One of Russia’s Neighbors Has Security Lessons for the Rest of Us

U.S. Cyber Command operation disrupted Internet access of Russian troll factory on day of 2018 midterms

Password Managers: Under the Hood of Secrets Management - Independent Security Evaluators

The Definitive 2019 Guide to Cryptographic Key Sizes and Algorithm Recommendations - Paragon Initiative Enterprises Blog

Citrix investigating unauthorized access to internal network | Citrix Blogs

How I abused 2FA to maintain persistence after a password change (Google, Microsoft, Instagram…

Adi Shamir (the “S” in RSA) sent a video to #RSAC because he couldn’t get a visa

Інтерв'ю з Олексієм Барановським

Епізод, в якому ми годину холіворимо на тему, чи є СМС другим фактором автентифікації, а потім відповідаємо на запитання слухачів.

Висвітлено теми:

  1. Як боротись з інформаційними операціями проти України?
  2. Як змінити спеціалізацію в рамках професії кібербезпеки?
  3. Чому спеціалістам з кібербезпеки варто залишатися в цій індустрії та не виїжджати з України?
  4. Якої спеціальності кібербезпеки наразі найбільше бракує на ринку праці?
  5. На які показники роботи відділу кібербезпеки повинні звертати увагу керівники бізнесу?
  6. Які заходи з кібербезпеки варто відвідати в 2019 р.?
  7. Які англомовні інформаційні ресурси з кібербезпеки ви порадите?
  8. Чи етично коли інформація про зламаний сайт викладається відразу в Facebook без повідомлення власника сайту?

Real World Crypto 2019 - Day 2 - Session 1 - Morning - Blockchain lightning talk

Real World Crypto videos

The Japanese government plans to hack into citizens' IoT devices

WhatsApp, Instagram and Messenger to 'merge'

So I wanted to encrypt some files. Thought about using 7z+password

DNS Emergency Directive 19-01

Russia tries to force Facebook and Twitter to relocate servers to Russia

Twitter warns private tweets went public

Volkswagen executive sentenced to maximum prison term, fine under plea deal

Machine Learning Will Transform How We Detect Software Vulnerabilities

The 773 Million Record "Collection #1" Data Breach

Facebook’s Sputnik Takedown — Top Takeaways – DFRLab – Medium

Removing Coordinated Inauthentic Behavior from Russia

Mathematicians Have Developed a Computing Problem That AI Can Never Solve

SCP implementations impacted by 36-years-old security flaws | ZDNet

Інтерв'ю з Андрієм Волошиним про "залізо", IoT, криптографію, та бейдж NoNameCon 2019. 

https://techmaker.ua

NoNameCon Badge Trailer

Toyota's PASTA- A car hacking tool to enhance automobile cybersecurity

U.S. top court declines to take up Fiat Chrysler hacking case

NSA to release a free reverse engineering tool

Real World Crypto Symposium

Learning Threat Modeling for Security Professionals

Кібератака на нотаріусів чи напад на Україну?

Post-mortem for Kubernetes CVE-2018-1002105

Surveillance Kills Freedom By Killing Experimentation

Common-Knowledge Attacks on Democracy by Henry Farrell, Bruce Schneier

Let them paste passwords - NCSC

Equifax did not see the data exfiltration because the device used to monitor ACIS network traffic had been inactive for 19 months due to an expired security certificate

NoNameCon 2019 CFP

Intro/outro: alyona alyona – Відчиняй https://www.youtube.com/watch?v=2FCMJ31i8Yg

No Name Podcast Patreon

Movember initiative

Nataliya Zubar - Створені під копирку акаунти

Two Celebrities Charged With Unlawfully Touting Coin Offerings

An NPM package with 2,000,000 weekly downloads had malicious code injected into it. No one knows what the malicious code does yet.

GDPR в Штатах?

Ukrainian police arrest hacker who infected over 2,000 users with DarkComet RAT

Pentagon fails first-ever audit

Головний равин України доксить НАБУ

ArtChain, a blockchain-based startup, has a hilarious way of dealing with vulnerability reports

ProtonMail JavaScript drama

Werner Schober - IoD - Internet of Dildos, a Long Way to a Vibrant Future

An introduction to SOLID, Tim Berners-Lee’s new, re-decentralized Web

Kernel RCE caused by buffer overflow in Apple's ICMP packet-handling code (CVE-2018-4407)

This SIM Card Forces all of Your Mobile Data Through Tor

Go deeper: Bloomberg's fraying "secret chips" story

Google+ to shut down after security bug

French police officer caught selling confidential police data on the dark web

Tesla Model 3 Stolen From Mall of America Using Only a Smartphone

InfoSec Handlers Diary Blog - Crypto Mining Is More Popular Than Ever!

Tesla update has bricked (!) the car

Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob

FAST, FURIOUS AND INSECURE: PASSIVE KEYLESS ENTRY AND START IN MODERN SUPERCARS

Uproar after Adobe winds down Magento rewards-based bug bounty program

Analysis | How badly did Russia’s interview with the Skripal poisoning suspects backfire?

Extended Validation Certificates are Dead

Krebs on credit freeze

Double Spend Vulnerability in Bitcoin Core

Latest iOS and Android security improvements (PDF)

Easily the best talk at CRYPTO.

Hackers Stole Personal Data of 2 Million T-Mobile Customers

Q: Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible?

Botched CIA Communications System Helped Blow Cover of Chinese Agents

Semmle Discovers Critical Remote Code Execution Vulnerability in Apache Struts (CVE-2018-11776)

More Ghostscript Issues: Should we disable PS coders in policy.xml by default?

Hackers Can Compromise Your Entire Networks Just By Sending A Fax Message

Burp Suite 2.0 beta now available

Facebook has been talking to banks about putting financial data into Messenger, and people are freaking out

A former Tesla employee, who worked on their IT infrastructure, is posting in a subforum of a subforum, a little-known place for funy computer forgotten by time. His NDA has expired.

r/EnoughMuskSpam - Former Tesla Programmer's anecdotes about problems

 

« Newer Posts - Older Posts »