Cyber Security & Digital Forensics
53.4K views | +15 today
Follow
 
Scooped by Constantin Ionel Milos / Milos Constantin
onto Cyber Security & Digital Forensics
Scoop.it!

OS-X-Security and Privacy Guide /by drduh * github.com

OS-X-Security and Privacy Guide /by  drduh * github.com | Cyber Security &  Digital Forensics | Scoop.it
Contribute to OS-X-Security-and-Privacy-Guide development by creating an account on GitHub.
more...
No comment yet.
Your new post is loading...
Your new post is loading...
Rescooped by Constantin Ionel Milos / Milos Constantin from d@n3n
Scoop.it!

The Internet is broken: could we please fix it?

The Internet is broken: could we please fix it? | Cyber Security &  Digital Forensics | Scoop.it
Ok, this is a little embarrassing and I hate having to admit it publicly. But I can't hold it in any longer: I think I'm becoming an Internet activist.

Via Danen Raas
more...
Ken Feltman's curator insight, May 29, 8:52 AM
Yes, the Internet is broken and the reason is that simple, old one: Just because you can do something does not mean you should.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

The Cracked Cookie Jar: HTTP Cookie Hijacking
and the Exposure of Private Information 

The Cracked Cookie Jar: HTTP Cookie Hijacking<br/>and the Exposure of Private Information  | Cyber Security &  Digital Forensics | Scoop.it
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

New Wave of Malvertising Leverages Latest Flash Exploit

New Wave of Malvertising Leverages Latest Flash Exploit | Cyber Security &  Digital Forensics | Scoop.it
Fraudulent advertisers in cohort with Angler EK leverage new Flash exploit for maximum infection rates.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

#WPAD Name Collision Flaw Allows MitM #Attacks.

A WPAD protocol vulnerability can be exploited by malicious actors for MitM attacks over the Internet
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

DMA Locker 4.0 – Known Ransomware Preparing For A Massive Distribution

DMA Locker 4.0 – Known Ransomware Preparing For A Massive Distribution | Cyber Security &  Digital Forensics | Scoop.it
We take a look at the step towards maturity of DMA Locker how this will be spreading on a bigger scale.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Sun Tzu & Security in 2016 - Part Two of Two

Sun Tzu & Security in 2016 - Part Two of Two | Cyber Security &  Digital Forensics | Scoop.it
In the second installment of our two-part article series, we will explore a high-level theme running through the thoughts of Sun Tzu in his Art of War.
more...
No comment yet.
Rescooped by Constantin Ionel Milos / Milos Constantin from d@n3n
Scoop.it!

Security Principles in iOS Architecture

Security Principles in iOS Architecture | Cyber Security &  Digital Forensics | Scoop.it

I strongly suggest readers checkout my two prior blogs on Cryptography, Principle of Least Privilege, and Biometrics. All of these will be explored in depth throughout this blog. Introduction My intent has been to educate readers on some basic and fundamental security principles that they experience every day.


Via Danen Raas
more...
No comment yet.
Rescooped by Constantin Ionel Milos / Milos Constantin from Computer: How to Fix Computer Problem
Scoop.it!

How to Fix- Data Loss When Upgrade Windows System

How to Fix- Data Loss When Upgrade Windows System | Cyber Security &  Digital Forensics | Scoop.it
Data recovery after reinstalling is possible. This post tells how to recover data after reinstalling Windows 10/8.1/7 by using MiniTool Power Data Recovery.

Via Anna
more...
No comment yet.
Rescooped by Constantin Ionel Milos / Milos Constantin from Cybercrime and Cybersecurity
Scoop.it!

Ransomware: Re-Evaluating Our Defenses

Ransomware: Re-Evaluating Our Defenses | Cyber Security &  Digital Forensics | Scoop.it
There are two elements of a ransomware attack - the infection and then the action that takes place on infected devices. And both elements are evolving, says Ben

Via Dan Solomon, Oksana Borukh
more...
Ken Feltman's curator insight, May 19, 9:09 AM
A growing threat.
Rescooped by Constantin Ionel Milos / Milos Constantin from Cybercrime and Cybersecurity
Scoop.it!

'Sextortion,' a new cyber crime, is common: study

'Sextortion,' a new cyber crime, is common: study | Cyber Security &  Digital Forensics | Scoop.it
Sextortion—using nude photos of someone to press for even racier content or other goods—is surprisingly common, a US think tank says in what it calls the first in-depth study of another danger lurking in cyberspace.

Via Marc Van den Broeck, Oksana Borukh
more...
No comment yet.
Rescooped by Constantin Ionel Milos / Milos Constantin from "Computação Forense"
Scoop.it!

PowerShell Digital Forensics

PowerShell Digital Forensics | Cyber Security &  Digital Forensics | Scoop.it
Invoke-IR | PowerShell Digital Forensics and Incident Response

Via João Carvalho
more...
João Carvalho's curator insight, April 16, 6:34 AM
Share your insight
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

#Android  #Banking  #Trojan '#SpyLocker' Targets More #Banks  in  #Europe - McAfee

#Android  #Banking  #Trojan '#SpyLocker' Targets More #Banks  in  #Europe - McAfee | Cyber Security &  Digital Forensics | Scoop.it
Since the discovery of the Android banking Trojan SpyLocker, Intel Security has closely monitored this threat. SpyLocker first appeared disguised as Adobe Flash Player and targeted customers of banks in Australia, New Zealand, and Turkey. Recently we have found that the distribution method for this malware has changed. In addition to employing malicious websites that …
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

WhatsApp Gold doesn't exist, it's a scam that spreads malware - Help Net Security

WhatsApp Gold doesn't exist, it's a scam that spreads malware - Help Net Security | Cyber Security &  Digital Forensics | Scoop.it
WhatsApp users are targeted via messages that offer WhatsApp Gold, supposedly an enhanced version of the popular messaging app.
more...
No comment yet.
Rescooped by Constantin Ionel Milos / Milos Constantin from Informática Forense
Scoop.it!

How vulnerable is critical infrastructure to cyber attacks

How vulnerable is critical infrastructure to cyber attacks | Cyber Security &  Digital Forensics | Scoop.it
Analysis: CBR talks to experts at Schneider Electric, Dell, ViaSat, FireEye, NTT, Bitdefender and others on the likelihood and types of attacks on power stations and transport systems
The prospect of cyber attackers successfully derailing national critical infrastructure (NCI) "is not the stuff of fiction anymore".

So says Jon Geater, CTO at cybersecurity firm Thales e-Security, who told CBR that "today, this threat is real and growing, and it is crucial that robust cyber security defences are in place to safeguard our vital services from this growing risk".

Over the last few years, several national critical infrastructure (NCI) attacks have been carried out against such facilities, shutting down power stations and affecting nuclear facilities.

The most widely spoken cyber attack against a country's NCI was Stuxnet when in 2009 and 2010 the computer virus is rumoured to have been built by the American and Israeli governments to sabotage Iran's nuclear power program.

Via Javier Pagès López
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

A Few Easy Steps to Improving Unloved Passwords - McAfee

A Few Easy Steps to Improving Unloved Passwords - McAfee | Cyber Security &  Digital Forensics | Scoop.it
No one likes dealing with passwords, but the reality is we need some form of identification and authentication to protect our digital reputation and information as well as to facilitate customized online experiences. As we celebrate World Password Day 2016, it is time to make passwords both strong and easy to use. At some point, someone …
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Furtim: The Ultra-Cautious Malware

Furtim: The Ultra-Cautious Malware | Cyber Security &  Digital Forensics | Scoop.it
Furtim is the latest stealthy malware, intended to be kept undercover on the expense of hitting more targets.
more...
Ken Feltman's curator insight, May 23, 7:53 AM
New threat: Furtim.
Rescooped by Constantin Ionel Milos / Milos Constantin from #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps
Scoop.it!

#Windows 10 and Windows #Server 2016 #Security #Auditing and #Monitoring reference

#Windows 10 and Windows #Server 2016 #Security #Auditing and #Monitoring reference | Cyber Security &  Digital Forensics | Scoop.it
Hackers frequently use SQL injection as a means of attacking and taking over databases. Here's what you need to know to avoid this type of breach.

Via Frederic GOUTH
more...
No comment yet.
Rescooped by Constantin Ionel Milos / Milos Constantin from #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps
Scoop.it!

Setting up #Virtual #SmartCard #logon using Virtual #TPM for #Windows 10 #HyperV #VM Guests

Setting up #Virtual #SmartCard #logon using Virtual #TPM for #Windows 10 #HyperV #VM Guests | Cyber Security &  Digital Forensics | Scoop.it
Microsoft's official enterprise support blog for AD DS and more

Via Frederic GOUTH
more...
No comment yet.
Rescooped by Constantin Ionel Milos / Milos Constantin from Hacking Wisdom
Scoop.it!

Hacking Wisdom - Hacking the PE File Format:... | Facebook

Hacking the PE File Format:
http://www.hackingwisdom.com/hacking-the-pe-file-format/

Via Hacking Wisdom
more...
No comment yet.
Rescooped by Constantin Ionel Milos / Milos Constantin from d@n3n
Scoop.it!

Avoiding XSS Detection - Fooling the Interpreter

Avoiding XSS Detection - Fooling the Interpreter | Cyber Security &  Digital Forensics | Scoop.it

As any XSSer (one that makes XSS) might know, the script tag is not always available to inject into a XSS hole because it’s the first thing that will be filtered by developer or an WAF (Web Application Firewall).


Via Danen Raas
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Practical  #Malware  #Analysis,  a complete starter #kit .

Practical  #Malware  #Analysis,  a complete starter #kit . | Cyber Security &  Digital Forensics | Scoop.it
Anyone who works in cybersecurity should read Practical Malware Analysis.
more...
Rescooped by Constantin Ionel Milos / Milos Constantin from For a best consideration of Cybersecurity challenges in Africa
Scoop.it!

DROWN Attack - Sites that use the certificates below are vulnerable to eavesdropping.

Sites that use the certificates below are vulnerable to eavesdropping. Attackers may be able to decrypt recorded traffic and steal data.
Via Aly Mime
more...
No comment yet.