Benutzer-Werkzeuge

Webseiten-Werkzeuge


cryptoparty_wien_35

Unterschiede

Hier werden die Unterschiede zwischen zwei Versionen der Seite angezeigt.

Link zu der Vergleichsansicht

Beide Seiten, vorherige ÜberarbeitungVorherige Überarbeitung
cryptoparty_wien_35 [2015-08-03 18:59] hetticryptoparty_wien_35 [2015-09-27 19:25] (aktuell) – Lesestoff Linkliste ergänzt. maclemon
Zeile 10: Zeile 10:
   * [[http://free.avg.com/de-de/free-antivirus-download|AVG Antivirus free]]   * [[http://free.avg.com/de-de/free-antivirus-download|AVG Antivirus free]]
  
 +
 +
 +Lesestoff
 +
 +  * [[http://arstechnica.com/security/2015/07/call-it-a-data-rupture-hack-hitting-opm-affects-21-5-million/|Call it a “data rupture”: Hack hitting OPM affects 21.5 million - Ars Technica]]
 +  * [[http://blog.lmorchard.com/2015/07/22/the-verge-web-sucks/|]]
 +  * [[http://blog.stummkonzert.de/2013/08/kryptografieverbot/|Verschlüsselung ist Terrorismus? Ein kurzer Ausflug in die Geschichte von Kryptografieverboten  -   Stummkonzer]]
 +  * [[http://fortune.com/2015/07/16/governments-used-spy-software/|Leaked emails from security firm Hacking Team show government use - Fortune]]
 +  * [[http://futurezone.at/netzpolitik/die-netzneutralitaet-wird-de-facto-abgeschafft/139.089.543|&quot - Die Netzneutralit&auml - t wird de facto abgeschafft&quot -  - futurezone.a]]
 +  * [[http://googleprojectzero.blogspot.co.at/2015/07/significant-flash-exploit-mitigations_16.html|Project Zero: Significant Flash exploit mitigations are live in v18.0.0.209]]
 +  * [[http://itsjack.cc/blog/2015/07/cyberghost-vpn-i-got-99-problems-and-im-sure-ssl-is-one/|CyberGhost VPN &#8211 -  I got 99 Problems and I&#8217 - m sure SSL is one - linkcabin]]
 +  * [[http://krebsonsecurity.com/2015/07/online-cheating-site-ashleymadison-hacked/?utm_source=twitterfeed&utm_medium=twitter&utm_campaign=Feed%3A+KrebsOnSecurity+%28Krebs+on+Security%29|Online Cheating Site AshleyMadison Hacked &mdash -   Krebs on Security]]
 +  * [[http://m.slashdot.org/story/296393|Slashdo]]
 +  * [[http://motherboard.vice.com/read/hacking-teams-spyware-targeted-porn-sites-visitors|Hacking Team's Spyware Targeted Porn Sites' Visitors - Motherboard]]
 +  * [[http://www.csoonline.com/article/2950239/vulnerabilities/microsoft-releases-out-of-band-patch-for-all-versions-of-windows.html?utm_source=twitterfeed&utm_medium=twitter|Microsoft releases out-of-band patch for all versions of Windows - CSO Online]]
 +  * [[http://www.golem.de/news/anonymisierung-hunderte-gefaelschte-webseiten-im-tor-netzwerk-entdeckt-1507-115241.html|Anonymisierung: Hunderte gef&auml - lschte Webseiten im Tor-Netzwerk entdeckt - Golem.de]]
 +  * [[http://www.ibtimes.co.uk/hornet-tor-style-dark-web-network-allows-high-speed-anonymous-web-browsing-1512359|HORNET: Tor-style dark web network allows high-speed anonymous web browsing]]
 +  * [[http://www.inforisktoday.com/interviews/internet-things-as-security-risk-i-2783|The &#039 - Internet of Things&#039 -  as a Security Risk - InfoRiskToday]]
 +  * [[http://www.net-security.org/secworld.php?id=18571|]]
 +  * [[http://www.nytimes.com/|The New York Times - Breaking News -  World News & Multimedia]]
