SHOCK! New software for phishing does not win the normal 2FA (two-factor authentication)

Last month, all those who feel like they write that 2FA (two-factor authentication) is in danger because of the quality of the fake pages. Actually, the title of the article parodies one of these posts on Habré. Of course, 2FAs are different. In some "very advanced" European banks, you can still get hold of a sheet of disposable TAN-codes.
 3r33333.
 3r33333. But for several years the industry has not stood still, and instead of disposable TAN /PIN codes arriving by SMS or through applications like RSA Token, Steam Guard, Google Authenticator, there are other options.
 3r33333.
 3r33333. Here is ...
+ 0 -

We shoot in the foot, processing the input data

 3r3662. 3r3-31. 3r3640.
We shoot in the foot, processing the input data  3r3662. The link of today's article is different from the usual. This is not one project for which the source code was analyzed, but a series of positives of the same diagnostic rule in several different projects. What is the interest here? The fact that some of the considered code fragments contain errors that are reproduced during the work with the application, while others contain vulnerabilities (CVE). In addition, at the end of the article we discuss a bit about security defects.
 3r3662. 3r311. 3r3650.
 3r3662. 3r3618. A brief introduction to r3r3619.
 3r3662. All errors ...
+ 0 -

Sandbox in Windows

[img]https://gxcuf89792.i.lithium.com/t5/image/serverpage/image-id/62790i61A67D5F66C1E3E4/image-size/medium?v=1.0&px=400[/img]The sandbox is a new lightweight tool in Windows that allows you to run applications in a secure, isolated environment.
 
 
Have you ever been in a situation where you need to run some program, but you are not quite sure about the source of its origin? Or another example - the need to check something on a “clean” version of Windows. In all such cases, there used to be only one way out - install the OS on a separate physical or virtual machine and conduct the necessary experiment. But this is no longer the case.
 
 
Microsoft has developed a new mechanism called 3r3148. Sandbox [/b] (eng. Windows ...
+ 0 -

Secrets of the Monster "O-L-X": how to clean the bot traffic of Vkontakte. Part 1

+ 0 -

Magellanic error: Buffer overrun or world expedition using SQLite FTS

Somehow they went around the recent on Habré. Magellan -Error and related vulnerabilities, try to correct this omission. 3r3-300. 3r395.  
A bit of history: 3r350. 3r395.  
3r314.  
On November ? 2018 a bug report with the number 900910 flew to Chromium: "Multiple issues in SQLite via WebSQL." An error reported by the Wenxiang Qian of the Tencent Blade Team. 3r3342.  
November ? 2018 r3r388. Error close 3r399. in the core of the library SQLite (FTS3), where it actually lives almost since the creation of the module, i.e. since November of 2009. 3r3342.  
On November 2? 201? it merges into ...
+ 0 -

New legislative initiatives to protect information

New legislative initiatives to protect information  
 
Last week, three bills were introduced to the State Duma aimed at amending Federal Law No. 149-ФЗ dated July 2? 2006 “On Information, Information Technologies and Information Protection”. These bills are likely to be considered at the spring session of the State Duma. I suggest to get acquainted with their content today.
 
Full texts of the bills can be found at:
1. 3r312. http://sozd.parliament.gov.ru/bill/605945-7
 
2. http://sozd.parlament.gov.ru/bill/606594-7
 
3. http://sozd.parlament.gov.ru/bill/606593-7
The first draft ...
+ 0 -

Incident management: “give away cannot be left” or the art of placing commas

Incident management: “give away cannot be left” or the art of placing commas 
3r3-31. Have you noticed how any niche market, becoming popular, attracts marketers from information security, trading fear? They convince you that if a cyber attack happens, the company will not be able to cope with any of the incident response tasks on its own. And then, of course, a good wizard appears - a service provider who, for a certain amount, is ready to save the customer from any troubles and the need to make any decisions. We explain why such an approach can be dangerous not only for the wallet, but also for the level of security of the company, what practical benefits the involvement ...
+ 0 -

Why consumers are not afraid of identity theft

 
3r3-31.
Why consumers are not afraid of identity theft  
In 195? mathematician Leonard Savage published a paper on how people process information during decision making. The main axiom, which Savidge operated on, is the sure thing principle, the “principle of inevitability”. According to her, in the decision-making process, consumers consider many different inputs. They mentally evaluate and discard those data that are important, but not enough to change the already made decision.
 
 
As an example, Savage cited the desire to buy real estate. The potential buyer believes that prior deliberation will significantly affect the final result. However...
+ 0 -

USB devices - "sudden" threat

A new study from Honeywell found that removable USB drives "suddenly" pose a threat, described as "significant and deliberate", to protect industrial process control networks.
 3r3391.
USB devices - "sudden" threat
 3r3391.
In 3r314. report 3r3383. reported that 44% of the analyzed USB-drives were detected and blocked at least one file that threatened security. was published. study , made by Australian experts from the University of Adelaide. They tested more than 50 computers and external USB hubs and found that more than 90 percent of them transfer information to an external USB device that is not a direct destination for data ...
+ 0 -

Webinar Group-IB "Intelligence-driven SOC and is it possible to do without it?"

 
3r3-31. Webinar Group-IB "Intelligence-driven SOC and is it possible to do without it?"  
 
Specialists from the Group-IB incident monitoring and response department, an international company specializing in the prevention of cyber attacks, prepared a webinar on “Intelligence-driven SOC and can we do without it?”. The webinar will start r3r39. December 1? 2018 at 11:0? 3-33-310. (MSC) will hold it 3r339. Alexander Kalinin 3r3-10. , head of the CERT-GIB incident monitoring and response department.
 
 
3r3355. Why join the webinar?
 
At the webinar, you will learn how information security incidents of varying degrees of severity work. CERT-GIB is a 24-hour response center.
 
 
We ...
+ 0 -