tag:blogger.com,1999:blog-63671215691916046442024-02-20T17:58:14.967-08:00 Cyber Security & Forensics Analytics Security News,Intelligence Technology,Anti-malware,Tricks&Tips Privacy and Security Defenderhttp://www.blogger.com/profile/00848288584668467095noreply@blogger.comBlogger813125tag:blogger.com,1999:blog-6367121569191604644.post-31920083725962680542022-11-25T06:06:00.002-08:002022-11-25T06:06:41.791-08:00<p> </p><p dir="ltr">HideMyAss <span style="color: #1da1f2;">https://github.com/aaaddress1/PR0CESS/tree/main/HideMyAss</span></p>Privacy and Security Defenderhttp://www.blogger.com/profile/00848288584668467095noreply@blogger.com0tag:blogger.com,1999:blog-6367121569191604644.post-28535733050916515622020-07-22T04:10:00.001-07:002020-07-22T04:10:40.446-07:00How to protect your privacy,in your iPhone, iPad, iPod touch, or Apple Watch with the MAC address changer for each Wi-Fi network.<a href="https://support.apple.com/it-it/HT211227">https://support.apple.com/it-it/HT211227</a><br />Privacy and Security Defenderhttp://www.blogger.com/profile/00848288584668467095noreply@blogger.com0tag:blogger.com,1999:blog-6367121569191604644.post-10050967454946367752020-07-18T07:41:00.001-07:002020-07-18T08:38:38.011-07:00PayPal launches QR code contactless payments In Canada, with zero transaction fees<br />Privacy and Security Defenderhttp://www.blogger.com/profile/00848288584668467095noreply@blogger.com0tag:blogger.com,1999:blog-6367121569191604644.post-46533026643992945852017-12-18T09:10:00.001-08:002017-12-18T09:10:40.150-08:00KRACK Attacks: Bypassing WPA2 against Android and Linux<iframe allowfullscreen="" frameborder="0" height="270" src="https://www.youtube.com/embed/Oh4WURZoR98" width="480"></iframe>Privacy and Security Defenderhttp://www.blogger.com/profile/00848288584668467095noreply@blogger.com0tag:blogger.com,1999:blog-6367121569191604644.post-35754785380615257972017-11-28T08:40:00.001-08:002017-11-28T08:40:25.600-08:00How Android multi-stage malware can infect users from Google Play and ho...<iframe allowfullscreen="" frameborder="0" height="344" src="https://www.youtube.com/embed/O-MhwByGbFw" width="459"></iframe>Privacy and Security Defenderhttp://www.blogger.com/profile/00848288584668467095noreply@blogger.com0tag:blogger.com,1999:blog-6367121569191604644.post-34550527326891700632017-10-10T23:25:00.001-07:002017-10-10T23:25:46.697-07:00Schlage Sense FAIL - Smartlock opens in 5 secs!<iframe allowfullscreen="" frameborder="0" height="270" src="https://www.youtube.com/embed/zCZeYvPXIXg" width="480"></iframe>Privacy and Security Defenderhttp://www.blogger.com/profile/00848288584668467095noreply@blogger.com0tag:blogger.com,1999:blog-6367121569191604644.post-69799090190283572882017-09-30T11:46:00.001-07:002017-09-30T11:46:25.390-07:00Analyzing Android malware using a FortiSandbox<a href="http://blog.fortinet.com/2017/08/17/analyzing-android-malware-using-a-fortisandbox?elq_source=socialmedia&utm_source=LINKEDIN&utm_id=70178&linkId=41087510&lipi=urn%3Ali%3Apage%3Ad_flagship3_feed%3B6HOJbz3WSm26cmJHbL7Syg%3D%3D">Analyzing Android malware using a FortiSandbox</a>: In this blog post we will analyze a couple of Android malware samples in the Android VM of the FortiSandbox. We'll...Privacy and Security Defenderhttp://www.blogger.com/profile/00848288584668467095noreply@blogger.com0tag:blogger.com,1999:blog-6367121569191604644.post-35337161294891800052017-09-27T12:19:00.001-07:002017-09-27T12:19:37.727-07:00Breaking Big Data: Evading Analysis of the Metadata of Your Life<iframe allowfullscreen="" frameborder="0" height="270" src="https://www.youtube.com/embed/amzrQLh8BF8" width="480"></iframe>Privacy and Security Defenderhttp://www.blogger.com/profile/00848288584668467095noreply@blogger.com0tag:blogger.com,1999:blog-6367121569191604644.post-48976284084041673542017-07-01T22:47:00.001-07:002017-07-01T22:47:43.678-07:00 Puppet Strings - Dirty Secret for Free Windows Rin...