 +  * [[http://www.patentlyapple.com/patently-apple/2015/07/apples-iphone-encryption-locked-out-new-york-cops-74-times.html|Apple's iPhone Encryption Locked out New York Cops 74 Times - Patently Apple]]
 +  * [[http://www.pcgamer.com/critical-adobe-flash-player-exploit-revealed-by-weekend-leak/|&quot - Critical&quot -  Adobe Flash Player exploit revealed by weekend leak - PC Gamer]]
 +  * [[http://www.techradar.com/news/world-of-tech/uh-oh-this-robot-just-passed-the-self-awareness-test-1299362|Uh-oh -  a robot just passed the self-awareness test - TechRadar]]
 +  * [[http://www.theguardian.com/commentisfree/2015/jul/17/michael-mcintyre-met-helicopter-snap-tweet?CMP=share_btn_tw|The Mets helicopter snap of Michael McIntyre is a wake-up call to all of us - James Ball - Comment is free - The Guardian]]
 +  * [[http://www.theverge.com/2015/7/14/8956945/google-photos-collecting-pictures-android-after-delete-app?utm_campaign=theverge&utm_content=chorus&utm_medium=social&utm_source=twitter|Google Photos keeps collecting your pictures even after you delete the Android app - The Verge]]
 +  * [[http://www.troyhunt.com/2015/07/how-i-got-xssd-by-my-ad-network.html#.VaUFs39lFJM.twitter|Troy Hunt: How I got XSS&#8217 - d by my ad network]]
 +  * [[http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/|Hackers Remotely Kill a Jeep on the Highway—With Me in It - WIRED]]
 +  * [[https://github.com/passivetotal/HT_infra|passivetotal/HT_infra · GitHub]]
 +  * [[https://netzpolitik.org/2015/us-amerikanischer-oeffentlicher-dienst-gehackt-millionen-persoenlicher-daten-wurden-kopiert/|US-amerikanischer öffentlicher Dienst gehackt: Millionen persönlicher Daten wurden kopiert - netzpolitik.org]]
 +  * [[https://thehackerblog.com/stealing-lastpass-passwords-with-clickjacking/|Stealing Lastpass Passwords With Clickjacking - The Hacker Blog]]
 +  * [[https://theintercept.com/2015/07/14/communicating-secret-watched/|Chatting in Secret While We're All Being Watched]]
 +  * [[https://threatpost.com/amazon-patches-certificate-vulnerabilities-in-fire-phones/113525/?utm_content=buffer9a568&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer|Amazon Patches Certificate Vulnerabilities in Fire Phones - Threatpost - The first stop for security new]]
 +  * [[https://twitter.com/Cryptomeorg/status/624944049611534336/photo/1|Cryptome auf Twitter: &quot - Jeep ISO security fix is dated 24 April 2015 -  months before news of hack. http://t.co/CbS6VN56C9&quot -]]
 +  * [[https://twitter.com/MinneapoliSam/status/617161090523238401/photo/1|Sam Richards auf Twitter: &quot - Aerial surveillance over San Francisco within the last few days. #FBISkySpies #FourthofJuly #FourthAmendment http://t.co/nMcOrvjcKF&quot -]]
 +  * [[https://twitter.com/TWC_Help/status/624010904456200192|TWC Help auf Twitter: &quot - @nicksergeant We ask that you don&#39 - t use profanity in your password -  please. ^TL&quot -]]
 +  * [[https://twitter.com/agl__/status/618244168410763264|Adam Langley auf Twitter: &quot - @botherder @ioerror If that RCS root cert was added to the root store to allow HTTPS interception -  it&#39 - ll give a revoked error in Chrome now.&quot -]]
