recentpopularlog in

cyber

« earlier   
Cyber warfare may be imminent, but defender power is on the rise
"Outside of geopolitical conflict and terrorism, our research has found that malware continues to be a major threat. In fact, it was the most prolific type of cyberattack UK businesses experienced in 2019. Our latest UK Threat Report was published in October 2019. One in five businesses (21%) reported seeing custom malware attacks most frequently and 10% cited commodity malware. It means that 31% of businesses reported malware to be the most witnessed attack type."
blogs  cni  cyber  strikes  financial  services  iran  malware  ransomware  terrorism  us 
3 days ago by jonerp
IVRE — Network recon framework
An open-source network recon framework to analyze Nmap, Masscan, Zeek/Bro and p0f results through Web interfaces, CLI tools and a Python API.
recon  cyber  map  networking  python  Toolkit  Tools 
6 days ago by tranqy
(8) Why biometric security fails at being secure - YouTube
Why biometric security fails at being secure. can't change your finger
on a long enough timescale - your fingerprint of face will be re-created
high resolution photo can replicate fingerprint. can't change fingerprint nor face
don't need to photograph. just steal them. all of them. in an attack.
this will happen eventually.

& The New Attack Surface is Your Life - https://www.youtube.com/watch?v=AQP0On85ZdQ
- hackers spend millions, you spend 0, = hackers win. if they target you.

& Phone numbers can not be highjacked as well
These 7 Digits May Be More Important Than Your Social Security Number
https://www.youtube.com/watch?v=5yPyOhIplzA
running your life through one device - you are vulnerable
- have burner phone number for contacts

https://www.theguardian.com/money/2020/feb/23/scams-fraud-banking-co-operative-reforms-victims-refund
biometric  fingerprint  security  cyber  IT  identity  theft  2FA  phone  number  sim  jacking  swapping  ransomware  phishing  impersonation  social  engineering 
8 days ago by asterisk2a
(1) UNINSTALL This Windows 10 Update RIGHT NOW - YouTube
quiet the amount of energy put in into Bitcoin Scam/Pyramid Schemes - send out to word. Hijack youtube channels through elaborate phishing.
send email impersonating cusomer support or being sponsor.
ask to download an app - eg games streamers asked to download an app to test. for sponsor ship. app then download the youtubers/twitch session cockies. which are then used to high jack the account.
one prominent POE YouTuber, GhazzyTV got his YT account highjacked.
Bitcoin  scam  phishing  cookies  sessions  cyber  IT  security  2FA 
10 days ago by asterisk2a
To Bolster Cybersecurity, the US Should Look to Estonia | WIRED
The tiny European nation has come a long way after crippling cyberattacks in 2007. Now it offers key lessons in attracting tech talent and educating citizens.
politics  policy  tech  cyber  security 
12 days ago by sandykoe
Git clone all organizational repos - Threatexpress
Pull all repos within a hierarchical folder structure
github  Cyber 
17 days ago by jgraham20
Quantum supremacy chase: India in select country club
India has joined a select few countries that chase “Quantum Supremacy” with a Rs 8,000-crore national mission to crack into the nextgeneration technology, which promises exponential ‘compute’ power and to rewrite the rules of present-day computing.The Department of Science and Technology (DST), which is drafting the contours of the mission to be detailed in a month, is looking to build a homegrown 50 Qubit ‘Quantum Computer’ in 4-5 years as part of the mission, which will also include building solutions for quantum communications, storage and encryption.Once proven, the disruptive technology — still under works at labs in the United States, Russia, China and India — could be used to hack into any cyber security system in a matter of seconds, making it a strategic need for countries.A typical computer stores information in bits—either as a 0 or 1— but quantum computers can store information in two quantum bits (or qubits) as both a 0 and a 1 at the same time, that is as 11 or 01, which means that the computational power of a system can multiply exponentially.India is not only betting on quantum technology for strategic purposes, but also to focus on applications in areas such as medical, agriculture, space and aerospace engineering. For instance, it can reduce the time-tomarket of drug discovery to just two days from the current 10 years, run tests on various demographic and gene profiles, run complex aircraft simulations within a matter of minutes.
India  technology  cyber 
18 days ago by thomas.kochi
To Change or Not to Change: The Decision to Stay on the Green Screen
"Let’s consider a few reasons why you may not want to replace your legacy system, just yet:

They simply don’t break: Like your Grandad’s 1992 Honda or Swiss watch, the thing will pretty much run forever. The technology behind the old IBM mainframes is simple and sturdy, and as long as it is cleaned and maintained it will work. Cloud ERP systems, on the other hand, are only as reliable as your users’ internet connections.
Your business has not changed: We find many scenarios where companies have been doing the same thing for 30 years, and with good reason. Consider a company that manufactures a niche supply part for an industrial manufacturing segment. It may be specialized enough that the barriers and cost of entry is too great for competitors to chase and they have consistent clientele. With no desire to expand, there may be no reason to change what’s working."
digital  strategy  erp  software  selection  cloud  cyber  security  cybersecurity  failures  independent  consultants  top  10  systems  for  2020 
20 days ago by jonerp
Warren proposes criminal penalties for spreading disinformation online
Democratic presidential candidate Elizabeth Warren on Wednesday released a plan to fight disinformation to hold tech companies accountable for their actions in light of the 2016 election. 

Warren proposed to combat disinformation by holding big tech companies like Facebook, Twitter, and Google responsible for their actions.
cyber  legislation  socialmedia 
4 weeks ago by wiobyrne
How to Set Up a Headless Raspberry Pi Hacking Platform Running Kali Linux « Null Byte :: WonderHowTo
The Raspberry Pi is a credit card-sized computer that can crack Wi-Fi, clone key cards, break into laptops, and even clone an existing Wi-Fi network to trick users into connecting to the Pi instead. It can jam Wi-Fi for blocks, track cell phones, listen in on police scanners, broadcast an FM radio signal, and apparently even fly a goddamn missile into a helicopter.
hacking  admin  raspberrypi  linux  kali  cyber  hacker  headless  jk-kali  jk-linux 
4 weeks ago by tranqy
The Zeek Network Security Monitor
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. (Zeek is the new name for the long-established Bro system. Note that parts of the system retain the "Bro" name, and it also often appears in the documentation and distributions.)
cyber  security 
4 weeks ago by rpmuller

Copy this bookmark:





to read