Infosec

sicurezza informatica, hacking
42 Pins4 Followers
I was wondering recently after poring through yet another data breach how many people actually use multi-step verification. I mean here we have a construct where even if the attacker has the victim's credentials, they're rendered useless once challenged for the authenticator code or SMS which is subsequently set. I

Bkav chia sẻ chi tiết quá trình "qua mặt" Face ID của iPhone X

Two-factor authentication is a mess - The Verge

Two-factor authentication is a mess

Two-factor authentication is an extra layer of security for your Apple ID designed to ensure that you're the only person who can access your account, even if someone knows your password.

What Really Happened with Vista: An Insider’s Retrospective

What Really Happened with Vista: An Insider’s Retrospective

Experts: Cybersecurity is up to you

Experts: Cybersecurity is up to you

“Meltdown” and “Spectre”: Every modern processor has unfixable security flaws | Ars Technica

“Meltdown” and “Spectre”: Every modern processor has unfixable security flaws

“Meltdown” and “Spectre”: Every modern processor has unfixable security flaws | Ars Technica

SMBlog -- 4 January 2018

SMBlog -- 4 January 2018

'Kernel memory leaking' Intel processor design flaw forces Linux, Windows redesign • The Register

'Kernel memory leaking' Intel processor design flaw forces Linux, Windows redesign • The Register

StrongPity, un Advanced Persistent Threat macchiato di sangue - ICT Security Magazine

StrongPity, un Advanced Persistent Threat macchiato di sangue - ICT Security Magazine

Guidelines for Independent Remote Interconnect Security Testing - About Us

Guidelines for Independent Remote Interconnect Security Testing - About Us

Snort - InfoSec Addicts | Cyber Security | Pentester

One of the most important open source projects in the field of network security is Snort. Being specialized as a Network Intrusion Detection System (NIDS).

Using APT tactics and techniques in your pentests - InfoSec Addicts

Using APT tactics and techniques in your pentests - InfoSec Addicts

ROCA: Vulnerable RSA generation (CVE-2017-15361) [CRoCS wiki]

ROCA: Vulnerable RSA generation (CVE-2017-15361) [CRoCS wiki]

Bypassing Intel Boot Guard | Embedi

Bypassing Intel Boot Guard | Embedi

Using infrared cameras to break out of air-gapped networks – Naked Security

Using infrared cameras to break out of air-gapped networks – Naked Security

Cisco's Talos Intelligence Group Blog: CCleaner Command and Control Causes Concern

CCleaner Command and Control Causes Concern

Pinterest
Search