazon AWS Cloud Leak: 119,000 FedEx Customer Records

FedEx customer identification records recently were discovered on an unsecured Amazon Simple Storage Service (S3) cloud server, according to Kromtech …

Cloud Computing

Are your favorite websites mining Bitcoin? Here's how to find out

Some websites might be using your CPU to mine cryptocurrencies like Bitcoin without your knowledge.<p>Mining of cryptocurrencies like Bitcoin can be lucrative. But there's a catch: it requires time and a lot of computing power. If you could somehow spread those computing demands out among hundreds — …

Cryptocurrency

Facebook to roll out fix for bug in two-factor authentication

New Delhi, Feb 17 (IANS) After several people received non-security-related notifications from Facebook after giving the social network their phone …

Authentication

What you need to know about the major FedEx data leak

Data breaches dominated the headlines last year, with major firms such as Uber and Equifax under fire for leaving massive amounts of data exposed. …

Security

Hackers spread malware thorugh Telegram

Social messaging services have long been an essential part of our connected life, designed to make it much easier to keep in touch with friends and …

Kaspersky Lab

EU tells Facebook, Google and Twitter to do more for users

BRUSSELS (Reuters) - Europe’s justice commissioner told Facebook (FB.O), Twitter (TWTR.N) and Google (GOOGL.O) on Thursday to do more to bring their user terms in line with EU law, ramping up pressure on the tech giants after their efforts were deemed too little.<p>The European Union executive and …

LGBTQI

Researchers discover two new Spectre and Meltdown variants

Spectre and Meltdown are two serious, recently discovered security flaws tied to CPU hardware. We have a full write-up of the situation available …

Computer Hardware

That terrifying 'unfixable' Microsoft Skype security flaw: THE TRUTH

Oh yeah, we patched that in October, Windows giant yawnsMicrosoft has poured a bucket of cold water on people freaking out over a supposedly …

Software

Telegram zero-day exploit is a warning

Cyber attackers exploited a zero-day vulnerability in the Telegram messaging app for months to install malware and hijack computing resources to mine …

Kaspersky Lab

Ethical hackers discover 100 vulnerabilities in U.S. Air Force systems

So-called white-hat hackers discovered more than 100 vulnerabilities in Air Force networks in the second round of the service’s "bug bounty" program, …

Cybersecurity

Use Microsoft Outlook? Update now to fix these two dangerous bugs

Microsoft's February patches include its mitigations for Meltdown-Spectre CPU attacks in its Security Only update.<p>Microsoft has released patches for …

Information Security

Microsoft gives sysadmins Meltdown and Spectre detection in Windows Analytics

Microsoft has released an update to its free Windows Analytics tool, giving system administrators a new way to check for the Meltdown and Spectre …

Information Security

Microsoft’s compiler-level Spectre fix shows how hard this problem will be to solve | Ars Technica

Investigation of Microsoft's compiler changes show that much of the time, they won't fix Spectre.<p>The Meltdown and Spectre attacks that use processor …

Information Security

A potent botnet is exploiting a critical router bug that may never be fixed | Ars Technica

With Internet stability hanging in the balance, router maker maintains radio silence.<p>A fast-moving botnet that turns routers, cameras, and other …

Information Security

Hackers Exploiting 'Bitmessage' Zero-Day to Steal Bitcoin Wallet Keys

Bitmessage developers have warned of a critical 'remotely executable' zero-day vulnerability in the PyBitmessage application that was being exploited …

Information Security

AndroRAT: New Android malware strain can hijack older phones

Latest version of AndroRAT adds ability to steal browsing history, take front facing photos, screenshots and more -- and millions of older devices …

Information Security

February patches bring ominous Outlook fixes and a rebirth of KB 2952664

The very early reports are in, and it looks like this month’s monstrous panoply of patches isn’t as destructive as last month’s – so far, at least. …

Information Security

Intel offers bounties for Meltdown, Spectre bug hunters

Chip giant Intel is reaching out to security researchers with an expanded bug bounty program that offers rewards for the discovery of vulnerabilities …

Information Security

Researchers Find New Ways to Exploit Meltdown and Spectre Vulnerabilities in Modern CPUs

In the past few weeks, the entire information security industry has grown very anxious about Meltdown and Spectre, two classes of exploits that can …

Information Security

Six U.S. intelligence agencies warn against using Huawei phones

Six intelligence officials, including the heads of the CIA, FBI, and NSA, have told the Senate Intelligence Committee that they would not recommend that U.S. citizens use smartphones from the Chinese companies Huawei and ZTE, reports CNBC. As FBI director Chris Wray told the committee:<p>“We’re deeply …

Cybersecurity

Microsoft Will Use Blockchain To Build New Digital Identity | Investopedia

Microsoft Corp. (MSFT) has unveiled plans to craft a new form of digital identity on the blockchain Internet.<p>In the current Internet ecosystem, …

Blockchain

Adobe Patches 39 Vulnerabilities in Acrobat and Reader

<b>Updates released on Tuesday by Adobe for its Acrobat, Acrobat Reader and Experience Manager products patch more than 40 vulnerabilities, but none of</b> …

Information Security

Microsoft to test blockchain-based self-sovereign ID system

Microsoft is working to create a blockchain-based, decentralized digital identity management platform that would allow users to own and secure access …

Blockchain