<a href="http://zerosum0x0.blogspot.com/2017/07/puppet-strings-dirty-secret-for-free.html?spref=bl">Puppet Strings - Dirty Secret for Free Windows Rin...</a>: Ever since I started reversing Shadow Brokers dumps, I've gotten into the habit of codenaming my projects. This trick is called Puppet S...Privacy and Security Defenderhttp://www.blogger.com/profile/00848288584668467095noreply@blogger.com0tag:blogger.com,1999:blog-6367121569191604644.post-3596564733111763592017-06-02T14:30:00.001-07:002017-06-02T14:30:00.849-07:00Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox<iframe allowfullscreen="" frameborder="0" height="270" src="https://www.youtube.com/embed/bP5VP7vLLKo" width="480"></iframe>Privacy and Security Defenderhttp://www.blogger.com/profile/00848288584668467095noreply@blogger.com0tag:blogger.com,1999:blog-6367121569191604644.post-83363693504607520752017-05-13T08:22:00.001-07:002017-05-13T08:22:53.380-07:00WannaCrypt Map<iframe allowfullscreen="" frameborder="0" height="270" src="https://www.youtube.com/embed/LyErffRX0HM" width="480"></iframe>Privacy and Security Defenderhttp://www.blogger.com/profile/00848288584668467095noreply@blogger.com0tag:blogger.com,1999:blog-6367121569191604644.post-56214798961208012962017-04-22T08:15:00.001-07:002017-04-22T08:15:22.304-07:00Leaked NSA Hacking Tools Being Used to Hack Thousands of Vulnerable Windows PCs<a href="http://thehackernews.com/2017/04/windows-hacking-tools.html">Leaked NSA Hacking Tools Being Used to Hack Thousands of Vulnerable Windows PCs</a>Privacy and Security Defenderhttp://www.blogger.com/profile/00848288584668467095noreply@blogger.com0tag:blogger.com,1999:blog-6367121569191604644.post-27793600029783339592017-03-19T01:05:00.001-07:002017-03-19T01:10:13.947-07:00 Autopsy vs Encase vs FTK vs X-Ways (in depth testing)<a href="https://binaryforay.blogspot.it/2016/09/let-benchmarks-hit-floor-autopsy-vs.html"> Autopsy vs Encase vs FTK vs X-Ways (in depth testing)</a><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihE3QDD7xu4TLizjkSpoSApZVB_2nalUflYhxQCTbR9IvWkYaKesUgQOeNYTskyIKDHPoJTXzB5SHjLRzZ6moFa00lbMUVXsprnPjIYT7ltL0WGALhm-W-nYLaNxwpStOQQAwiQvYgLuA/s1600/001+Evidence+Processing.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihE3QDD7xu4TLizjkSpoSApZVB_2nalUflYhxQCTbR9IvWkYaKesUgQOeNYTskyIKDHPoJTXzB5SHjLRzZ6moFa00lbMUVXsprnPjIYT7ltL0WGALhm-W-nYLaNxwpStOQQAwiQvYgLuA/s320/001+Evidence+Processing.png" width="303" /></a></div>
