Blog

Artigo: Lock down your social media with essential security add-ons

Lock down your social media with essential security add-ons https://www.pcworld.com/article/2010916/lock-down-your-social-media-with-essential-security-add-ons.html

ExploitShield – Protection Against Advanced Persistent Threats, Targeted Attacks, Financial Malware & Corporate Cyber Espionage

ExploitShield – Protection Against Advanced Persistent Threats, Targeted Attacks, Financial Malware & Corporate Cyber Espionage http://www.zerovulnerabilitylabs.com/home/services/security-intelligence/

Artigo: Is antivirus dead? Startup launches first ‘exploit blocking’ program

Is antivirus dead? Startup launches first ‘exploit blocking’ program https://www.networkworld.com/news/2012/100212-is-antivirus-dead-startup-launches-262956.html

Evil Maid CHKDSK : Steal users password with fake CHKDSK

This is s simple 512-byte MBR program that pretends to be Windows CHKDSK. It asks the user for a password, writes that password back to the media it booted from, renders that media unbootable, and reboots. NOTE: Windows helpfully prompts the user to format the drive when its inserted, or… http://www.toolswatch.org/2012/09/evil-maid-chkdsk-steal-users-password-with-fake-chkdsk/

Generating 16384 bit SSH keys.

I recently regenerated my SSH keys having used the same for many years. I was presently surprised to discover 16384 bit keys are now incredibly cheap with handshakes on my (almost) lowest powered hardware, my i5 1.7 GHz 2011 Macbook Air taking only 0.2s. This in my opinion is a cost worth paying … Dispositivo…

Read more

Python samba 0day

[Python] samba 0day http://pastebin.com/AwpsBWVQ

Vulnerability in Facebook allows attackers to lock accounts

Vulnerability in Facebook allows attackers to lock accounts http://www.ehackingnews.com/2012/09/facebook-vulnerability-expose-personal-info.html

The Three Pillars to Cisco’s Secure Data Center Strategy: Part 1 Segmentation

Blog Archive » The Three Pillars to Cisco’s Secure Data Center Strategy: Part 1 Segmentation http://blogs.cisco.com/security/the-three-pillars-to-ciscos-secure-data-center-strategy-part-1-segmentation/

New Zero-Day Vulnerability Found in Java 5, 6 and 7; 1.1 Billion Desktops Affected

New Zero-Day Vulnerability Found in Java 5, 6 and 7; 1.1 Billion Desktops Affected http://threatpost.com/en_us/blogs/new-zero-day-vulnerability-found-java-5-6-and-7-11-billion-desktops-affected-092612

Book review: Practical Malware Analysis

Earlier this year, no starch press, sent SophosLabs an unrequested copy of the book Practical Malware Analysis: The hands-On Guide to Dissecting Malicious Software with a letter saying "If you do enjoy the book, I hope that you will consider Read more… http://nakedsecurity.sophos.com/2012/09/14/book-review-practical-malware-analysis/ Dispositivo Móvel – VCT