Mextor SAS - the I.T security

81 Flips | 3 Magazines | 1 Following | 3 Followers | @mextor | Keep up with Mextor SAS - the I.T security on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Mextor SAS - the I.T security”

Automate Your Credentialed Vulnerability Assessments

63% of confirmed data breaches involve weak, default or stolen passwords*<p>Security risks intensify if stolen passwords are for privileged account …

The Security Model is Broken, Part 2: The Risk Assumption Process

In February of this year, I published an article in <b>SC Magazine</b> called The Security Model is Broken. Because every organization is susceptible to a …

Graham W Phillips on Twitter: "The road from #Lugansk to #Novosvetlovka, lined with the horror of war. #Ukrainewar #Novorossiya http://t.co/uRLzULgtiX"

New conversation<p>New conversation<p>End of conversation<p>New conversation<p>End of conversation<p>New conversation<p>Tweet unavailable<p>Tweet unavailable<p>Tweet …

Réseau Voltaire

175 articles cette semaine dans toutes les langues<p>Páginas Libres<p>por Julio A. Salazar, Socios, 19 de abril de 2018<p>napsal(a) Thierry Meyssan, Voltaire …

China reportedly completes 3 advanced nuclear attack subs

Chinese shipbuilders have completed three advanced nuclear-propelled submarines that can fire the latest vertically launched anti-ship missiles, …

RT @GrahamWP_UK: Road Lugansk to Novosvetloka, a truck carrying those fleeing war destroyed in mid-August. Their remains still there. http://t.co/ye05n9Dyld

Here’s What It Took To Bring Facebook Down For Thirty Minutes

<b>UPDATE:</b> It turns out the video in question is not actually of some fantastical Facebook attack after all. Fro Techcrunch:<p>We’ve looked into this further, however, and it turns out this attack bore no relation to Facebook’s outage on Thursday. For one thing, we’re told the time stamps don’t square up …

Enterprise Risk Management For IT Security

A few weeks ago, Stephanie Balaouras and I posted a podcast on a topic that has been a high priority for many of our customers -- how to apply risk …

Snowden's Documents Available for Download

In Edward Snowden's archive on NSA spying activities around the world, there are numerous documents pertaining to the agency's operations in Germany …

Surveillance

Android malware delivered via windows, when debugging-mode enabled

<b>Be careful if you are connecting your android device to others computers!</b> <br>A New windows-based malware installs malicious application in …

All major browsers fall during second day at Pwn2Own hacking contest

Security researchers demonstrated zero-day exploits against Google Chrome, Microsoft Internet Explorer, Apple Safari, Mozilla Firefox and Adobe Flash …

Orange warns users of phishing attacks following 2nd security breach

France based Telecoms company Orange has been hacked second time this year, more than 1.3 Million customers are affected by this security breach.<p>In …

Protect Your Windows Phone 8 With These 5 Security Apps

Microsoft’s Windows Phone has been around since 2010, but the device started gaining steam with the release of Windows 8 in the summer of 2012. …

Patch Management and its Importance in the IT Security Field

Ethical Hacking<p>2:08 PM EH Security, Infosec, Patching<p>Fixing the vulnerability before they are exploited. Previously organizations are used …

New Heartbleed attack hits Android devices and routers over Wi-Fi

Seven weeks after the bug put the web on high alert, Heartbleed is still causing problems. A new report from Portuguese security researcher Luis Grangeia describes how the same bug could be used over Wi-Fi to enable new kinds of attacks that build on the same vulnerability.<p>The damage will be much …

The Five Tough Truths Of Cybersecurity Software

<b>Editor’s note:</b> <i>Ted Schlein is a general partner with Kleiner Perkins Caufield & Byers</i><i>. Earlier in his career, he brought to market the first anti-virus software for commercial use at Symantec and also served as the founding CEO of Fortify software, now an HP company.</i><p>Building a successful security …

How to protect yourself from Gameover Zeus

Thousands of Britons are infected with dangerous malware and have just two weeks to protect themselves before it attempts to empty their bank accounts, warns the National Crime Agency. Here are the simple steps you need to take now to stay safe<p>More than 15,000 people in the UK have been infected …

Rovio : les Angry Birds n'ont pas aidé la NSA

Rovio a tenu à s’exprimer suite aux spéculations selon lesquelles la NSA et son équivalent britannique feraient des extractions de données privées …

The NSA Reportedly Has Total Access To The Apple iPhone

As with most good stories, revelations of the NSA spy program will almost certainly keep getting worse before anything gets better.<p>Yesterday we reported on claims—based on leaked NSA documents—that the spy agency was rerouting laptops ordered online to install spyware and malicious hardware on the …

CrystalAEP - Anti-Exploit Protection Tool

Ethical Hacking<p>7:31 AM EH Tools, Exploit, News, Random, Review, Windows<p>Anti-virus software is generally designed to protect users from well known …

Defcon 21 - Safety Of The Tor Network: A Look At Network Diversity, Relay Operators, And Malicious Relays

<b>Description:</b> Rumor has it that the Tor network is a CIA honeypot, that all relays are malicious, and that only bad people use Tor to do bad things …

'Advanced Power' botnet attempts to hack website using victim's machine

S ecurity researcher Brian Krebs has discovered a new Botnet that tests websites for vulnerabilities using the infected machines.<p>The malware disguise …

NSA uses Google cookies to pinpoint targets for hacking

The National Security Agency is secretly piggybacking on the tools that enable Internet advertisers to track consumers, using "cookies" and location data to pinpoint targets for government hacking and to bolster surveillance.<p>The agency's internal presentation slides, provided by former NSA …

Unknown Process(es)

3 Tools to Aware Of That Exploit Android Security Vulnerability

Ethical Hacking<p>2:38 AM Android, Exploit, Guest Post<p><b>Android is slowly becoming a popular target for hackers and other cyber-criminals world wide.</b> …

Why Every Site Should Be Penetration Tested

Ethical Hacking<p>12:07 PM Guest Post, Pen-Testing<p>Penetration testing can get a bad rap due to the unprofessional way in which some people approach it …

7 Most Common Web Application Vulnerabilities

Ethical Hacking<p>10:10 AM EH Security, EH Tips, News, Review, SQL, Web Security, XSS, XSSF<p><b>Information disclosure, identity theft, SQL injection, Code</b> …

Vulnerability lets attackers hijack iOS apps' web requests over WiFi (video)

Be careful which WiFi hotspots you use -- Skycure has just revealed a web-based exploit that lets attackers hijack a iOS device on the same network through its mobile apps. The technique intercepts some apps' attempts to cache a web status message, redirecting the request to a hostile server; after …

How to Crack a Wi-Fi Password

Cracking Wi-Fi passwords isn't a trivial process, but it doesn't take too long to learn—whether you're talking simple WEP passwords or the more …