Luciano Reichert

15 Flips | 1 Magazine | 25 Likes | 4 Following | 3 Followers | @lucianoreichert | Keep up with Luciano Reichert on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Luciano Reichert”

17 livros indispensáveis para profissionais da segurança da informação e entusiastas de TI

Além de artigos, podcasts e vídeos, os livros são ótimos recursos para o desenvolvimento de novas habilidades, além de possibilitar um crescimento na …

There are ways the FBI can crack the iPhone PIN without Apple doing it for them

Getting Apple to write new firmware is the easiest route—but probably not the only one.<p>The custom firmware that the FBI would like Apple to produce …

Top 5 Password Cracking Tools

Password cracking tools are often refereed to as password recovery tools used to guess or restore a password from a data transmission system. …

Hacker Search Engine Becomes the New Internet of Things Search Engine

At DEFCON 17 in 2009, John Matherly debuted a search engine named Shodan (after the villainous computer in the cult-classic video game, System …

 This website is for sale! - OPEN SOURCE Resources and Information.

How the NSA Built Its Own Secret Google

The National Security Agency is secretly providing data to nearly two dozen U.S. government agencies with a “Google-like” search engine built to …

How the NSA (may have) put a backdoor in RSA’s cryptography: A technical primer

Here are the basics on backdoors in security systems.<p>Author Nick Sullivan worked for six years at Apple on many of its most important cryptography …

The NSA's Spy Catalog

<b>© SPIEGEL ONLINE 2013</b><br>All Rights Reserved<br>Reproduction only allowed with the permission of SPIEGELnet GmbH

Catalog Advertises NSA Toolbox

After years of speculation that electronics can be accessed by intelligence agencies through a back door, an internal NSA catalog reveals that such …

Documents Reveal Top NSA Hacking Unit

Part 3: The NSA's Shadow Network<p>The insert method and other variants of QUANTUM are closely linked to a shadow network operated by the NSA alongside …

Hacker mostra como é possível hackear um cartão de memória (e algumas curiosidades interessantes) - Tecnoblog

Já conhece a nova extensão do <b>Tecnoblog</b>?<p>Durante a trigésima edição do Chaos Communication Congress, evento anual de tecnologia que acontece em …

The Web Cookie Is Dying. Here's The Creepier Technology That Comes Next

It may raise hackles to think that U.S. intelligence officials might be monitoring your telephone and Internet communications, but for most of us it’s only the marketers who are really interested in our everyday online activities. And with many billions of dollars at stake, companies are …

ZeroPoint is the malware cure that could be worse than the disease

SecDev's new project could stop botnet-powered fraud for good. Should we let it?<p>The internet is, on balance, a very hostile place. More than 70 percent of all email traffic is spam, and a fair portion of that is malware and phishing attempts. One 2012 census counted 1.5 billion browser-based …

Edward Snowden, The Dark Prophet

To avoid surveillance, the first four Americans to visit Edward Snowden in Moscow carried no cell phones or laptops. They flew coach on Delta from …