Hack-tualité by G-echo - Security Tips - Semaine 2018/51

Security Tips - Semaine 2018/51

En bref : 4 gestes pour ne pas pourrir le Noël de votre grand-mère avec un objet connecté vulnérable
Fri, 21 Dec 2018 13:20:54 GMT
Corentin Durand
Avant de passer à la caisse avec votre lampe connectée, faites quelques vérifications.<p>Dans les foyers, les objets connectés concentrent de nombreuses …
Facebook: attention, ces publications sont des tentatives d'hameçonnage
Fri, 21 Dec 2018 11:34:46 GMT
BFMTV
Sur Facebook, des publications qui se présentent comme humoristiques circulent. Elles mènent à un site malveillant qui pourrait siphonner vos …
How to set up a Windows 10 computer: 5 essential steps
Fri, 21 Dec 2018 09:12:17 GMT
Brandon Vigliarolo
Getting a new PC is exciting, but you should follow these setup steps before using a Windows 10 machine.<p>Unwrapping a new PC, peeling off the …
Windows Sandbox is a new way to run untrusted apps without risking a virus
Thu, 20 Dec 2018 08:45:44 GMT
Jacob Siegal
You can never be too careful when it comes to opening files or email attachments from untrusted sources. Just one errant click could have disastrous …
7 digital privacy tools you need to be using now
Mon, 17 Dec 2018 02:52:19 GMT
By Michael Grothaus
Everyone wants your data. Here’s how to protect it.<p>This was not a good year for our data. In fact, like the previous year, it saw some of the most egregious breaches of our data in history. By far the most infamous one was the Facebook-Cambridge Analytica scandal. In March 2018 it was revealed that …
NOTE
Fri, 14 Dec 2018 10:13:04 GMT
ksanchezcld
README.md<p>Andrwjkerr forked repository for www.sniferl4bs.com<p>The fork was done because the original author has not updated about 2 years ago.<p>Security …
Moonraker:1 Vulnhub Walkthrough
Fri, 07 Dec 2018 21:31:09 GMT
Raj Chandel
Hack into the Moonraker system and discover who’s behind these menacing plans once and for all. Find and destroy the Villain before it’s too late. …
Manage your online safety on hundreds of sites
Fri, 30 Nov 2018 09:13:27 GMT
Komando Staff, Komando.com
If you're anything like me, you visit several different websites on any given day. It seems that lately, more sites want you to create an account …
How Password Constraints Give You a False Sense of Security
Fri, 23 Nov 2018 05:50:17 GMT
David Murphy
The next time you’re forced to make a password—especially if a site requires you to use a crazy combination of uppercase and lowercase letters, or a …
How to Switch to Software Encryption on Your Vulnerable Solid-State Drive
Thu, 08 Nov 2018 23:50:30 GMT
Brendan Hesse
Researchers at the Netherland’s Radboud University have uncovered serious security issues with several solid-state drives that use hardware-based …
Hexacorn | Blog
Sun, 04 Nov 2018 09:36:50 GMT
This is a little nifty trick for detecting virtualization environments. At least, some of them.<p>Anytime you restore the snapshot of your virtual …
Making Windows 10 a bit more private by blocking Cortana with firewall rules
Fri, 26 Oct 2018 18:42:35 GMT
Michael Horowitz
Every now and then, I fire up the excellent (and free and portable) CurrPorts program by Nir Sofer. It shows the currently opened TCP and UDP ports …
By G-echo