background preloader

Irongeek.com

Irongeek.com

http://www.irongeek.com/

Related:  codyg82Cyber Security

Learn the history of Kolmanskop, a Namibian ghost town covered in sand Brightly colored wallpaper peeling off the walls, dilapidated houses now inundated in rolling banks of sand … this is Kolmanskop, a ghost town in southern Africa’s Namib Desert, in the middle of a region known as “the forbidden zone.” And the story of how it got here is about as strange as the sight of the town today. (See nine of the world’s best ghost towns.) A strange, painful history

Hacking Mainframes; Vulnerabilities in applications exposed over TN3270 - Dominic White Derbycon 2014 Hacking Mainframes; Vulnerabilities in applications exposed over TN3270 Dominic White Derbycon 2014 IBM System Z Mainframes are in regular use in Fortune 500 companies. Far from being legacy these systems are running an actively maintained operating system (z/OS). Applications on these often occupy roles critical to the business processes they underpin, with much of the later technology built around them, rather than replacing them. Free (as in beer) wireless pentesting class As a contribution to the incredibly awesome Security B-Sides unconference in Atlanta, the gang at Errata Security has put together a free training class based on our techniques for completing a professional wireless penetration test. We'll be going over the 5 basic areas of the "gold standard" wireless security assessment, as we do from time to time for a living. To see what prerequisite knowledge is required to participate, and to register for the class (only a few spots left!), please read more.

The Natter Was A Rocket-Based Wooden Aircraft By Germany Towards the end of World War II, an effort was made by Germany to take down the American bombers that were wreaking havoc in Germany. The Natter (grass snake) was developed as an inexpensive and easy to build interceptor that made use of the recently developed rocket technology for its flight. The aircraft was designed for single use but was utilized too late to have any kind of effect in tipping the scales of war. The Natter was the last-ditch effort by Germany that was taking quite a hit – literally – thanks to the allied bombing that was continuously ongoing.

To Catch a Penetration Tester: Top SIEM Use Cases - Ryan Voloch and Peter Giannoutsos Derbycon 2016 To Catch a Penetration Tester: Top SIEM Use Cases Ryan Voloch and Peter Giannoutsos Derbycon 2016 Every blue team should have a Chris Hansen for catching penetration testers! We surveyed multiple penetration testers and security professionals to collect the best and most useful SIEM detection use cases. The goal of the use cases are to detect a penetration tester/external attacker in a typical enterprise environment. The top use cases will be reviewed. Twitter took phone numbers users gave for account security and used them to target ads In July, the Federal Trade Commission (FTC) said Facebook had broken the law when it engaged in a similar practice. The FTC fined Facebook $5 billion for that and a litany of other instances where it mishandled user data. Twitter users are asked to provide information like their phone number to help secure their account through services such as two-factor authentication.

Establishing a Quality Vulnerability Management Program without Wasting Time or Money - Zee Abdelnabi Converge 2016 Establishing a Quality Vulnerability Management Program without Wasting Time or MoneyZee Abdelnabi@Infosec_17">@Infosec_17 • Sell the story to establish your program to management. • Compare Vulnerability Management (VM) tools and learn how to pick the best tool set for your environment. • Determine the scope of devices do you want to include - mobile, employee devices, mainframe, plant floor, medical devices, SCADA? • Evaluate the costs and advantages of paying for Professional Services deployment vs training your team. • Determine the skills and competencies necessary to make a successful team. • Make a complete runbook. • Establish report templates and metrics do you need to show your program is successful.

Crucial Security Forensics Blog By: John Ortiz After reading Brian Hussey’s blog on “Decoding Data Exfiltration – Reversing XOR Encryption”, I wanted to share some basic statistical techniques for identifying the type of data that may have been exfiltrated and proceeding to decipher it. Data types that are easily statistically identifiable include: Why macOS Catalina is breaking so many apps, and what to do about it Apple’s latest Mac update, macOS Catalina, was released earlier this week, and with it came a flurry of complications both minor and major. For one, this update is the first for Apple to drop 32-bit application support, which is causing all sorts of headaches for users of smaller apps, plug-ins, and other software that may not be updated for quite some time or may have been created by a company that no longer exists. There are also a fair number of other issues with Catalina, like Adobe software incompatibility problems and unforeseen hurdles related to the removal of iTunes. That leads us to a series of important questions for Mac users who may be at risk of having important workflows disrupted by Catalina. What exactly might go wrong if you do upgrade?

We Hacked the Gibson! Now what? - Philip Young (BSides Las Vegas 2014) (Hacking Illustrated Series InfoSec Tutorial Videos) We Hacked the Gibson! Now what?Philip Young IBM has been touting the security of the mainframe for over 30 years. So much so, that the cult of mainframers believes that the platform is impenetrable. Skydio 2 - The New Quadcopter Drone that's Made in America 4th October 2019 Aerial Photography,Drone Manufacturer,Drone Startups,Drones,Latest News,Quadcopters,UAV Design,unmanned drone industry A new quadcopter drone has been announced, the Skydio 2 boasts groundbreaking AI that can help it fly around objects, video camera technology that produces 4K footage at 6o fps , Sony 12.3MP CMOS sensor for stills, speeds of up to 36mph and 23 minute flight times. Over the years competitors with alternative drones to DJI drone products have come and gone but at last it seems we have a serious competitor to the DJI Phantom and DJI Mavic series drones. American drone manufacturer Skydio have just announced the launch of their Skydio 2 drone. The new drone looks great and the specs are pretty cool.

Related: