Mobile operators have bothered to secret communication

+ 0 -

The developers of Windows 10 have implemented protection against ransomware viruses. It can be bypassed using a DLL injection

+ 0 -

Conference BLACK HAT USA. A botnet of a million browsers. Part 2

Conference BLACK HAT USA. A botnet of a million browsers. Part 2 3r33434. 3r3-31. Conference BLACK HAT USA. A botnet of a million browsers. Part 1 3r3402.  3r33434. 3r3402.  3r33434. 3r3406. Matt Johanson: [/b] Now I will show you how to enter this code. There are many ad networks, but we chose this one because it allows us to do what we want. 3r3402.  3r33434. 3r3402.  3r33434. 3r314. 3r3402.  3r33434. 3r3402.  3r33434. You can choose a banner image of a sufficiently large size, paste it here and assign it a URL, so that after clicking on the banner the user will go to the desired site. The owners of this ad network provide the option of HTML jаvascript...
+ 0 -

Eat breakfast yourself, share your work with the “cloud”

Eat breakfast yourself, share your work with the “cloud” 3r33333.  
How Zyxel Cloud helps the local gateway to repel threats. 3r33333.  
3r33333.  
Speaking of security (and not only in IT) it is customary to frighten the consumer. 3r33333.  
“Here come the evil hackers and hack the network. Therefore, it is necessary, it is necessary, it is necessary and further a long list of everything that needs to be bought, set up to order, spend, and, most importantly, allocate a lot of money for this. ”3r33317.  
3r33320. 3r33333.  
3r33333.  
Terrible stories about mysterious kidnappings of “client bases” that caused the complete collapse of the company are walking ...
+ 0 -

Open can not be ignored

Open can not be ignored 3r33333.  
3r33333.  
My job is connected with the fact that I lie to people and exploit their gullibility, curiosity, greed, and so on. I love my job and I try to approach it creatively. The specifics of my work are related to the conduct of social engineering attacks. And in this post I would like to talk about malicious attachments. 3r33333.  
3r311.
3r33333.  
If a PDF falls on your mail, will you open it? And the file? Will you open an image from an unknown source? Is it possible to get into trouble if you download the archive? How well do you know which investments are dangerous and which are not? ...
+ 0 -

Counterfeiting of charts, substitution of quotes and price manipulation: how to crack trading applications

Counterfeiting of charts, substitution of quotes and price manipulation: how to crack trading applications 3r3384.  3r3394. 3r3384.  3r3394. 3r311. Image:
Unsplash
3r314. 3r3384.  3r3394. 3r3384.  3r3394. Positive Technologies experts conducted 3r3193. security analysis for trading applications
- trading terminals that allow you to buy and sell stocks, bonds, futures, currency and other assets. According to the study, in 61% of applications it is possible to obtain unauthorized access to personal accounts, in 33% - conducting financial transactions on behalf of other users without access to a personal account, in 17% - replacing the displayed quotes. Such attacks can cause a change in prices in the market ...
+ 0 -

With the release of Chrome 70 thousand sites protected by Symantec certificates will be untrusted

 
3r3-31.
With the release of Chrome 70 thousand sites protected by Symantec certificates will be untrusted 3r33939.
 
Recently, Google announced r3r385. about termination of trust to all SSL certificates issued before December ? 2017 by Symantec, Thawte, GeoTrust and RapidSSL certification centers. The changes will take effect on October 16 of this year with the release of the new anniversary browser Google Chrome 70.
 
3r311.

 
3r3633. Apparently, some companies have not received notification of these changes 3r3828.  
[/b]
 
Distrust of all certificates of the Symantec family means the last stage of the three-step process, initiated by Google and Mozilla, which will completely rid the Internet ...
+ 0 -

Conference BLACK HAT USA. A botnet of a million browsers. Part 1

3r37777. Jeremy Grossman: [/b] I am glad to welcome all of you and I want to say that we have prepared this presentation for the whole 6 months, therefore we strive to share our achievements as soon as possible. I want to thank the whole Black Hat staff for the invitation, we come back here every year, we love this event. Thank you for the "black hat"! We will try to make today's presentation fun, but first we want to introduce ourselves. 3r33473.  
3r33473.  
Conference BLACK HAT USA. A botnet of a million browsers. Part 1 3r33473.  
3r33473.  
I am the founder and head of product development at WhiteHat Security, located in Santa Clara, California. Our company has about ...
+ 0 -

Vulnerability in PlayStation 4 - the character set in the message for the user remotely turns the console into almost a "brick"

 
3r3-31. If your PlayStation 4 receives a message with a certain set of characters, the console will simply turn off.
 
 
Vulnerability in PlayStation 4 - the character set in the message for the user remotely turns the console into almost a "brick"  
 
And, it seems, for this, it is not even necessary for the user to open and read the received message. If notifications are enabled and the characters appear in the preview, the prefix will also turn off.
 
[leech=https://www.vg247.com/2018/10/13/ps4-message-exploit-bricking-consoles/] perform changing the settings of the console 3r3356. to address the vulnerability: [/u]
 
 
3r3342. - on the PS4 console: Account Management -> Privacy Settings -> Personal Information -> Messages -> Nobody (or Friends, if you trust them);
 
 
- in the PlayStation Messages mobile ...
+ 0 -

A group of petrol station employees was arrested, who, with the help of software and electronics, corrected and organized 5% underfilling at petrol stations

 3r3119. 3r3-31. A group of petrol station employees was arrested, who, with the help of software and electronics, corrected and organized 5% underfilling at petrol stations  3r3119.
 3r3119. A little cunning about the usual program, of course. There the whole PAC was used with the implementation, R & D and programming of the necessary controllers and access with all the necessary rights to the petrol station devices.
 3r3119. Reference on the news.
 3r3119.
 3r3119. "Employees of the Department of the Ministry of Internal Affairs of Russia for the Khabarovsk Territory, with the participation of the Russian Guard, detained 13 suspects of fuel theft at gas stations using a malicious computer program," said the official representative of the Ministry ...
+ 0 -