Privacy and Security Defenderhttp://www.blogger.com/profile/00848288584668467095noreply@blogger.com0tag:blogger.com,1999:blog-6367121569191604644.post-69775665312522978702017-03-16T16:20:00.001-07:002017-03-16T16:20:37.594-07:00Reversing Threat Intelligence - Fun with Strings in Malware<iframe allowfullscreen="" frameborder="0" height="270" src="https://www.youtube.com/embed/qpdt0Y-7fEc" width="480"></iframe>Privacy and Security Defenderhttp://www.blogger.com/profile/00848288584668467095noreply@blogger.com0tag:blogger.com,1999:blog-6367121569191604644.post-10509122399289780882017-02-10T13:16:00.001-08:002017-02-10T13:18:08.599-08:00Detecting Kerberoasting Activity Part 2 – Creating a Kerberoast Service Account Honeypot » Active Directory Security<a href="https://adsecurity.org/?p=3513">Detecting Kerberoasting Activity Part 2 – Creating a Kerberoast Service Account Honeypot » Active Directory Security</a><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEje11jLRXCzGcgwpiCN4AS61lc5Lis4vimKdQU0VEqZchfmOqglaGOnxqFKnnOEsLTCPHudDX_52Oy2ELAdOJp3uq-v_juef9LQFDiXko3aPHf6qS2oXtKSctE2l0r4dddKcOAZ-CCJqI0/s1600/Kerberos.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEje11jLRXCzGcgwpiCN4AS61lc5Lis4vimKdQU0VEqZchfmOqglaGOnxqFKnnOEsLTCPHudDX_52Oy2ELAdOJp3uq-v_juef9LQFDiXko3aPHf6qS2oXtKSctE2l0r4dddKcOAZ-CCJqI0/s320/Kerberos.png" width="244" /></a></div>
Privacy and Security Defenderhttp://www.blogger.com/profile/00848288584668467095noreply@blogger.com0tag:blogger.com,1999:blog-6367121569191604644.post-37549664172939764522017-02-10T12:51:00.001-08:002017-02-10T12:56:59.540-08:00Tallinn Manual 2.0 on the International Law of Cyber Operations: What It Is and Isn’t | Just Security<a href="https://www.justsecurity.org/37559/tallinn-manual-2-0-international-law-cyber-operations/?utm_content=buffer32f92&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer">Tallinn Manual 2.0 on the International Law of Cyber Operations: What It Is and Isn’t | Just Security</a><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2oJBq7zskt0l2flAi3tsnIsl4mvVGXLSSTp1NyHxsTbhGc3G1J8j3MQi0bieAT9kYSj69xE92M788UV9iBVDeHIFhBhAH-7EDYq5NKps0U9alsKz1gwJ7OMcqG0Em8DzcqysIHsGCIS4/s1600/Tallin+Manual.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2oJBq7zskt0l2flAi3tsnIsl4mvVGXLSSTp1NyHxsTbhGc3G1J8j3MQi0bieAT9kYSj69xE92M788UV9iBVDeHIFhBhAH-7EDYq5NKps0U9alsKz1gwJ7OMcqG0Em8DzcqysIHsGCIS4/s320/Tallin+Manual.png" width="320" /></a></div>
Privacy and Security Defenderhttp://www.blogger.com/profile/00848288584668467095noreply@blogger.com0tag:blogger.com,1999:blog-6367121569191604644.post-63141743319758121702017-02-10T12:41:00.001-08:002017-02-10T12:43:05.942-08:00Cyber Security & Digital Forensics |10.02.2017<a href="http://www.scoop.it/t/cybersecurity-by-milos-constantin">Cyber Security & Digital Forensics |</a><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTCgPQQdP3D7l1cgSAJFn10Yl5tkfbO-F4ckV_xKrTat-FpkiXK3UBGgsP6hptjro1i-TZeSMAd1ZcJIT-E0d3aRvuBnwMDefhHYMxLMeEGM9Mm_uxnbSlnTAS2iz_Q9oFnaOEw2UbT24/s1600/what-quantum-computing.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTCgPQQdP3D7l1cgSAJFn10Yl5tkfbO-F4ckV_xKrTat-FpkiXK3UBGgsP6hptjro1i-TZeSMAd1ZcJIT-E0d3aRvuBnwMDefhHYMxLMeEGM9Mm_uxnbSlnTAS2iz_Q9oFnaOEw2UbT24/s320/what-quantum-computing.jpg" width="320" /></a></div>
Privacy and Security Defenderhttp://www.blogger.com/profile/00848288584668467095noreply@blogger.com0tag:blogger.com,1999:blog-6367121569191604644.post-75101686358806843002017-02-10T12:31:00.001-08:002017-02-10T12:36:57.899-08:00Advanced Threats,Intelligence Technology,CyberSecurity | 10.02.2017 <a href="http://www.scoop.it/t/advanced-threats-intelligence-technology">Advanced Threats,Intelligence Technology,CyberSecurity | </a><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8u0cPwD0lYh9EKeymDwLC86kqZkX4lXim3ImvVqx55Yncrm51sPz-nN1lt8NqIzkTYW0XLBgBhE3uhroFqqEOTihHMHld6Vac2qpStkV5VbxIRvc6d_zxshK_i7K5bSUObcGH9o5aV8E/s1600/MANTISINTELLIGENCE.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="239" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8u0cPwD0lYh9EKeymDwLC86kqZkX4lXim3ImvVqx55Yncrm51sPz-nN1lt8NqIzkTYW0XLBgBhE3uhroFqqEOTihHMHld6Vac2qpStkV5VbxIRvc6d_zxshK_i7K5bSUObcGH9o5aV8E/s320/MANTISINTELLIGENCE.jpg" width="320" /></a></div>
