talant

456 Added | 1 Magazine | 374 Followers | @talant | Keep up with talant on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “talant”

The sound made by your computer could give away your encryption keys…

One of the first computers I was ever allowed to use all on my own was a superannuated ICL-1901A, controlled from a Teletype Model 33.<p>One of the …

Help Bring Privacy Laws Into 21st Century — Krebs on Security

Lost in the ongoing media firestorm over the National Security Agency’s domestic surveillance activities is the discussion about concrete steps to …

Securing Optimizing Linux: The Hacking Solution (v.3.0)

Verify Your Email Address<p>We require that you verify your email address prior to updating your account. Simply click on the button below and we'll …

Help Net Security

The gang behind the infamous banking Trojan Dridex has also created the FriedEx (aka BitPaymer) ransomware, ESET researchers confidently claim. The …

Important Security Update for D

<b>D-Link</b> has released an important security update for some of its older Internet routers. The patch closes a backdoor in the devices that could let …

Yet Another Android Master Key Bug

Earlier this year, Bluebox Security announced they had found a bug in the way Android verifies that application packages have not been tampered with …

Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps | Ars Technica

Like a super strain of bacteria, the rootkit plaguing Dragos Ruiu is omnipotent.<p>Three years ago, security consultant Dragos Ruiu was in his lab when …

Government agency compromised by fake Facebook hottie

Emily Williams wasn't real, but the two hackers who created her from social media profiles got her a government job, a company laptop, VPN …

Security

This Chef Taught Herself How To Catch Hackers Then Got A Great Job As A Computer Security Guru

But today we bring you the story of a woman who taught herself how to <i>catch</i> hackers.<p>In one big jump, Ashley Hamilton changed careers from a line cook at a popular San Francisco eatery to a computer security guru. She didn't know how to program. She didn't know how to hack. But by studying books, …

White Hat

FoxOne Free OSINT Tool - Server Reconnaissance Scanner

Last updated: October 30, 2013 | 4,825 views<p>FoxOne is a free OSINT tool, described by the author (th3j35t3r) as a Non-Invasive and Non-Detectable …

Study: Among top browsers, IE catches most socially engineered attacks

Among the top web browsers, Internet Explorer did the best job in defending users against malware delivered by socially engineered ruses, a recent …

DON'T BREW THAT CUPPA! Your kettle could be a SPAMBOT

Russian authorities have claimed that household appliances imported from China contain tiny computers that seek out open WiFi networks and then get …

Virus Bulletin :: Open letter asks AV companies for openness on surveillance malware

Open letter asks AV companies for openness on surveillance malware<p>Posted by <b>Virus Bulletin</b> on <i>Oct 28, 2013</i><p><i>Old issue has become hot topic again</i> …

How to social engineer a social network - Help Net Security

Social engineering has for a while now been cyber attackers’ best bet to enter systems and compromise accounts when actual hacking doesn’t work, or …

Digital Attack Map

Google Ideas is a think/do tank at Google that explores how technology can enable people to confront threats in the face of conflict, instability or …

The Basics of Web Hacking: Tools and Techniques to Attack the Web - Help Net Security

Author: Dr. Josh Pauli<br>Pages: 160<br>Publisher: Syngress<br>ISBN: 0124166008<p><b>Introduction</b><p>Web security is one of the hot topics that we cover quite a lot on …

Email Delivery – What Pen Testers Should Know

I get a lot of questions about spear phishing. There’s a common myth that it’s easy to phish. Start a local mail server and have your hacking tool …

Targeted Threat Index

The Targeted Threat Index is a metric for assigning an overall threat ranking score to email messages that deliver malware to a victim’s computer. …

Attempted hack against AVAST

Deborah Salmi, 9 October 2013<p>Attempted hack against AVAST<p>Yesterday, several companies had their websites hijacked by pro-Palestinian hackers. We can …

SQRL Secure Quick Reliable Login

The SQRL system (pronounced “squirrel”) revolutionizes<br>web site login and authentication. It eliminates many<br>problems inherent in traditional login …

Information Systems

Data Broker Giants Hacked by ID Theft Service — Krebs on Security

An identity theft service that sells Social Security numbers, birth records, credit and background reports on millions of Americans has infiltrated …

How I hacked SIM cards with a single text - and the networks DON'T CARE

Karsten Nohl, the security researcher who broke into SIM cards with a single text, has told <i>The Register</i> he is dismayed by the mobile industry's …

Integer Overflow / Underflow Exploitation Tutorial ≈ Packet Storm

File Archive:<p>January 2018<p>Su<br>• Mo<br>• Tu<br>• We<br>• Th<br>• Fr<br>• Sa<p>2 Files<p>13 Files<p>16 Files<p>39 Files<p>26 Files<p>40 Files<p>2 Files<p>16 Files<p>25 Files<p>28 Files<p>44 Files<p>32 Files<p>2 Files<p>4 Files<p>31 …

Hook Analyser Malware Tool 2.6 ≈ Packet Storm

File Archive:<p>January 2018<p>Su<br>• Mo<br>• Tu<br>• We<br>• Th<br>• Fr<br>• Sa<p>2 Files<p>13 Files<p>16 Files<p>39 Files<p>26 Files<p>40 Files<p>2 Files<p>16 Files<p>25 Files<p>28 Files<p>44 Files<p>32 Files<p>2 Files<p>4 Files<p>31 …

Format String Exploitation Tutorial ≈ Packet Storm

File Archive:<p>January 2018<p>Su<br>• Mo<br>• Tu<br>• We<br>• Th<br>• Fr<br>• Sa<p>2 Files<p>13 Files<p>16 Files<p>39 Files<p>26 Files<p>40 Files<p>2 Files<p>16 Files<p>25 Files<p>28 Files<p>44 Files<p>32 Files<p>2 Files<p>4 Files<p>31 …

Off-By-One Exploitation Tutorial ≈ Packet Storm

File Archive:<p>January 2018<p>Su<br>• Mo<br>• Tu<br>• We<br>• Th<br>• Fr<br>• Sa<p>2 Files<p>13 Files<p>16 Files<p>39 Files<p>26 Files<p>40 Files<p>2 Files<p>16 Files<p>25 Files<p>28 Files<p>44 Files<p>32 Files<p>2 Files<p>4 Files<p>31 …