Aggregator
Privacy and security post-Snowden: Pew Research parallels ESET findings
10 years 4 months ago
Privacy and security online are hot button topics in America today, as a new survey by the Pew Research Center confirms, mirroring similar results from two different privacy and security surveys conducted by ESET.
iOS多点连接的使用、协议逆向、安全性
10 years 4 months ago
介绍了 iOS 多点连接的使用、协议逆向、安全性分析。
Proteas
计算机加法
10 years 5 months ago
数学中最简单的就是加法和减法。然而在计算机中,最简单的运算却是AND、OR和NOT。计算机是怎样实现这些基本运算,以及怎样通过这些基本运算完成加法的计算呢?
计算机加法
10 years 5 months ago
数学中最简单的就是加法和减法。然而在计算机中,最简单的运算却是AND、OR和NOT。计算机是怎样实现这些基本运算,以及怎样通过这些基本运算完成加法的计算呢?
Public Wi-Fi hotspots - know the risks
10 years 5 months ago
For ordinary laptop and smartphone users, Wi-Fi is not ideal - but it’s sometimes near-inescapable.
G20 2014 Summit Lure used to target Tibetan activists
10 years 5 months ago
APT actors trying to use big events as a lure to compromise their targets is nothing new. Tibetan NGOs being targeted by APT actors is also nothing new. Thus, surrounding the upcoming G20 2014 summit that is held in Brisbane, Australia, we were expecting to see G20 themed threats targeted at Tibetan NGOs. A Win32/Farfli (alias Gh0st RAT) sample ultimately confirmed our suspicions.
IT Pros also guilty of risqué selfies on mobiles
10 years 5 months ago
ESET study reveals many IT professionals are guilty of storing indecent material on their mobile phones, which would leave them embarrassed if lost.
.NET goes open source and cross-platform
10 years 5 months ago
Microsoft's .NET framework, which is used to build millions of websites and online applications, is taking further steps to go completely open-source, Microsoft has announced at the Connect() virtual development event. The company also stated its commitment to eventually ensure the free code runs on Mac OS and Linux too, Wired reports.
Korplug military targeted attacks: Afghanistan & Tajikistan
10 years 5 months ago
After taking a look at recent Korplug (PlugX) detections, we identified two larger scale campaigns employing this well-known Remote Access Trojan. This blog gives an overview of the first one
Critical: Update Your Windows Secure Channel (cve-2014-6321,MS14-066) - r00tgrok
10 years 5 months ago
MS14-066, CVE-2014-6321, 微软Secure Channel远程代码执行漏洞(版本通杀)
r00tgrok
Sednit Espionage Group Attacking Air-Gapped Networks
10 years 5 months ago
The Sednit espionage group, also known as the Sofacy group, APT28 or “Fancy Bear”, has been targeting various institutions for many years. We recently discovered a component the group employed to reach physically isolated computer networks -- “air-gapped” networks -- and exfiltrate sensitive files from them through removable drives.
Apple Pay and security - what you need to know
10 years 5 months ago
Mobile payments look set to be one of the defining technologies of 2015, as the launch of Apple Pay catalyses a boom in cardless payments - both from Apple’s own system, and rivals playing catch-up.
Wirelurker for OSX, iOS (Part I) and Windows (Part II) samples
10 years 5 months ago
Mila
Trie树与Word Puzzles
10 years 5 months ago
Terenceli
WireLurker: new malware targets Apple users
10 years 5 months ago
A new malware has been discovered that targets both Apple Mac computers and iPhones, Neowin reports. It is the first known malware that can infect iPhones that have not been jailbroken.
ELF文件格式简介
10 years 5 months ago
Terenceli
Facebook welcomes private browsers with dedicated Tor link
10 years 5 months ago
Facebook has opened its doors to privacy concerned users, but opening up a dedicated Tor link, guaranteeing that people who visit the social networking site through anonymous browsers aren't mistaken for botnets, Gizmodo reports.
How to make sure Adobe Flash is up-to-date and enabling it on-demand
10 years 5 months ago
Learn how to update Adobe Flash Player, to help protect against malware attacks.
遍历序列确定二叉树
10 years 5 months ago
Terenceli