Benutzer-Werkzeuge

Webseiten-Werkzeuge


cryptoparty_wien_35

Unterschiede

Hier werden die Unterschiede zwischen zwei Versionen gezeigt.

Link zu der Vergleichsansicht

Beide Seiten, vorherige Überarbeitung Vorherige Überarbeitung
cryptoparty_wien_35 [2015/08/03 20:59]
hetti
cryptoparty_wien_35 [2015/09/27 21:25] (aktuell)
maclemon Lesestoff Linkliste ergänzt.
Zeile 10: Zeile 10:
   * [[http://​free.avg.com/​de-de/​free-antivirus-download|AVG Antivirus free]]   * [[http://​free.avg.com/​de-de/​free-antivirus-download|AVG Antivirus free]]
  
 +
 +
 +Lesestoff
 +
 +  * [[http://​arstechnica.com/​security/​2015/​07/​call-it-a-data-rupture-hack-hitting-opm-affects-21-5-million/​|Call it a “data rupture”: Hack hitting OPM affects 21.5 million - Ars Technica]]
 +  * [[http://​blog.lmorchard.com/​2015/​07/​22/​the-verge-web-sucks/​|]]
 +  * [[http://​blog.stummkonzert.de/​2013/​08/​kryptografieverbot/​|Verschlüsselung ist Terrorismus?​ Ein kurzer Ausflug in die Geschichte von Kryptografieverboten ​ -   ​Stummkonzer]]
 +  * [[http://​fortune.com/​2015/​07/​16/​governments-used-spy-software/​|Leaked emails from security firm Hacking Team show government use - Fortune]]
 +  * [[http://​futurezone.at/​netzpolitik/​die-netzneutralitaet-wird-de-facto-abgeschafft/​139.089.543|&​quot - Die Netzneutralit&​auml - t wird de facto abgeschafft&​quot -  - futurezone.a]]
 +  * [[http://​googleprojectzero.blogspot.co.at/​2015/​07/​significant-flash-exploit-mitigations_16.html|Project Zero: Significant Flash exploit mitigations are live in v18.0.0.209]]
 +  * [[http://​itsjack.cc/​blog/​2015/​07/​cyberghost-vpn-i-got-99-problems-and-im-sure-ssl-is-one/​|CyberGhost VPN &#8211 -  I got 99 Problems and I&#8217 - m sure SSL is one - linkcabin]]
 +  * [[http://​krebsonsecurity.com/​2015/​07/​online-cheating-site-ashleymadison-hacked/?​utm_source=twitterfeed&​utm_medium=twitter&​utm_campaign=Feed%3A+KrebsOnSecurity+%28Krebs+on+Security%29|Online Cheating Site AshleyMadison Hacked &mdash -   Krebs on Security]]
 +  * [[http://​m.slashdot.org/​story/​296393|Slashdo]]
 +  * [[http://​motherboard.vice.com/​read/​hacking-teams-spyware-targeted-porn-sites-visitors|Hacking Team's Spyware Targeted Porn Sites' Visitors - Motherboard]]
 +  * [[http://​www.csoonline.com/​article/​2950239/​vulnerabilities/​microsoft-releases-out-of-band-patch-for-all-versions-of-windows.html?​utm_source=twitterfeed&​utm_medium=twitter|Microsoft releases out-of-band patch for all versions of Windows - CSO Online]]
 +  * [[http://​www.golem.de/​news/​anonymisierung-hunderte-gefaelschte-webseiten-im-tor-netzwerk-entdeckt-1507-115241.html|Anonymisierung:​ Hunderte gef&​auml - lschte Webseiten im Tor-Netzwerk entdeckt - Golem.de]]
 +  * [[http://​www.ibtimes.co.uk/​hornet-tor-style-dark-web-network-allows-high-speed-anonymous-web-browsing-1512359|HORNET:​ Tor-style dark web network allows high-speed anonymous web browsing]]
 +  * [[http://​www.inforisktoday.com/​interviews/​internet-things-as-security-risk-i-2783|The &#039 - Internet of Things&#​039 -  as a Security Risk - InfoRiskToday]]
 +  * [[http://​www.net-security.org/​secworld.php?​id=18571|]]
 +  * [[http://​www.nytimes.com/​|The New York Times - Breaking News -  World News & Multimedia]]
