120 private links
HOW : http://dasalte.ccc.de/biometrie/fingerabdruck_kopieren?language=en
The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID. This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.
Groklaw was an award-winning website covering legal news of interest to the free and open source software community. Started as a law blog on May 16, 2003 by paralegal Pamela Jones ("PJ") at Radio UserLand, it covered issues such as the SCO-Linux lawsuits, the EU anti-trust case against Microsoft, and the standardization of Office Open XML.
Jones describes Groklaw as ..."a place where lawyers and geeks could explain things to each other and work together, so they'd understand each other's work better. When you have an idea you hope might work, and then to implement it, tweak it, and morph it, because other people show up and have ideas that are better than yours...and then have people you care about and admire tell you that what you are doing matters – I can't think of a more satisfying feeling.
SecurityXploded - the community division of XenArmor - is a popular Infosec Research & Development organization offering FREE Security Softwares, latest Research Articles and FREE Training on Reverse Engineering & Malware Analysis.
A notorious hacker who claims to “fight for the dignity of Muslims” though peaceful means attacked Twitter on Tuesday, publishing private information online from the accounts of thousands of the social-media company’s users.
http://www.techworm.in/2013/08/twitter-hacked-thousand-of-account.html
http://www.theregister.co.uk/2013/08/20/twitter_oauth_token_hack/
http://cams.hhba.info/
open webcam - spy camera
La relation entre Skype et le gouvernement chinois vient de subir un éclairage violent. Un étudiant de l’université du Nouveau-Mexique a en effet révélé que la version modifiée du client VoIP disposait de mécanismes de détection pour trouver des mots clés faisant partie d’une importante liste. Explications.
Les pirates usent fréquemment de complexes et sournois virus ainsi que de divers exploits pour passer vos sécurités et piller allègrement vos données. Toutefois, par bien des aspects, la simplicité est le secret de la réussite. Facebook affiche d’un véritable gouffre d’entrée et ne semble pas s’en inquiéter outre mesure.
Les ‘hacks’ de ce type ne manquent pas et pourtant il y a un moyen TRES simple de les contrer. Facebook devrait permettre à chaque usager de modifier sa question de sécurité. Élémentaire. Effectivement, combien de personnes sont capables de connaître ‘la rue où vous avez grandi’ ou ‘le nom de votre premier chat’ ?.
The hacks related to Apple involve a lot of complexities.
By all measures, Java is the current title holder for the lowest hanging fruit in computer security. (And by Java, we mean JRE and its various browser plugins.)
OranjeProxy est un script de proxy PHP anonymisant et permettant d’outrepasser les restrictions imposées à votre réseaux (comme ceux des entreprises ou des écoles).
http://champlywood.free.fr/verdaproxy/
http://www.sabzproxy.com/
I don't need a anti-virus, I only surf in trusted site... YESSS!!!
http://www.zataz.com/news/22681/malware_-publicite_-ad_-cm.netseer.com.html
“I don’t bank online, I don’t store sensitive information on my machine! I only use it to check email. What could hackers possibly want with this hunk of junk?,” are all common refrains from this type of user.
http://www.symantec.com/connect/blogs/technical-support-phone-scams
In recent weeks we started hearing chatter about what sounded like a new misleading application. The usual scare tactics were employed. However, instead of using applications to convince users that their computer was in trouble, this particular group was phoning users directly to tell them that they had a virus on their computer—but thankfully help was at hand. The company in question, Online PC Doctors, offers to remotely connect to your computer to clean up the infection. All for a fee of course.
Threatpost, The Kaspersky Lab security news service, is an independent news site which is a leading source of information about IT and business security for hundreds of thousands of professionals worldwide.
Threatpost’s award-winning editorial team produces unique and high-impact content including security news, videos, feature reports and more. They break important original stories, offer expert commentary on high-priority news aggregated from other sources, and engage with readers to discuss how and why these events matter.
Threatpost has been referenced as an authoritative source on information security by leading news outlets including The New York Times, The Wall Street Journal, MSNBC, USA Today and National Public Radio.
Threatpost’s global editorial activities are driven by industry-leading security journalist Dennis Fisher, editor-in-chief. He is assisted by Christopher Brook and Brian Donohue.
Make Threatpost your first stop for security news and analysis to stay informed and keep your organization safe.
Nearly 100,000 Facebook users have been duped into installing third-party Chrome plugins over the past few weeks that have access to all of their data on every Web site they visit. According to research recently conducted by security firm Barracuda Networks, the unsuspecting users were tricked into thinking the plugins could block Timeline, a new profile feature Facebook first introduced at the end of 2011.
In the space of one hour, my entire digital life was destroyed. First my Google account was taken over, then deleted. Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook.
In many ways, this was all my fault. My accounts were daisy-chained together. Getting into Amazon let my hackers get into my Apple ID account, which helped them get into Gmail, which gave them access to Twitter. Had I used two-factor authentication for my Google account, it’s possible that none of this would have happened, because their ultimate goal was always to take over my Twitter account and wreak havoc. Lulz.
Had I been regularly backing up the data on my MacBook, I wouldn’t have had to worry about losing more than a year’s worth of photos, covering the entire lifespan of my daughter, or documents and e-mails that I had stored in no other location.
So maybe you saw my Twitter going nuts tonight. Or you saw Gizmodo’s Twitter account blow up. Or you saw this in AllThingsD. Or this in the DailyDot. Although embarrassing, Twitter was the least of it. In short, someone gained entry to my iCloud account, used it to remote wipe all of my devices, and get entry into other accounts too.
Have you had to change your login information in a paranoid fever after discovering that a major online service provider has been hacked in the last few weeks? Well, if you have a Yahoo! account, you might have some worrying to do. A hacker group called D33DS Company has apparently dumped 453,492 usernames and passwords obtained in plaintext from a Yahoo! service.
Ars Technica is reporting that usernames and passwords allegedly from Yahoo! were posted online by the D33DS Company group. Other sources indicate that the user information was specifically from the Yahoo! Voice service, formally known as Associated Content.
let's take a screenshot
Paste the address (URL) of any web page and the tool will capture a screeshot of the full page as a PNG image.