Cyber Security & ...
Follow
Find
5.4K views | +15 today
Cyber Security &  Digital Forensics
Your new post is loading...
Your new post is loading...
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

European Central Bank hack highlights classic problems, say security experts

European Central Bank hack highlights classic problems, say security experts | Cyber Security &  Digital Forensics | Scoop.it
The hack and data breach at the European Central Bank (ECB) in Frankfurt highlights classic challenges facing organisations, say security experts
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Do NOT use Linux hardening checklists for your servers

Do NOT use Linux hardening checklists for your servers | Cyber Security &  Digital Forensics | Scoop.it
The solution to avoid using Linux hardening checklists for your servers is simple. With proper automation and regular checks, checklists could be avoided.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

SANS Computer, Digitial Forensics, Incident Response Summit Archives

SANS Computer, Digitial Forensics, Incident Response Summit Archives | Cyber Security &  Digital Forensics | Scoop.it
Archived information on prior SANS US and EU Digital Forensics Summits.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

This malware lives in registry value • /r/netsec / via : Bogdan Calin

This malware lives in registry value • /r/netsec / via : Bogdan Calin | Cyber Security &  Digital Forensics | Scoop.it
Found on reddit, the front page of the internet.\n\n174 points and 36 comments so far
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Facebook's Wedge: A novel approach to Top-of-Rack switches

Facebook's Wedge: A novel approach to Top-of-Rack switches | Cyber Security &  Digital Forensics | Scoop.it
Facebook and members of the Open Compute Project overhaul the critical Top-of-Rack (TOR) switch, with an eye on improving data center efficiency and reducing costs.
more...
No comment yet.
Rescooped by Constantin Ionel Milos / Milos Constantin from opexxx
Scoop.it!

Capstone - The ultimate disassembly framework


Via alexander knorr
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

WordPress brute force attack via wp.getUsersBlogs.

SANS Internet Storm Center - A global cooperative cyber threat / internet security monitor and alert system. Featuring daily handler diaries with summarizing and analyzing new threats to networks and internet security events.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

UC Berkeley : Nanotech Breakthrough Promises Super-Accurate Handheld Bomb Detectors.

UC Berkeley : Nanotech Breakthrough Promises Super-Accurate Handheld Bomb Detectors. | Cyber Security &  Digital Forensics | Scoop.it
This discovery has a chance (as small as it may be) to reduce the amount of time we all spend in TSA lines.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Nmap Cheat Sheet: From Discovery to Exploits, Part 3: Gathering Additional Information about Host and Network - InfoSec Institute

Nmap Cheat Sheet: From Discovery to Exploits, Part 3: Gathering Additional Information about Host and Network - InfoSec Institute | Cyber Security &  Digital Forensics | Scoop.it
As we discussed before, this is our third installment in our Nmap series. Nmap is well known for port scanning, port discovery, and port mapping. But we ca
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

RF-hacking…. Yes Radio Frequency SPECIFICALLY, GSM | vx

RF-hacking…. Yes Radio Frequency SPECIFICALLY, GSM | vx | Cyber Security &  Digital Forensics | Scoop.it
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

RpcView – Tool to explore RPC functionality | SecTechno

RpcView is a free tool that can be used to monitor and decompile all registered interfaces on windows operating system. Information provided by this tool
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

What is this Padora Concept ?

more...
No comment yet.
Rescooped by Constantin Ionel Milos / Milos Constantin from opexxx
Scoop.it!

List of Chromium Command Line Switches « Peter Beverloo


Via alexander knorr
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

The Next Crypto Wars 2: Going Dark | Privacy PC

The Next Crypto Wars 2: Going Dark | Privacy PC | Cyber Security &  Digital Forensics | Scoop.it
Delving further into crypto evolution, Chris Soghoian focuses on the relationship between law enforcement and companies that adopted strong privacy algos.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Fake GoogleBots are third most common DDoS attacker

Fake GoogleBots are third most common DDoS attacker | Cyber Security &  Digital Forensics | Scoop.it
An analysis of 400 million search engine visits to 10,000 sites done by Incapsula researchers has revealed details that might be interesting...
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Diving Deep into Mayhem - F-Secure Weblog : News from the Lab

Diving Deep into Mayhem - F-Secure Weblog : News from the Lab | Cyber Security &  Digital Forensics | Scoop.it
F-Secure Security Labs brings you the latest online security news from around the world. Ensure that you are up-to-date with the latest online threats to guarantee your online wellbeing.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Digital Forensics in the Mobile, BYOD, and Cloud Era

Digital Forensics in the Mobile, BYOD, and Cloud Era | Cyber Security &  Digital Forensics | Scoop.it
Early use of digital forensics can prove invaluable in a company’s investigation and legal pursuit of a renegade employee
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

WinDbg and DKOM

more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

The Stark Realities of Today's Cyber Security Landscape

The Stark Realities of Today's Cyber Security Landscape | Cyber Security &  Digital Forensics | Scoop.it
The results of IBM's "2014 Cyber Security Intelligence Index" show that the majority of organizations are more vulnerable than they think.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Phishing Frenzy: HTA PowerShell Attacks with BeEF - Pentest Geek - Penetration Testing - Infosec Professionals

Phishing Frenzy: HTA PowerShell Attacks with BeEF - Pentest Geek - Penetration Testing - Infosec Professionals | Cyber Security &  Digital Forensics | Scoop.it
New features within Phishing Frenzy and a walkthrough guide of launching HTA Powershell attacks leveraging Phishing Frenzy, BeEF, PowerSploit, and Metasploit.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

NEW, SINISTER web tracking tech fingerprints your computer by making it draw

NEW, SINISTER web tracking tech fingerprints your computer by making it draw | Cyber Security &  Digital Forensics | Scoop.it
Have you on YouPorn lately, perhaps? White House website?
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Security Data Science Papers

Security Data Science Papers | Cyber Security &  Digital Forensics | Scoop.it
A collection of security data science research papers
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Explaining cyberterrorism - InfoSec Institute

Explaining cyberterrorism - InfoSec Institute | Cyber Security &  Digital Forensics | Scoop.it
Introduction People feel endangered by cyberterrorists, and this topic has raised an alarm in many societies. Many experts in the IT field and many politic
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Hacking Clients with WPAD (Web Proxy Auto-Discovery) Protocol - InfoSec Institute

Hacking Clients with WPAD (Web Proxy Auto-Discovery) Protocol - InfoSec Institute | Cyber Security &  Digital Forensics | Scoop.it
Introduction In this tutorial, we'll take a look at how we can hack clients in local network by using WPAD (Web Proxy Auto-Discovery). The WPAD protocol al
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Top 25 Best Linux Performance Monitoring and Debugging Tools

Top 25 Best Linux Performance Monitoring and Debugging Tools | Cyber Security &  Digital Forensics | Scoop.it
I've compiled 25 performance monitoring and debugging tools that will be helpful when you are working on Linux environment. This list is not comprehensive or
more...
No comment yet.