security

  1. Brother

    Beautiful picture or security? With the LogoFAIL vulnerability, hackers will inject a bootkit into your UEFI without too much noise

    Global threat: hundreds of models of computers and laptops are at risk. Numerous security vulnerabilities collectively known as LogoFAIL allow attackers to interfere with the boot process of computer devices and implement bootkits, due to problems related to image analysis components that...
  2. Brother

    Just three vulnerabilities in ownCloud hurt user security

    The developers gave recommendations for mitigating the consequences, so you should not delay them. Developers of the ownCloud open source software used for syncing data and working together with files, warned on November 21 about three critical vulnerabilities that can be used to disclose...
  3. Lord777

    Total control for the sake of security: the new norm in UK politics?

    The new bill threatens end-to-end encryption and data security. The UK government has initiated a bill that will oblige technology companies to provide information about planned innovations in the field of security of their products and, if necessary, even disable them on demand. These...
  4. Carding 4 Carders

    How Tor Browser passed the strength test: security audit results

    Detailed analysis: what vulnerabilities were found in Tor? The developers of the popular tool for anonymous Internet surfing, Tor Browser, have released the results of an extensive security audit. The audit covered the main projects: Tor Browser, OONI Probe, rdsys, BridgeDB and Conjure. Experts...
  5. Carding 4 Carders

    StripedFly: how the malware deceived information security specialists and affected millions of victims

    A universal program in the cryptominer mask allows you to conduct cyber attacks of any type. Kaspersky Lab specialists have identified a complex malware campaign called StripedFly, previously unknown and extremely confusing. Since 2017, the operation has affected more than one million users...
  6. Carding 4 Carders

    Who will win the fight for your privacy: banks or security forces?

    The new bill raises many questions and debates. Russian banks have expressed their opposition to the bill proposing to provide law enforcement agencies with direct access to information systems and databases with customer information, the Association of Banks of Russia (ADB) reports in a letter...
  7. CarderPlanet

    iPhone security on the verge: a new 0day vulnerability caused massive attacks on users

    Apple urgently fixes a bug that allows you to take control of the device. Apple has released emergency security updates to address a new zero-day vulnerability that was exploited in attacks on iPhone and iPad users. In an official statement, Apple said that it is aware of the active...
  8. Carding

    Why are we being deceived? The unsightly side of security guides.

    Find out the truth behind the security guidelines. The cybersecurity instructions you receive at work may cause confusion? You are not alone. According to a recent study, there are a number of problems in the wording of these guidelines. The authors suggest simple measures to improve the...
  9. Carding

    Attack on the Paraguayan Police: stavka – the future of the country's security

    Data leaks can affect national security and international relations. More than 500,000 internal documents and images, as well as 175 GB of SQL databases, were stolen from the system of the National Police of Paraguay (Policía Nacional del Paraguay). Among the leaked data are documents from...
  10. Carding

    How ASUS disappointed its fans: three unacceptable mistakes in router security

    Update your firmware or your data is in trouble. Three critical remote code execution vulnerabilities were found in popular ASUS router models: RT-AX55, RT-AX56U_V2, and RT-AC86U. The defects will allow potential attackers to gain full control over devices if the user does not install the...
  11. Hacker

    Total FAQ on Network Security and Anonymity

    1. Complete anonymity does not exist in nature at all! "Complete anonymity" is not required, it is enough to confuse the chain in such a way that its unraveling is unprofitable and the effort spent does not pay off with the result. To reach this level, you do not need any special knowledge and...
  12. CarderPlanet

    Security and Privacy Apps for your Android!

    Good day! Today we have selected apps for you that will greatly enhance your security and privacy when using Android devices. In addition to protecting your personal data, applications will allow you to replace some of the Google services that most aggressively collect user information. Let's...
  13. BigBeast

    HOW TO DETECT SSH HONEYPOTS ?

    What are SSH honeypots? Honeypots are decoy servers or systems set up to gather information regarding an attacker or intruder into a system. They are designed to look vulnerable to attack, but once an intruder gains access to the system all of their actions are controlled and monitored. SSH...
  14. Lord777

    5 simple rules for telegram account security

    Although Telegram is a well-protected messenger - there was not a single leak or suspicion of cooperation with special services - there is always a human factor. To accurately protect yourself from account hijacking or theft of valuable data, follow these tips: 1. Urgently enable two-factor...
  15. BigBeast

    How to delete RDP logs?

    I need help regarding deleting RDP logs after using RDP. How can i manually delete RDP logs from my PC & is there any way to delete them automatically? And,for how many days a RDP can last?
  16. BigBeast

    Incognito window

    What is advisable? Incognito window or normal Window for Browser like Firefox. I use CCleaner after closing the browser.
  17. CreedX

    The best security apps for Android!

    F-Droid - analog to Play Market, but with free and open source apps. Private Location - a simple app to set up your location anywhere in the world and increase the overall privacy of your phone's location. KeePassDroid -the best program for securely storing passwords and sensitive data in...
  18. Teacher

    Online security and privacy

    Today's material is devoted to the most common channels for transmitting information on a home or partly corporate laptop, as well as the struggle for personal safety and anonymity. Content 1. How to protect your browser from data leaks. 2. Temporary mailboxes 3. How to get a virtual number for...
  19. Carding

    Carders defensive stance to enforce justice

    How carders build their line of defense when facing justice: Correct legend and testimony. It can happen to anyone. I accidentally lost my IP, made a call from a flashed SIM card, recognized my neighbor - no matter how, but I got burned. They came to you, and guys in uniform came to you. In...
  20. Carder

    Offline anonymity and security. How not to get into a mess?

    Good time of day. Last time I wrote about how you can be tracked using your own mobile phone, but this article will be a Supplement and will be devoted to aspects of psychological security and anonymization, which is inherently associated with offline, and also rather focused on beginners and...
Top