recentpopularlog in

ignatz : security   150

« earlier  
The CIA's communications suffered a catastrophic compromise
According to the former intelligence official, once the Iranian double agent showed Iranian intelligence the website used to communicate with his or her CIA handlers, they began to scour the internet for websites with similar digital signifiers or components — eventually hitting on the right string of advanced search terms to locate other secret CIA websites.
google  security  infosec  cia  via:jomc 
november 2018 by ignatz
REV-Medtronic-2090-Security-Bulletin_FNL.pdf
programming setup for heart device can be rooted over the internet
security  medical  yikes 
october 2018 by ignatz
The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies - Bloomberg
Bloomberg claims that companies have/had chinese spy hardware in their servers
business  china  hacking  security  hardware  amazon  apple 
october 2018 by ignatz
Wardoghk comments on Found hooked up to my router
Someone's roommate hooked up a phishing/snooping device to the house router after being conned by a pyramid scheme
security  infosec  wtf  reddit  networking 
september 2018 by ignatz
Bitfi's hardware wallet is terrible | rya.nc
my conclusion is that their product is most charitably described as a "footgun".
bitcoin  ha  security 
july 2018 by ignatz
URL Canary - Home
put an embed in your secret stuff that goes off when someone steals it
security  tools 
march 2018 by ignatz
The House That Spied on Me
setting up residence with maximum internet crap in it to test privacy
security  privacy  IoT 
february 2018 by ignatz
The Dallas County Siren Hack | Duo Security
The emergency sirens were activated in Dallas County last Friday night at 11:42pm. First reported as a malfunction, it was later discovered to be a hack - here’s the technical details and why someone may have done it.
security 
april 2017 by ignatz
Smart TV hack embeds attack code into broadcast signal—no access required | Ars Technica
Demo exploit is inexpensive, remote, scalable—and opens door to more advanced hacks.
security  tv 
april 2017 by ignatz
CIRCL » CIRCLean - USB key sanitizer
CIRCLean is a new tool developed by CIRCL, allowing to clean any malicious files from a USB key. Transform an untrusted key into a trusted one.
security 
march 2017 by ignatz
API Monitor: Spy on API Calls and COM Interfaces (Freeware 32-bit and 64-bit Versions!) | rohitab.com
API Monitor is a software that monitors and displays API calls made by applications and services. Its a powerful tool for seeing how Windows and other applications work or tracking down problems that you have in your own applications
security 
september 2016 by ignatz
New cloud attack takes full control of virtual machines with little effort | Ars Technica
Existing crypto software "wholly unequipped" to counter Rowhammer attacks.
security  cloud  moon  doom 
august 2016 by ignatz
California Police Used Stingrays in Planes to Spy on Phones | WIRED
The sweeping technology being used by Anaheim police picks up tracking data from every phone for miles--in this case, the miles around Disneyland.
security  oppression  stingray  oc  anaheim  villainy 
january 2016 by ignatz
JavaScript Backdoor - Drops
Author:三好学生FROM:http://drops.wooyun.org/tips/117640x00 PrefaceCasey Smith recently shared his res...
security  failure  windows 
january 2016 by ignatz
Shodan
search engine for internet-connected devices
search  iot  security  ha 
january 2016 by ignatz
Dell ships laptops with rogue root CA, exactly like what happened with Lenovo and Superfish : technology
I got a shiny new XPS 15 laptop from Dell, and while attempting to troubleshoot a problem, I discovered that it came pre-loaded with a self-signed...
security  dell  failure 
november 2015 by ignatz
Hash Database | Internet Security | SANS ISC
This page will search your for a hash in the NIST National Software reference Library for files matching your hash. The NSRL is a collection of hashes of "known" software
security  utility  isc  md5  reference 
november 2014 by ignatz
Wickr - Leave No Trace!
free encrypted communication app for smartphones
encryption  privacy  security  iphone  ios  android  smartphone 
january 2014 by ignatz
susanwerner/sshxor · GitHub
This is a simple ssh obfuscating proxy -- it xors every byte of SSH traffic
with 0x19. This is enough to defeat DPI systems that try to look at the SSH
handshake / version string to identify SSH traffic.
ssh  security  utilities 
march 2013 by ignatz
Verizon Business Security Blog » Blog Archive » Case Study: Pro-active Log Review Might Be A Good Idea
tale of ghost employee who replaced himself with a Chinese trojan. sounds too good to be true
china  security  employment  officespace  ha 
january 2013 by ignatz
Silent Skype calls can hide secret messages | HITBSecNews
"They found they could transmit secret text, audio or video during Skype calls at a rate of almost 1 kilobit per second alongside phone calls."
security  skype  voip  crypto 
january 2013 by ignatz
BLDGBLOG: Keys to the City
A set of "master keys" to the infrastructure of New York City popped up on eBay last month
security  failure  spof 
october 2012 by ignatz
Mosh: the mobile shell
wonderful improvement on ssh, never disconnect again
ssh  security  sysadmin  unix 
september 2012 by ignatz
« earlier      
per page:    204080120160

Copy this bookmark:





to read