 +  * [[https://twitter.com/daviottenheimer/status/623517846287429632|davi (德海) auf Twitter: &quot - breaking: server being used to patch the Jeep of Death is still vulnerable to old POODLE http://t.co/ZUSxW6Dw2L&quot -]]
 +  * [[https://twitter.com/doctorow/status/623318781549522944/photo/1|Cory Doctorow auf Twitter: &quot - This comes close to a #CFAA violation @datavalet @IPredatorVPN http://t.co/MJf5wW9P2D&quot -]]
 +  * [[https://twitter.com/doctorow/status/623433982579879937|Cory Doctorow auf Twitter: &quot - @MacLemon @datavalet @IPredatorVPN &#10 - Air Canada Maple Leaf Lounge LAX&quot -]]
 +  * [[https://twitter.com/karinjiri/status/623304292607266816/photo/1|Peter Wemm auf Twitter: &quot - Yay!  I suppose that&#39 - s one free Adblock mechanism. http://t.co/WmtTHMBo05&quot -]]
 +  * [[https://twitter.com/markrussinovich/status/623685994391277568/photo/1|Mark Russinovich auf Twitter: &quot - Cockpit software crash in Airbus A320 (simulator at the Smithsonian): http://t.co/PVfjpZibIf&quot -]]
 +  * [[https://twitter.com/mikko/status/623400964192645120/photo/1|Mikko Hypponen auf Twitter: &quot - Trusted Security Award.&#10 - 100% Discreet Service.&#10 - SSL Secure Site. http://t.co/nIi77JE3Rj&quot -]]
 +  * [[https://twitter.com/objective_see/status/620074534989770752/photo/1|Objective-See auf Twitter: &quot - Worried about #HackingTeam&#39 - s OS X implant? If you were running BlockBlock -  it generically detected/could block it :) http://t.co/sfQHOJLAWH&quot -]]
 +  * [[https://twitter.com/ow/status/620302716607332352|it me auf Twitter: &quot - Uninstall Flash:&#10 - &#10 - Windows: https://t.co/fSi0RcncFW&#10 - Mac: https://t.co/cFXqpV6KNm&#10 - &#10 - Tell everyone you know.&quot -]]
 +  * [[https://twitter.com/riusksk/status/621149267680342016/photo/1|riusksk auf Twitter: &quot - #HackingTeam already exposed 7 0day,whether to continue? http://t.co/ZQwRaXwPfc&quot -]]
 +  * [[https://twitter.com/sehnaoui/status/618069517319565316/photo/1|Khalil (pilgrim) auf Twitter: &quot - #HackingTeam sells uber expensive licenses -  but pirates other people&#39 - s software. Go figure ...&#10 - via @bluetouff http://t.co/GOaOaHAEtc&quot -]]
 +  * [[https://twitter.com/teilweise/status/619423515696078848/photo/1|Der Teilweise ▾ auf Twitter: &quot - MÖGLICHERWEISE?!? http://t.co/zUoJlY5sWM&quot -]]
 +  * [[https://twitter.com/v1ad_o/status/621745353898000384/photo/1|vlad auf Twitter: &quot - Hacking Team RCS up and running = Its going to be a busy weekend digging through this @sensepost http://t.co/IgftqXToBs&quot -]]
 +  * [[https://twitter.com/verge/status/616446699553206272|The Verge auf Twitter: &quot - You can now start your Hyundai remotely with Android Wear or an Apple Watch http://t.co/9mWqTJjNa8 http://t.co/QMNVgqma4e&quot -]]
 +  * [[https://wikileaks.org/hackingteam/emails/emailid/789786|WikiLeaks - The Hackingteam Archive]]
 +  * [[https://www.reddit.com/r/netsec/comments/3ce32w/grandstream_voip_phone_ssh_key_backdoor_and/|Grandstream VOIP phone: SSH key backdoor and multiple vulnerabilities leading to RCE as root : netsec]]
cryptoparty_wien_35.txt · Zuletzt geändert: 2015-09-27 19:25 von maclemon