Shak

53 Flips | 2 Magazines | 7 Likes | 4 Following | @kennyshaks | Keep up with Shak on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Shak”

DARK NET, A WILDERNESS WHERE INVISIBLE WORLD WARS ARE FOUGHT AND HACKERS ROAM FREE

<b>I. THE BACK DOOR</b><p>His name is not Opsec, but I will call him that to guard his privacy. In webspace he is known as a grand master of the dark art of …

Security

SSLsplit - transparent SSL/TLS interception

Copyright (C) 2009-2018, Daniel Roethlisberger. <br>https://www.roe.ch/SSLsplit<p>Overview<p>SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS …

Wiki: A collection of Red team infrastructure and operations resources

A wiki collection of resources on how to set up a resilient red team infrastructure‍ / red team‍ infrastructure hardening<p>A red team definition via</b> …

Plug the USG into your port before you plug in that new USB flash drive

A number of nasty methods exist to remotely exploit a device, for example, a router that is connected to the internet. There are even more ways to …

10 Habits Of Mentally Strong People

You have to be kind to people who are rude to you.<p>Despite West Point Military Academy’s rigorous selection process, one in five students drop out by graduation day. A sizeable number leave the summer <i>before</i> freshman year, when cadets go through a rigorous program called “Beast.” Beast consists of …

Honeypots: Free psy-ops weapons that can protect your network before defences fail

<b>Feature</b> You catch more crooks with honey than vinegarThe hackers breached the transport operator's systems and before they knew it had sent a …

Cybersecurity

Security News This Week: Unmasking the Master of That Web-Crippling Botnet

Remember that nasty Mirai botnet, the one that broke the internet for millions of people last fall? Brian Krebs does. The security journalist was …

Hacking the Army

A<p>hacker prodding a public-facing Army recruitment website in early December stumbled upon a vulnerability, then another, until he found himself suddenly connected to an internal Department of Defense network that should have prompted him for special access credentials. By the end of that night, …

Security

Real World FSociety Malware Is Giving Mr. Robot a Bad Name

In the past few weeks, more or less talented malware authors have resorted to naming their newly launched threats using the "FSociety" brand, made …

Ten easy encryption tips for warding off hackers, the US government—and Russia

On a frigid Saturday, pink and yellow Post-It notes scrawled with concerns about cybersecurity covered a wall of Eyebeam, a nonprofit art and technology center in Brooklyn. “Identity theft + surveillance = paranoia, plz help,” read one note. “How much of a threat do alt-right hackers pose on social …

Privacy

KillDisk now targeting Linux: Demands $250K ransom, but can’t decrypt

ESET has discovered a Linux variant of the KillDisk component that renders Linux machines unbootable, while encrypting files and requesting a large …

Linux

Obama, Feds outline technical, spear phishing details, sanctions vs. Russia over cyber attacks

The Department of Homeland Security and FBI laid out spear phishing techniques so network admins can better thwart what is alleged to be Russian …

Fileless Malware Takes 2016 By Storm

In-memory attacks are all the rage, creating a growing class of "non-malware."

Information Security

Here’s how cyber attacks get worse in 2017

It was speculated 2016 would see even more cybersecurity activity than 2015, and it did not disappoint. Consider the $81 million stolen from Bangladesh Bank, the 500 million accounts swiped from Yahoo, or the 19,000 emails leaked from Democratic Party officials in the run-up to the election. Not to …

Cybersecurity

Cybersecurity must be open, replaceable

Late last month the Internet was brought to a grinding halt due to a distributed denial of service (DDoS) attack launched from millions of infected web-attached devices. And in international news, US officials formally accused Russia of attempting to subvert the US elections via hacking.<p>I spent …

Cybersecurity

Hackers can now report bugs in Defense Dept. websites without fear of prosecution

The Defense Department on Monday became the first U.S. government agency to launch a policy enabling researchers to report bugs or flaws they discover in its websites without fear of prosecution.<p>Calling it a “see something, say something” policy for the digital domain, Defense Secretary Ashton B. …

Security

A Hacker Took Over Tel Aviv’s Public Wi-Fi Network to Prove That He Could

And he said it was quite easy.<p>Israeli hacker Amihai Neiderman needed three days to hack into Tel Aviv's free public Wi-Fi. He only worked during the evenings, after he came home from his full-time job as a security researcher. The 26-year-old said the difficulty level was "a solid 5" on a scale …

The ransomware dilemma

More than 90 percent of all phishing emails are now ransomware. The average amount paid via ransomware has grown from $40 in 2009 to $1,000 in 2016. This amount will grow even faster as ransomware moves to enterprise.<p>An LA-based hospital paid $17,000 and, according to FBI records, several small …

How Hackers Use Encryption to Hide Their Criminal Activities

Hackers now use HTTPS encryption to cover their tracks; billions of dollars worth of security technologies rendered useless against such cloaked attacks.<p>In the ever daunting crusade to secure the Internet, it's often two steps forward, one step back. Each time the good guys achieve a notable …

Using a Malware Simulator to Better Defend Against Ransomware

If you are looking for ways to run a malware simulator to test ransomware and other forms of malware in your environment, but don’t want to deal with …

Ransomware

Hands-on: Blue Hydra can expose the all-too-unhidden world of Bluetooth

Bluetooth Low Energy devices like smart watches, "wearables," give you up all day.<p>My new neighbor was using AirDrop to move some files from his phone …

MacBook Air

DoS Attack Crashes Website Monitoring North Korea's Nuclear Test Site

Somebody doesn’t like a new website that checks on secret nuclear weapon facilities around the world. On Wednesday, the Project on Crowdsourced …

Doctor Web discovers the first Linux Trojan that is written in Rust language

It is a prolific period for Vxers working on Linux Trojan, a new strain was recently spotted by experts from Doctor Web. The new Linux Trojan has …

Stealing login credentials from a locked PC or Mac just got easier

20 seconds of physical access with a $50 device is all it takes.<p>Snatching the login credentials of a locked computer just got easier and faster, …

Information Security

BASHLITE Family Of Malware Infects 1 Million IoT Devices

More than one million consumer web-connected video cameras and DVRs are compromised by bot herders who use the devices for DDoS attacks, researchers …

Bots

Who Are The NSA’s Elite Hackers?

A look into one of the NSA’s best-kept secrets, and one of its most powerful teams.<p>Last week, a mysterious group calling itself The Shadow Brokers dumped online a series of hacking tools associated with the NSA. The leak provided an unprecedented look into the actual tools that the NSA uses to hack …

Surveillance

Government Hackers Caught Using Unprecedented iPhone Spy Tool

The malware was used to target a political dissident in the United Arab Emirates.<p>On the morning of August 10, Ahmed Mansoor, a 46-year-old human rights activist from the United Arab Emirates, received a strange text message from a number he did not recognize on his iPhone.<p>"New secrets about torture …

Researchers Bypass Chip and Pin Protections at Black Hat

LAS VEGAS – Credit card companies for the most part have moved away from “swipe and signature” credit cards to chip and pin cards by this point; the …

Information Security

Does dropping malicious USB sticks really work? Yes, worryingly well...

Plugging in that USB stick you found lying around on the street outside your office could lead to a security breach.<p>This is no secret, of course. We …