Computer Security, Links and Resources (6)

Previous Post

WebAssembly: A New World Of Native Exploits On The Web

Microsoft Patches ‘Wormable’ Flaw in Windows XP, 7 and Windows 2003

Linux kernel RDS flaw affects Red Hat, Ubuntu, Debian and SUSE

The Most Expensive Lesson Of My Life: Details of SIM port hack

John McAfee ranks the biggest hacks ever

Hackers Show Proofs of Concept to Beat Hardware-Based 2FA
DEF CON hackers show how YubiKeys and RSA tokens can be spoofed and circumvented (2017)

Nearly 3,000 Bitcoin Miners Exposed Online via Telnet Ports, Without Passwords

Guerrilla Threat Modelling (or ‘Threat Modeling’ if you’re American)

Angel “Java” Lopez


1 thought on “Computer Security, Links and Resources (6)

  1. Pingback: Computer Security, Links and Resources (5) | Angel ”Java” Lopez on Blog

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s