Skip to main content

Search

Items tagged with: itsec


 
do not abolish cash! this is why digital phone payment is NOT safe

Bild/Foto

while overall cryptocurrency is a good idea – because it allows decentralized money transactions.

… it is not cool that
  • your name
  • postal code
  • birth date
  • phone number
… are enough info for social engineering hackers to set a new password to your account or initiate a SIM phone number swap and steal millions and millions in cryptocurrency!

social engineering centers on:
  • Amazon and Co say: “customer is king”
... show more


 
do not abolish cash! this is why digital phone payment is NOT safe

Bild/Foto

postal code, birth date, phone number and name, social engineering and SIM swaps stole millions and millions of cryptocurrency!

social engineering centers on:
  • Amazon and Co say: “customer is king” – well yes – but changing passwords by people that you can not properly verify / authenticate is a horror scenario.
  • BigData and information-over-sharing – the more information hackers have about you
    • the easier they can lure phone-support-staff of f
... show more


 
do not abolish cash! this is why digital phone payment is NOT safe

Bild/Foto

postal code, birth date, phone number and name, social engineering and SIM swaps stole millions and millions of cryptocurrency!

social engineering centers on:
  • Amazon and Co say: “customer is king” – well yes – but changing passwords by people that you can not properly verify / authenticate is a horror scenario.
  • BigData and information-over-sharing – the more information hackers have about you
    • the easier they can lure phone-support-staff of f
... show more


 
... show more


 
better safe than sorry - CheckPoint Security found security problems in OpenSource and closed source rdp clients/servers - mstsc microsoft remote desktop rdp client - how to disable clipboard sharing

CheckPoint Security found security problems in OpenSource and closed source rdp clients/servers – the product vendors including MS have been informed and everybody except MS will update their products. X-D

a hacked rdp server can „attack“ the client – in the moment – the client pastes content from server (files or other stuff) – at this moment a malicious/compromised server running outside of corporate LAN could place a file at any path of the client (autostart folder) and run it next time the system boots. not cool.

proposed solution: disable clipboard sharing
... show more


 
RT @CCC_CH Aus aktuellem Anlass ("#Hackerangriff") - (Grenzüberschreitende) Anleitung zur Digitalen Selbstverteidigung https://twitter.com/CCC_CH/status/1081606376005218309 https://www.woz.ch/system/files/epaper/woz/pdf/woz_digi-ratgeber_okt18.pdf (pdf)


 
Bild/Foto
Bild/Foto
Bild/Foto
medallion/pendant USB XPCTOS cases.
USB holds bootable XPCTOS Audio/Video Synthesis/Performance/Production Operation System with 10 to 26 gigs of free space for additional storage.
Limited to first 30 early attendees. (March 9th, 2018, Denver)

https://hearthis.at/marc.fleury.39/unknown-artist-cos111c/

THEE HAUS OV WHERE PRESENTS:


Bild/Foto
... show more


 
Sitting at an API security conference.....
lot of really intelligent ideas and thoughts so far that have thus far ignored overt and blatant vulnerabilities to whatever their stack may be (i.e. chipset issues such as Intel's ME) and/or seem overly stuck in centralized model past.
Enterprise is on the verge of eating itself apparently..... stumbling giants with lots of brains, lots of talk, and next to no idea about what to do.

#ITSec #NetSec #Security #Enterprise #Hacking #API #Networking #WTF


 

EVERYTHING YOU NEED TO SEE THE UNITED NATION (a reprise)


(CONTINUED FROM EVERYTHING YOU NEED TO KNOW ABOUT CRYPTOCURRENCY)
Bild/Foto

TheShadowBrokers Monthly Dump Service - June 2017
Below is a copy of the last public message from The ShadowBrokers regarding a public offering of exploit tools for sale. Before showing the actual message itself, I’d like to offer comment on some of it’s contents as well as the time we now live, and in the process, hopefully make clear a widespread conspiracy that is no longer hidden.
I’ll note, far more than a Snowden, a Wikileaks, or any single... show more