Privacy and Security Defenderhttp://www.blogger.com/profile/00848288584668467095noreply@blogger.com0tag:blogger.com,1999:blog-6367121569191604644.post-12372787129800687592016-10-09T02:12:00.001-07:002016-10-09T02:12:44.453-07:00Interactive Map Gives Wi-Fi Codes of Airports Around the World | Mental FlossInteractive Map Gives Wi-Fi Codes of Airports Around the World | Mental FlossPrivacy and Security Defenderhttp://www.blogger.com/profile/00848288584668467095noreply@blogger.com0tag:blogger.com,1999:blog-6367121569191604644.post-65601327013027895172016-07-26T02:42:00.001-07:002016-07-26T02:42:04.618-07:00Hiding Data from Forensic Imagers – Using the Service Area of a Hard Disk Drive | Forensic Focus - Articles<a href="https://articles.forensicfocus.com/2016/07/22/hiding-data-from-forensic-imagers-using-the-service-area-of-a-hard-disk-drive/">Hiding Data from Forensic Imagers – Using the Service Area of a Hard Disk Drive | Forensic Focus - Articles</a>Privacy and Security Defenderhttp://www.blogger.com/profile/00848288584668467095noreply@blogger.com0tag:blogger.com,1999:blog-6367121569191604644.post-23759071274100380732016-07-26T02:36:00.001-07:002016-07-26T02:36:46.591-07:00Black Hat USA 2016 | Arsenal<a href="https://www.blackhat.com/us-16/arsenal.html#netsec-framework">Black Hat USA 2016 | Arsenal</a>Privacy and Security Defenderhttp://www.blogger.com/profile/00848288584668467095noreply@blogger.com0tag:blogger.com,1999:blog-6367121569191604644.post-52075084474546388682016-07-14T12:23:00.001-07:002016-07-14T12:23:07.840-07:00 DARPA's Cyber Grand Challenge<iframe allowfullscreen="" frameborder="0" height="270" src="https://www.youtube.com/embed/-g5Kt2ayMN0" width="480"></iframe>Privacy and Security Defenderhttp://www.blogger.com/profile/00848288584668467095noreply@blogger.com0tag:blogger.com,1999:blog-6367121569191604644.post-50910673892259238192016-07-05T11:53:00.001-07:002016-07-05T11:53:54.248-07:00Howto Quick Analyze Malware with PEStudio 8.18, Wireshark & VirusTotal (HD)<iframe allowfullscreen="" frameborder="0" height="344" src="https://www.youtube.com/embed/KWAmlfmdWwo" width="459"></iframe>Privacy and Security Defenderhttp://www.blogger.com/profile/00848288584668467095noreply@blogger.com0tag:blogger.com,1999:blog-6367121569191604644.post-29790217004289891252016-07-03T09:29:00.001-07:002016-07-03T09:29:45.602-07:00Analysis of SSH packets to know if they found our password<iframe allowfullscreen="" frameborder="0" height="344" src="https://www.youtube.com/embed/oLuzFf5Nu7E?list=PLZ2DHElpR_znH4wE1SceckIMP-c4YFvHS" width="459"></iframe>Privacy and Security Defenderhttp://www.blogger.com/profile/00848288584668467095noreply@blogger.com0tag:blogger.com,1999:blog-6367121569191604644.post-40781550746255068092016-06-23T03:29:00.001-07:002016-06-23T03:29:28.168-07:00Public Wi-Fi - a trap for the great and the good, and the unwary<iframe allowfullscreen="" frameborder="0" height="270" src="https://www.youtube.com/embed/qk2RPOBpZvc" width="480"></iframe>Privacy and Security Defenderhttp://www.blogger.com/profile/00848288584668467095noreply@blogger.com0