article thumbnail

Malicious file analysis – Example 01

Security Affairs

Cyber Security Specialist Zoziel Pinto Freire shows an example of malicious file analysis presented during his lecture on BSides-Vitória 2022. My objective with this series of articles is to show examples of malicious file analysis that I presented during my lecture on BSides-Vitória 2022. Example: python2.7

Libraries 103
article thumbnail

What is Tailgating? Definition, Examples & Prevention

IT Governance

Fraudsters have countless tricks up their sleeves to bypass security measures and access sensitive information. The same principle, believe it or not, applies in a cyber security context. More specifically, the fraudster is trying to gain physical access to a secure part of the premises so that they can steal confidential information.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Unixfreaxjp at #R2CON2020 presented shellcode basics for radare2

Security Affairs

radare2 is one example of those tools. In this presentation, I explain how to utilize radare2 for variation of shellcode analysis and will lead you as a tutorial from a basic know-how in analyzing shell code with multiple demonstrations. Online tutor of @unixfreaxjp at #R2CON2020 about #shellcode basics for #radare2 can be seen here?

Libraries 113
article thumbnail

Amazon Alexa Skills Present Security Risks

eSecurity Planet

Researchers now believe that the rapid adoption of these skills could have implications for information security as they could open Alexa users up to phishing or invasive data collection. Some examples include Alexa Guard for home security, Easy Meal Ideas for recipes and Spotify for music. Amazon Alexa skills security issues.

Risk 77
article thumbnail

Toyota presented PASTA (Portable Automotive Security Testbed) Car-Hacking Tool

Security Affairs

Takuya Yoshida from Toyota’s InfoTechnology Center and his colleague Tsuyoshi Toyama are members of a Toyota team that developed the new tool, called PASTA (Portable Automotive Security Testbed). You can download slides and the research paper from the following link: • Download Presentation Slides. • Download White Paper.

Security 104
article thumbnail

Security Analysis of Threema

Schneier on Security

A group of Swiss researchers have published an impressive security analysis of Threema. We present seven different attacks against the protocol in three different threat models. We discuss remediations for our attacks and draw three wider lessons for developers of secure protocols.

Security 120
article thumbnail

U.S. Internet Leaked Years of Internal, Customer Emails

Krebs on Security

has a business unit called Securence , which specializes in providing filtered, secure email services to businesses, educational institutions and government agencies worldwide. Internet/Securence says your email is secure. Hold Security founder Alex Holden said his researchers had unearthed a public link to a U.S.

Education 336