Hacking Wisdom
6.5K views | +10 today
 
Scooped by Hacking Wisdom
onto Hacking Wisdom
Scoop.it!

IBM AIX 6.1.8+ Privilege Escalation ≈ Packet Storm

Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
more...
No comment yet.
Hacking Wisdom
Your new post is loading...
Your new post is loading...
Rescooped by Hacking Wisdom from Cyber Security & Digital Forensics
Scoop.it!

Practical  #Malware  #Analysis,  a complete starter #kit .

Practical  #Malware  #Analysis,  a complete starter #kit . | Hacking Wisdom | Scoop.it

Via Constantin Ionel Milos / Milos Constantin
Hacking Wisdom's insight:
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Intel x86s hide another CPU that can take over your machine (you can't audit it)

Intel x86s hide another CPU that can take over your machine (you can't audit it) | Hacking Wisdom | Scoop.it
Recent Intel x86 processors implement a secret, powerful control mechanism that runs on a separate chip that no one is allowed to audit or examine. When these are eventually compromised, they’…
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Apple’s ‘Differential Privacy’ Is About Collecting Your Data—But Not ​Your Data

Apple’s ‘Differential Privacy’ Is About Collecting Your Data—But Not ​Your Data | Hacking Wisdom | Scoop.it
At WWDC, Apple name-checked the statistical science of learning as much as possible about a group while learning as little as possible about any individual in it.
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Mossack Fonseca worker arrested in Switzerland

Mossack Fonseca worker arrested in Switzerland | Hacking Wisdom | Scoop.it
Employee is held on suspicion of ‘extracting confidential information’ from law firm at centre of Panama Papers
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Statistics for Hackers - PyCon 2016

Statistics has the reputation of being difficult to understand, but using some simple Python skills it can be made much mor

more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Firefox Nightly enables Contextual Identities on the Web

Firefox Nightly enables Contextual Identities on the Web | Hacking Wisdom | Scoop.it

The Containers Feature in Firefox Nightly enables users to login to multiple accounts on the same site simultaneously and gives users the ability to segregate site data for improved privacy and security.

more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Why don't PGP and SSH keys see more widespread use as a second factor when authenticating? - Information Security Stack Exchange

Why don't PGP and SSH keys see more widespread use as a second factor when authenticating? - Information Security Stack Exchange | Hacking Wisdom | Scoop.it
more...
No comment yet.
Rescooped by Hacking Wisdom from Hacking Wisdom
Scoop.it!

FREE TUTORIAL FOR DOWNLOAD: the Complete "PE File Format Tutorial - A Reverse Engineering View"- Hacking Wisdom

FREE TUTORIAL FOR DOWNLOAD: the Complete "PE File Format Tutorial - A Reverse Engineering View"- Hacking Wisdom | Hacking Wisdom | Scoop.it
The Hacker's View of IT Security
more...
Hacking Wisdom's curator insight, June 10, 12:16 PM
POST UPDATE: Download the Complete "PE FILE FORMAT TUTORIAL" for FREE at:
http://www.hackingwisdom.com/hacking-the-pe-file-format/
Scooped by Hacking Wisdom
Scoop.it!

Investigatory Powers Bill: Privacy concerns 'could be met' - BBC News

Investigatory Powers Bill: Privacy concerns 'could be met' - BBC News | Hacking Wisdom | Scoop.it
Powers that allow UK security services to collect large volumes of personal data are not "inherently incompatible" with privacy laws, say MPs and peers.
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

DDOS-as-a-service offered for just five dollars

DDOS-as-a-service offered for just five dollars | Hacking Wisdom | Scoop.it
Freelancer-finding site Fiverr boots out sellers, but DDOS prices are plunging everywhere
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Pastejack attack turns your clipboard into a threat

Pastejack attack turns your clipboard into a threat | Hacking Wisdom | Scoop.it

Pastejack attack turns your clipboard into a threat: CTRL-V vector turns "not evil" into "evil" without the target noticing

more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

How LinkedIn’s password sloppiness hurts us all

How LinkedIn’s password sloppiness hurts us all | Hacking Wisdom | Scoop.it
Second data dump lets hackers be 6 times better cracking future dumps.
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Uber Hacking: How we found out who you are, where you are and where you went! | INTEGRITY Labs

Uber Hacking: How we found out who you are, where you are and where you went! | INTEGRITY Labs | Hacking Wisdom | Scoop.it
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

the Windows Subsystem for Linux #WSL

the Windows Subsystem for Linux #WSL | Hacking Wisdom | Scoop.it
This is the fourth in a series of blog posts on the Windows Subsystem for Linux (WSL). For background information you may want to read the architectural overview, introduction to pico processes and WSL system calls blog posts. Posted on behalf of  Sven Groot. Introduction One of the key goals for the Windows Subsyste
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

2016 Guide to User Data Security | Inversoft

Secure your servers and your applications to prevent hackers from accessing your user data.
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

FBI says utility pole surveillance cam locations must be kept secret

FBI says utility pole surveillance cam locations must be kept secret | Hacking Wisdom | Scoop.it
"Disclosure of even minor details about them may cause jeopardy," bureau says.
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Smart detection for passive sniffing in the Tor-network

Smart detection for passive sniffing in the Tor-network | Hacking Wisdom | Scoop.it
The key to developing new methods for detecting sniffing exit nodes, is that the data must be readable and this data must also be reuseable (...)
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

HTTP Header Injection in Python urllib

Python's built-in URL library ("urllib2" in 2.x and "urllib" in 3.x) is vulnerable to protocol stream injection attacks (a.k.a. "smuggling" attacks) via the http scheme. If an attacker could convince a Python application using this library to fetch an arbitrary URL, or fetch a resource from a malicious web server, then these injections could allow for a great deal of access to certain internal services.
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

CRITICAL UPDATE Re: DAO Vulnerability - Ethereum Blog

An attack has been found and exploited in the DAO, and the attacker is currently in the process of draining the ether contained in the DAO into a child DAO. The attack is a recursive calling vulnerability, where an attacker called the “split” function, and then calls the split function recursively inside of the split, …
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Marcher mobile malware adds nine UK banks to target list

Marcher mobile malware adds nine UK banks to target list | Hacking Wisdom | Scoop.it
Russian banking malware, Marcher, is headed for the UK in a big way - banks and consumers are urged to be on guard.
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

​SWIFT promises security improvements for its bank transfer tech

​SWIFT promises security improvements for its bank transfer tech | Hacking Wisdom | Scoop.it
A new plan is designed to thwart fraudulent use of the system that in February was involved in a heist of $81 million.
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Google to kill passwords on Android, replace 'em with 'trust scores'

Google to kill passwords on Android, replace 'em with 'trust scores' | Hacking Wisdom | Scoop.it
Hello, privilege escalation attacks
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

The Snowden effect: Privacy is good for business

The Snowden effect: Privacy is good for business | Hacking Wisdom | Scoop.it
Tech companies didn't look so good when Edward Snowden revealed they were helping governments spy on average people. But the revelations have worked in the industry's favor.
more...
No comment yet.