Security & Hackti...
Follow
Find
1.2K views | +0 today
 
Scooped by Joaquín Herrero Pintado
onto Security & Hacktivism
Scoop.it!

Schneier on Security: Can I Be Trusted?

Schneier on Security: Can I Be Trusted? | Security & Hacktivism | Scoop.it
Joaquín Herrero Pintado's insight:

I'm a big fan of Bruce Schneier, but just to play devil's advocate, let's say, hypothetically, that Schneier is actually in cahoots with the NSA. Who better to reinstate public trust in weakened cryptosystems? As an exercise in security that Schneier himself may find interesting, what methods are available for proving (or at least affirming) that we can trust Bruce Schneier?

 

more...
No comment yet.

From around the web

Security & Hacktivism
Internet and Systems Security Risks
Your new post is loading...
Your new post is loading...
Scooped by Joaquín Herrero Pintado
Scoop.it!

How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last

How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last | Security & Hacktivism | Scoop.it
"Equation Group" ran the most advanced hacking operation ever uncovered.
more...
No comment yet.
Scooped by Joaquín Herrero Pintado
Scoop.it!

CIA Assessment on Surviving Secondary Screening

CIA Assessment on Surviving Secondary Screening | Security & Hacktivism | Scoop.it
Joaquín Herrero Pintado's insight:
WikiLeaks releases two classified documents by a previously undisclosed CIA office detailing how to maintain cover while travelling through airports using false ID – including during operations to infiltrate the European Union and the Schengen passport control system.
more...
No comment yet.
Scooped by Joaquín Herrero Pintado
Scoop.it!

Hackers Can Read Your Private SMS and Listen to Phone Calls

Hackers Can Read Your Private SMS and Listen to Phone Calls | Security & Hacktivism | Scoop.it
security flaw allows Hackers to Read Your Private SMS and Listen to Phone Calls Secretly.
more...
No comment yet.
Scooped by Joaquín Herrero Pintado
Scoop.it!

Operation Socialist: How British Spies Hacked Belgium’s Largest Telco

Operation Socialist: How British Spies Hacked Belgium’s Largest Telco | Security & Hacktivism | Scoop.it
When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress.
more...
No comment yet.
Scooped by Joaquín Herrero Pintado
Scoop.it!

Cómo la NSA espía las llamadas de teléfono y la regulación de las medidas de investigación tecnológicas en España

Cómo la NSA espía las llamadas de teléfono y la regulación de las medidas de investigación tecnológicas en España | Security & Hacktivism | Scoop.it
more...
No comment yet.
Scooped by Joaquín Herrero Pintado
Scoop.it!

Security Projects - Anti Ransom

Security Projects - Anti Ransom | Security & Hacktivism | Scoop.it
AntiRansom is a tool capable of detect and stop attacks of Ransomware using honeypots.
more...
No comment yet.
Scooped by Joaquín Herrero Pintado
Scoop.it!

Avenging Stuxnet: critical networks in US, 15 other nations, completely owned, possibly by Iran

Avenging Stuxnet: critical networks in US, 15 other nations, completely owned, possibly by Iran | Security & Hacktivism | Scoop.it
Operation Cleaver gets near-complete control of airlines, gas producers, defense.
more...
No comment yet.
Scooped by Joaquín Herrero Pintado
Scoop.it!

Twitter Help Center | What is app graph on Twitter?

Twitter is without a doubt the best way to share and discover what is happening right now.
more...
No comment yet.
Scooped by Joaquín Herrero Pintado
Scoop.it!

On the Complexity and Behaviour of Cryptocurrencies Compared to Other Markets

more...
No comment yet.
Scooped by Joaquín Herrero Pintado
Scoop.it!

Slush 2014 - Cybersecurity hour - Mikko Hyppönen: R.I.P. Internet

Slush 2014 | Silver Stage | Tuesday 18.11.2014 Mikko Hyppönen shares his thoughts on the potential scenarios of the future. -- Mikko Hyppönen is Chief Resear...
more...
No comment yet.
Scooped by Joaquín Herrero Pintado
Scoop.it!

DATAcide | Adbusters

a personalized free data market, which would allow us to exploit our information before others do it for us
more...
No comment yet.
Scooped by Joaquín Herrero Pintado
Scoop.it!

CVE-2015-0311 Adobe Flash

CVE-2015-0311 Adobe Flash | Security & Hacktivism | Scoop.it
Joaquín Herrero Pintado's insight:

Unspecified vulnerability in Adobe Flash Player through 13.0.0.262 and 14.x, 15.x, and 16.x through 16.0.0.287 on Windows and OS X and through 11.2.202.438 on Linux allows remote attackers to execute arbitrary code via unknown vectors, as exploited in the wild in January 2015.

more...
No comment yet.
Scooped by Joaquín Herrero Pintado
Scoop.it!

Here’s What Happens When You Install the Top 10 Download.com Apps

Here’s What Happens When You Install the Top 10 Download.com Apps | Security & Hacktivism | Scoop.it
We installed the top 10 apps from Download.com, and you’ll never believe what happened! Well… I guess maybe you might have a good guess. Awful things. Awful things are what happens. Join us for the fun!
Joaquín Herrero Pintado's insight:
Freeware software vendors make almost all of their money by bundling complete nonsense and scareware that tricks users into paying to clean up their PC, despite the fact that you could prevent the need to clean up your PC by just not installing the crappy freeware to begin with.
more...
No comment yet.
Scooped by Joaquín Herrero Pintado
Scoop.it!