 +  * [[http://​www.patentlyapple.com/​patently-apple/​2015/​07/​apples-iphone-encryption-locked-out-new-york-cops-74-times.html|Apple'​s iPhone Encryption Locked out New York Cops 74 Times - Patently Apple]]
 +  * [[http://​www.pcgamer.com/​critical-adobe-flash-player-exploit-revealed-by-weekend-leak/​|&​quot - Critical&​quot -  Adobe Flash Player exploit revealed by weekend leak - PC Gamer]]
 +  * [[http://​www.techradar.com/​news/​world-of-tech/​uh-oh-this-robot-just-passed-the-self-awareness-test-1299362|Uh-oh -  a robot just passed the self-awareness test - TechRadar]]
 +  * [[http://​www.theguardian.com/​commentisfree/​2015/​jul/​17/​michael-mcintyre-met-helicopter-snap-tweet?​CMP=share_btn_tw|The Mets helicopter snap of Michael McIntyre is a wake-up call to all of us - James Ball - Comment is free - The Guardian]]
 +  * [[http://​www.theverge.com/​2015/​7/​14/​8956945/​google-photos-collecting-pictures-android-after-delete-app?​utm_campaign=theverge&​utm_content=chorus&​utm_medium=social&​utm_source=twitter|Google Photos keeps collecting your pictures even after you delete the Android app - The Verge]]
 +  * [[http://​www.troyhunt.com/​2015/​07/​how-i-got-xssd-by-my-ad-network.html#​.VaUFs39lFJM.twitter|Troy Hunt: How I got XSS&#​8217 - d by my ad network]]
 +  * [[http://​www.wired.com/​2015/​07/​hackers-remotely-kill-jeep-highway/​|Hackers Remotely Kill a Jeep on the Highway—With Me in It - WIRED]]
 +  * [[https://​github.com/​passivetotal/​HT_infra|passivetotal/​HT_infra · GitHub]]
 +  * [[https://​netzpolitik.org/​2015/​us-amerikanischer-oeffentlicher-dienst-gehackt-millionen-persoenlicher-daten-wurden-kopiert/​|US-amerikanischer öffentlicher Dienst gehackt: Millionen persönlicher Daten wurden kopiert - netzpolitik.org]]
 +  * [[https://​thehackerblog.com/​stealing-lastpass-passwords-with-clickjacking/​|Stealing Lastpass Passwords With Clickjacking - The Hacker Blog]]
 +  * [[https://​theintercept.com/​2015/​07/​14/​communicating-secret-watched/​|Chatting in Secret While We're All Being Watched]]
 +  * [[https://​threatpost.com/​amazon-patches-certificate-vulnerabilities-in-fire-phones/​113525/?​utm_content=buffer9a568&​utm_medium=social&​utm_source=twitter.com&​utm_campaign=buffer|Amazon Patches Certificate Vulnerabilities in Fire Phones - Threatpost - The first stop for security new]]
 +  * [[https://​twitter.com/​Cryptomeorg/​status/​624944049611534336/​photo/​1|Cryptome auf Twitter: &quot - Jeep ISO security fix is dated 24 April 2015 -  months before news of hack. http://​t.co/​CbS6VN56C9&​quot -]]
 +  * [[https://​twitter.com/​MinneapoliSam/​status/​617161090523238401/​photo/​1|Sam Richards auf Twitter: &quot - Aerial surveillance over San Francisco within the last few days. #​FBISkySpies #​FourthofJuly #​FourthAmendment http://​t.co/​nMcOrvjcKF&​quot -]]
 +  * [[https://​twitter.com/​TWC_Help/​status/​624010904456200192|TWC Help auf Twitter: &quot - @nicksergeant We ask that you don&#39 - t use profanity in your password -  please. ^TL&​quot -]]
 +  * [[https://​twitter.com/​agl__/​status/​618244168410763264|Adam Langley auf Twitter: &quot - @botherder @ioerror If that RCS root cert was added to the root store to allow HTTPS interception -  it&#39 - ll give a revoked error in Chrome now.&​quot -]]
