swannysec.net
Linking TorrentLocker to Pony - Pt. 1 · swannysec
https://swannysec.net/2015/10/31/linking-torrentlocker-to-pony.html
Linking TorrentLocker to Pony - Pt. 1 - swannysec. Documenting my thoughts on security, professional development, and whatever else comes to mind. John D. Swanson. Linking TorrentLocker to Pony - Pt. 1. If you’re just here for the IOCs, you will find a link to them at the bottom of the post. I need to begin with a few caveats:. Otherwise, please feel free to write it up yourself, I’d love to know more. I have omitted some data in the analysis, such as phone numbers. With that said, let’s get started!
punkcoder.com
Security | Punkcoder Home
http://punkcoder.com/useful-info/security
What is Dev Ops? Here are some cool things that I want to keep track of so I thought I would write them down:. The idea of network security and application security is something that has interested me for a long time, first becoming an interest in college. Very shortly there after I graduated with a minor in Telecommunications Systems Management with an emphasis in Security. What is Dev Ops?
kieran.garriga.com
Virus, Anti-Virus and Hoax Information
http://kieran.garriga.com/hoax.htm
Updated: Jul 1, 2016. Be careful out there! Know who you re dealing with. Don t believe promises of easy money. Think twice before entering contests run by unfamiliar companies. Be cautious about unsolicited emails. Guard your personal information. Pay the safest way. And here are more Internet Fraud Tips. And Anti Spam and Anti Phishing. Latest Antivirus and Malware Resources. Identify ransomware that encrypted your data. Free malware analysis service. Check whether a website is a known phishing site.
malwarebattle.blogspot.com
Malware Battle: Microsoft Launches Free Virtual Machines With Windows 10
http://malwarebattle.blogspot.com/2015/08/microsoft-launches-free-virtual.html
The Battle Against Malwares and Hackers. Terms and Conditions of Use. Tuesday, 18 August 2015. Microsoft Launches Free Virtual Machines With Windows 10. Following the launch of Windows 10, Microsoft now several free virtual machines. With the operating system launched. Through the virtual machine developers to their Web sites and applications with the latest version of Microsoft Edge test, the default browser in Windows 10. Operating System Download Windows 10. You can add me on twitter: @malwaredev.
malwarebattle.blogspot.com
Malware Battle: Seriously Android Leak Also To Attack On Apps And Websites
http://malwarebattle.blogspot.com/2015/08/seriously-android-leak-also-to-attack.html
The Battle Against Malwares and Hackers. Terms and Conditions of Use. Saturday, 1 August 2015. Seriously Android Leak Also To Attack On Apps And Websites. This week it was announced that there was a very serious leak. Is present in Android which allows an attacker installed on millions of Android phones malware by only sending a single MMS message. Stage Fright, such as the vulnerability is known, however, is also to attack in other ways, according to the Japanese anti-virus company Trend Micro. Mozilla ...
malwarebattle.blogspot.com
Malware Battle: Hacker Can Now Access Remote BMW And Mercedes
http://malwarebattle.blogspot.com/2015/08/hacker-can-now-access-remote-bmw-and.html
The Battle Against Malwares and Hackers. Terms and Conditions of Use. Sunday, 16 August 2015. Hacker Can Now Access Remote BMW And Mercedes. The famous hacker Samy Kamkar recently a tool. That he cars from General Motors could open remote start and has expanded its device, which also cars from BMW, Mercedes-Benz and Chrysler are no longer safe. This has Kamkar via Twitter. Like General Motoros other manufacturers offer a smartphone app to locate car, open and start. It involves BMW Remote. Due to legal o...
malwarebattle.blogspot.com
Malware Battle: Disclaimer
http://malwarebattle.blogspot.com/p/disclaimer.html
The Battle Against Malwares and Hackers. Terms and Conditions of Use. The owner of this "[ Malware Battle. Blog does not share personal information with third-parties nor does [ malwarebattle.blogspot.com. The owner of this blog reserves the right to edit or delete any comments submitted to this blog without notice due to;. 1 Comments deemed to be spam or questionable spam. 2 Comments including profanity. 3 Comments containing language or concepts that could be deemed offensive. Subscribe to: Posts (Atom).
malwarebattle.blogspot.com
Malware Battle: Apple Patches 232 Vulnerabilities In Mac OS X, iOS, Safari And Server
http://malwarebattle.blogspot.com/2015/08/apple-patches-232-vulnerabilities-in.html
The Battle Against Malwares and Hackers. Terms and Conditions of Use. Saturday, 15 August 2015. Apple Patches 232 Vulnerabilities In Mac OS X, iOS, Safari And Server. Apple yesterday evening updates for Mac OS X, iOS, Safari and OS X Server released that fix 232 leaks together. Through the vulnerabilities could allow an attacker in the worst case code on the respective platforms. Most of the vulnerabilities patched in Mac OS X. OS X Security Update 2015-006 and Yosemite v10.10.5. Labels: Apple Mac OS X.
malwarebattle.blogspot.com
Malware Battle: Hacker Makes Tool To Unlock GM Cars Remotely
http://malwarebattle.blogspot.com/2015/07/hacker-makes-tool-to-unlock-gm-cars.html
The Battle Against Malwares and Hackers. Terms and Conditions of Use. Friday, 31 July 2015. Hacker Makes Tool To Unlock GM Cars Remotely. The well-known hacker Samy Kamkar has a tool designed. To cars from manufacturer General Motors (GM) are located remotely open and start. GM offers car owners a service called OnStar. With which the car can be found via a smartphone app, opened and started. Know During the upcoming Def Con conference. Shows already see a short demonstration. The makers of the popular f...
malwarebattle.blogspot.com
Malware Battle: New Android Devices Leak Late Restart Endlessly
http://malwarebattle.blogspot.com/2015/08/new-android-devices-leak-late-restart.html
The Battle Against Malwares and Hackers. Terms and Conditions of Use. Wednesday, 5 August 2015. New Android Devices Leak Late Restart Endlessly. Researchers have discovered a new vulnerability in Android which could allow an attacker to restart the unit. In the event it is attacked leak via an app, it is possible to restart to endlessly leave the device. The problem is in the media server of Android, which also previously the Stage Fright leak. Was discovered, and a vulnerability that sets almost unusable.
SOCIAL ENGAGEMENT