Google engineer finds critical security flaw in Windows and makes it public after Microsoft ignored it in the 90-day disclosure policy period.

Google engineer finds critical security flaw in Windows and makes it public after Microsoft ignored it in the 90-day disclosure policy period. | Security & Hacktivism | Scoop.it

2406 puntos y 109 comentarios hasta ahora en reddit

more...
No comment yet.
Scooped by Joaquín Herrero Pintado
Scoop.it!

Attack Is Suspected as North Korean Internet Collapses

Attack Is Suspected as North Korean Internet Collapses | Security & Hacktivism | Scoop.it
The loss of service came just days after President Obama pledged that the United States would launch a “proportional response” to the recent attacks on Sony Pictures.
more...
No comment yet.
Scooped by Joaquín Herrero Pintado
Scoop.it!

Misfortune Cookie Vulnerability

Misfortune Cookie Vulnerability | Security & Hacktivism | Scoop.it
Misfortune Cookie is a critical vulnerability that allows an intruder to remotely take over an Internet router and use it to attack home and business networks. An advisory regarding the Misfortune Cookie Vulnerability uncovered by Check Point Software Technologies
more...
No comment yet.
Scooped by Joaquín Herrero Pintado
Scoop.it!

Secret surveillance detected in Oslo

Secret surveillance detected in Oslo | Security & Hacktivism | Scoop.it
Norway’s prime minister and members of parliament may be subject to secret surveillance by means of fake mobile base stations in the centre of Oslo.
more...
No comment yet.
Scooped by Joaquín Herrero Pintado
Scoop.it!

Google Online Security Blog: Are you a robot? Introducing “No CAPTCHA reCAPTCHA”

Google Online Security Blog: Are you a robot? Introducing “No CAPTCHA reCAPTCHA” | Security & Hacktivism | Scoop.it
more...
No comment yet.
Scooped by Joaquín Herrero Pintado
Scoop.it!

Finally, a New Clue to Solve the CIA's Mysterious Kryptos Sculpture

Finally, a New Clue to Solve the CIA's Mysterious Kryptos Sculpture | Security & Hacktivism | Scoop.it
In 1989, the year the Berlin Wall began to fall, American artist Jim Sanborn was busy working on his Kryptos sculpture, a cryptographic puzzle wrapped in a riddle that he created for the CIA’s headquarters and that has been driving amateur and...
more...
No comment yet.
Scooped by Joaquín Herrero Pintado
Scoop.it!

Assange afirma que Google trabaja para el Gobierno de EEUU

Assange afirma que Google trabaja para el Gobierno de EEUU | Security & Hacktivism | Scoop.it
Según Assange, "Google permite a la ASN (Agencia de Seguridad Nacional estadounidense cuyo espionaje internacional masivo ha sido revelado por el exanalista de la CIA Edward Snowden) y al FBI leer los correos electrónicos. Incluso en una aburrida comisaría de policía o en un juzgado, se puede tener acceso a esos correos sin orden judicial".
more...
No comment yet.
Scooped by Joaquín Herrero Pintado
Scoop.it!

Zimperium Discovers Full-Duplex ICMP Redirect Attacks in the Wild

Zimperium Discovers Full-Duplex ICMP Redirect Attacks in the Wild | Security & Hacktivism | Scoop.it
Zimperium Mobile Security Labs have investigated during the last year a new type of attack technique in the wild being exploited by attackers. Aptly named “DoubleDirect,” this attack technique is a type of “Man-in-the-Middle” attack (MITM) enabling an attacker to redirect a victim’s traffic to the attacker’s device. Once redirected, the attacker can steal credentials [...]
Joaquín Herrero Pintado's insight:
DoubleDirect uses ICMP Redirect packets (type 5) to modify routing tables of a host. - See more at: http://blog.zimperium.com/doubledirect-zimperium-discovers-full-duplex-icmp-redirect-attacks-in-the-wild/#sthash.kKtniJBu.dpufDoubleDirect uses ICMP Redirect packets (type 5) to modify routing tables of a host. - See more at: http://blog.zimperium.com/doubledirect-zimperium-discovers-full-duplex-icmp-redirect-attacks-in-the-wild/#sthash.kKtniJBu.dpufDoubleDirect uses ICMP Redirect packets (type 5) to modify routing tables of a host. - See more at: http://blog.zimperium.com/doubledirect-zimperium-discovers-full-duplex-icmp-redirect-attacks-in-the-wild/#sthash.kKtniJBu.dpufDoubleDirect uses ICMP Redirect packets (type 5) to modify routing tables of a host. - See more at: http://blog.zimperium.com/doubledirect-zimperium-discovers-full-duplex-icmp-redirect-attacks-in-the-wild/#sthash.kKtniJBu.dpufDoubleDirect uses ICMP Redirect packets (type 5) to modify routing tables of a host. - See more at: http://blog.zimperium.com/doubledirect-zimperium-discovers-full-duplex-icmp-redirect-attacks-in-the-wild/#sthash.kKtniJBu.dpufDoubleDirect uses ICMP Redirect packets (type 5) to modify routing tables of a host. - See more at: http://blog.zimperium.com/doubledirect-zimperium-discovers-full-duplex-icmp-redirect-attacks-in-the-wild/#sthash.kKtniJBu.dpuf
more...
No comment yet.