 +  * [[https://​twitter.com/​daviottenheimer/​status/​623517846287429632|davi (德海) auf Twitter: &quot - breaking: server being used to patch the Jeep of Death is still vulnerable to old POODLE http://​t.co/​ZUSxW6Dw2L&​quot -]]
 +  * [[https://​twitter.com/​doctorow/​status/​623318781549522944/​photo/​1|Cory Doctorow auf Twitter: &quot - This comes close to a #CFAA violation @datavalet @IPredatorVPN http://​t.co/​MJf5wW9P2D&​quot -]]
 +  * [[https://​twitter.com/​doctorow/​status/​623433982579879937|Cory Doctorow auf Twitter: &quot - @MacLemon @datavalet @IPredatorVPN &#10 - Air Canada Maple Leaf Lounge LAX&​quot -]]
 +  * [[https://​twitter.com/​karinjiri/​status/​623304292607266816/​photo/​1|Peter Wemm auf Twitter: &quot - Yay!  I suppose that&#​39 - s one free Adblock mechanism. http://​t.co/​WmtTHMBo05&​quot -]]
 +  * [[https://​twitter.com/​markrussinovich/​status/​623685994391277568/​photo/​1|Mark Russinovich auf Twitter: &quot - Cockpit software crash in Airbus A320 (simulator at the Smithsonian):​ http://​t.co/​PVfjpZibIf&​quot -]]
 +  * [[https://​twitter.com/​mikko/​status/​623400964192645120/​photo/​1|Mikko Hypponen auf Twitter: &quot - Trusted Security Award.&#​10 - 100% Discreet Service.&#​10 - SSL Secure Site. http://​t.co/​nIi77JE3Rj&​quot -]]
 +  * [[https://​twitter.com/​objective_see/​status/​620074534989770752/​photo/​1|Objective-See auf Twitter: &quot - Worried about #​HackingTeam&#​39 - s OS X implant? If you were running BlockBlock -  it generically detected/​could block it :) http://​t.co/​sfQHOJLAWH&​quot -]]
 +  * [[https://​twitter.com/​ow/​status/​620302716607332352|it me auf Twitter: &quot - Uninstall Flash:&#​10 - &#10 - Windows: https://​t.co/​fSi0RcncFW&#​10 - Mac: https://​t.co/​cFXqpV6KNm&#​10 - &#10 - Tell everyone you know.&​quot -]]
 +  * [[https://​twitter.com/​riusksk/​status/​621149267680342016/​photo/​1|riusksk auf Twitter: &quot - #​HackingTeam already exposed 7 0day,whether to continue? http://​t.co/​ZQwRaXwPfc&​quot -]]
 +  * [[https://​twitter.com/​sehnaoui/​status/​618069517319565316/​photo/​1|Khalil (pilgrim) auf Twitter: &quot - #​HackingTeam sells uber expensive licenses -  but pirates other people&#​39 - s software. Go figure ...&#10 - via @bluetouff http://​t.co/​GOaOaHAEtc&​quot -]]
 +  * [[https://​twitter.com/​teilweise/​status/​619423515696078848/​photo/​1|Der Teilweise ▾ auf Twitter: &quot - MÖGLICHERWEISE?​!?​ http://​t.co/​zUoJlY5sWM&​quot -]]
 +  * [[https://​twitter.com/​v1ad_o/​status/​621745353898000384/​photo/​1|vlad auf Twitter: &quot - Hacking Team RCS up and running = Its going to be a busy weekend digging through this @sensepost http://​t.co/​IgftqXToBs&​quot -]]
 +  * [[https://​twitter.com/​verge/​status/​616446699553206272|The Verge auf Twitter: &quot - You can now start your Hyundai remotely with Android Wear or an Apple Watch http://​t.co/​9mWqTJjNa8 http://​t.co/​QMNVgqma4e&​quot -]]
 +  * [[https://​wikileaks.org/​hackingteam/​emails/​emailid/​789786|WikiLeaks - The Hackingteam Archive]]
 +  * [[https://​www.reddit.com/​r/​netsec/​comments/​3ce32w/​grandstream_voip_phone_ssh_key_backdoor_and/​|Grandstream VOIP phone: SSH key backdoor and multiple vulnerabilities leading to RCE as root : netsec]]
cryptoparty_wien_35.txt · Zuletzt geändert: 2015/09/27 21:25 von maclemon