HotPeanut Νοέμβριος 16, 2016 #201 Κοινοποίηση Νοέμβριος 16, 2016 Θέλετε να πείτε κάτι το το λουσου λίνουξ; Link to comment Share on other sites More sharing options...
Delijohn Νοέμβριος 17, 2016 #202 Κοινοποίηση Νοέμβριος 17, 2016 http://thehackernews.com/2016/11/iphone-hacking.html Link to comment Share on other sites More sharing options...
Delijohn Νοέμβριος 17, 2016 #203 Κοινοποίηση Νοέμβριος 17, 2016 Ετσι... για το καλό μας (τους) http://www.zdnet.com/article/snoopers-charter-expansive-new-spying-powers-becomes-law/ 2 Link to comment Share on other sites More sharing options...
deninho Νοέμβριος 17, 2016 #204 Κοινοποίηση Νοέμβριος 17, 2016 "Αν δεν έχεις κάτι να κρύψεις, τι σε νοιάζει;" Link to comment Share on other sites More sharing options...
Delijohn Νοέμβριος 17, 2016 #205 Κοινοποίηση Νοέμβριος 17, 2016 https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/ κι αυτό είναι ενδιαφέρον θα'λεγα.. Link to comment Share on other sites More sharing options...
minast Νοέμβριος 28, 2016 #206 Κοινοποίηση Νοέμβριος 28, 2016 Τσάμπα μεταφορές στο San Francisco λόγω ransomware: http://news.in.gr/science-technology/article/?aid=1500117512 1 Link to comment Share on other sites More sharing options...
Shaman Νοέμβριος 29, 2016 #207 Κοινοποίηση Νοέμβριος 29, 2016 https://cpbotha.net/2016/11/27/android-security-in-2016-is-a-mess/ 1 Link to comment Share on other sites More sharing options...
minast Νοέμβριος 30, 2016 #208 Κοινοποίηση Νοέμβριος 30, 2016 On 11/28/2016 at 4:08 PM, minast said: Τσάμπα μεταφορές στο San Francisco λόγω ransomware: http://news.in.gr/science-technology/article/?aid=1500117512 Τελικά απ' ότι ισχυρίζονται οι υπαίτιοι, η έκταση της παραβίασης στην υποδομή των μεταφορών του SF ήταν τεράστια: http://gizmodo.com/it-looks-like-the-san-fransisco-muni-hack-was-worse-tha-1789443579?rev=1480374770588&utm_campaign=socialflow_gizmodo_twitter&utm_source=gizmodo_twitter&utm_medium=socialflow Link to comment Share on other sites More sharing options...
Delijohn Δεκέμβριος 1, 2016 #209 Κοινοποίηση Δεκέμβριος 1, 2016 http://fortune.com/2016/11/30/rule-41/ αντίο privacy.. δε χωρά το μυαλό μου με ποιο δικαίωμα μπορεί και χακάρει πολίτες άλλων κρατών.. γιατί δεν τους λέει κάποιος ΟΧΙ;;;!!!! http://www.vocativ.com/379333/rule-41-how-the-dojs-new-rules-mean-the-fbi-can-hack-you/ Link to comment Share on other sites More sharing options...
Delijohn Δεκέμβριος 2, 2016 #210 Κοινοποίηση Δεκέμβριος 2, 2016 Link to comment Share on other sites More sharing options...
Delijohn Δεκέμβριος 7, 2016 #211 Κοινοποίηση Δεκέμβριος 7, 2016 http://www.pcworld.com/article/3147311/security/backdoor-accounts-found-in-80-sony-ip-security-camera-models.html επίσης καθόλου πρωτότυπη ιδέα.. απορώ γιατί το δημοσιοποίησαν τώρα... http://thehackernews.com/2016/12/credit-card-hacking-software_5.html Link to comment Share on other sites More sharing options...
Delijohn Δεκέμβριος 7, 2016 #212 Κοινοποίηση Δεκέμβριος 7, 2016 https://www.aclu.org/infographic/abyss-nsas-global-internet-surveillance?redirect=nsa-comic 1 Link to comment Share on other sites More sharing options...
EraserheadX Δεκέμβριος 12, 2016 Author #213 Κοινοποίηση Δεκέμβριος 12, 2016 https://threatpost.com/ransomware-gives-free-decryption-keys-to-victims-who-infect-others/122395/ Link to comment Share on other sites More sharing options...
HotPeanut Δεκέμβριος 14, 2016 #214 Κοινοποίηση Δεκέμβριος 14, 2016 (edited) Netgear admits its routers are vulnerable to remote attacks Έγινε επεξεργασία Δεκέμβριος 14, 2016 από honda22 Link to comment Share on other sites More sharing options...
acct Δεκέμβριος 14, 2016 #215 Κοινοποίηση Δεκέμβριος 14, 2016 https://www.enisa.europa.eu/news/enisa-news/the-importance-of-cryptography-for-the-digital-society Quote ENISA sees that: The use of backdoors in cryptography is not a solution, as existing legitimate users are put at risk by the very existence of backdoors. Backdoors do not address the challenge of accessing of decrypting material, because criminals can already develop and use their own cryptographic tools. Furthermore, new technologies are now being deployed making lawful interception in a timely manner very difficult. Judicial oversight may not be a perfect solution; as different interpretations of the legislation may occur. Law enforcement solutions need to be identified without the use of backdoors and key escrow. It is very difficult to restrict technical innovation using legislation. History has shown that technology beats legislation, and criminals are best placed to capitalise on this opportunity. The perception that backdoors and key escrow exist, can potentially affect and undermine the aspirations for a fully embraced Digital Society in Europe. History has shown that legal controls are not always successful, and may harm and inhibit innovation, as seen with previous US experience. 2 Link to comment Share on other sites More sharing options...
Shaman Δεκέμβριος 21, 2016 #216 Κοινοποίηση Δεκέμβριος 21, 2016 (edited) Στο ίδιο πνεύμα περυσινό paperάκι από τεράστια ονόματα του χώρου: https://academic.oup.com/cybersecurity/article/1/1/69/2367066/Keys-under-doormats-mandating-insecurity-by ..και συμπεράσματα από Επιτροπή του Κογκρέσου: https://judiciary.house.gov/wp-content/uploads/2016/12/20161220EWGFINALReport.pdf Πρόσφατα ήμουν σε συνέδριο και είχα την τύχη να παρακολουθήσω keynote ομιλία του Hellman (you know, όπως λέμε Diffie-Hellman key exchange protocol) όπου περιέγραψε πώς η NSA προσπαθούσε να τους φιμώσει όταν με τον Diffie και τον Merkle φώναζαν ότι τα 56bits του κλειδιού το DES ήταν (ήδη τότε) ανεπαρκή. Έγινε επεξεργασία Δεκέμβριος 21, 2016 από Shaman Link to comment Share on other sites More sharing options...
acct Δεκέμβριος 22, 2016 #217 Κοινοποίηση Δεκέμβριος 22, 2016 Court of Justice of the European Union: The Members (sic) States may not impose a general obligation to retain data on providers of electronic communications services Quote EU law precludes a general and indiscriminate retention of traffic data and location data, but it is open to Members States to make provision, as a preventive measure, for targeted retention of that data solely for the purpose of fighting serious crime, provided that such retention is, with respect to the categories of data to be retained, the means of communication affected, the persons concerned and the chosen duration of retention, limited to what is strictly necessary. Access of the national authorities to the retained data must be subject to conditions, including prior review by an independent authority and the data being retained within the EU. http://curia.europa.eu/jcms/upload/docs/application/pdf/2016-12/cp160145en.pdf 1 Link to comment Share on other sites More sharing options...
HotPeanut Ιανουάριος 16, 2017 #218 Κοινοποίηση Ιανουάριος 16, 2017 http://www.infoworld.com/article/3157420/microsoft-windows/adobe-acrobat-reader-dc-security-update-installs-chrome-spyware.html Link to comment Share on other sites More sharing options...
deninho Φεβρουάριος 15, 2017 #219 Κοινοποίηση Φεβρουάριος 15, 2017 https://thehackernews.com/2017/02/cross-browser-tracking.html 1 Link to comment Share on other sites More sharing options...
minast Φεβρουάριος 15, 2017 #220 Κοινοποίηση Φεβρουάριος 15, 2017 1 hour ago, deninho said: https://thehackernews.com/2017/02/cross-browser-tracking.html Παρότι το ψιλο-ξέραμε ότι το κάνουν, τα ποσοστά που αναφέρουν είναι (δυστυχώς) καλύτερα από την μέχρι τώρα εκτίμησή μου. Εντυπωσιακό το νούμερο για multi-browser... Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now