 |
Contribuez à SecuObs en envoyant des bitcoins ou des dogecoins.
Contribute to SecuObs by sending bitcoins or dogecoins.
|  |
|
|
|
|
|
Mini-Tagwall | | | |
Revue de presse : security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone
+ de mots clés pour la revue de presse
Annuaires des videos : curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit
+ de mots clés pour les videos
Revue Twitter : security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall
+ de mots clés pour la revue Twitter
| |
|
|
|
Les Tweets pour riskybusiness |
Si vous voulez bloquer un compte Twitter ou nous en proposer un
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Les Tweets filtrés pour "riskybusiness" (218 résultats)S'abonner au fil RSS SecuObs pour le compte Twitter riskybusiness[2012-10-04] - 03:52:21 - Adam (@metlstorm) informs me the Australian Tax Office pentest team listens to Risky Business. Hi guys! Umm. My books are in order, I swear![2012-10-03] - 10:44:37 - Exclusive promotion on Maltego training! Register and mention http://t.co/V8oHSyyf for the early bird rate! http://t.co/lXeq6wnf[2012-09-24] - 07:00:41 - There's no way they could have confused this pooch for Miranda Kerr, let's put it that way. Illegal wiretaps FTL.[2012-09-22] - 02:24:50 - This week's show is up! IE 0days are newsworthy now? WINNING!!! http://t.co/f3jRtoVP[2012-09-11] - 07:24:24 - @bengrubb umm.. you sure she's not talking about DHCP logs from the ISPs?[2012-09-11] - 07:24:24 - @bengrubb destination IP addresses are a step too far, but DHCP log retention seems sensible IMO... we'll have to wait for the draft laws.[2012-09-07] - 02:50:42 - This week's show is up! @paterva's Roelof Temmingh walks us thru the latest Maltego release! http://t.co/J0hy45rp tks to sponsor @hacklabs[2012-09-07] - 02:50:42 - Weird behaviour alert. It's entirely possible someone has been f*cking with my Amazon S3 account.[2012-09-07] - 02:50:42 - I missed an episode last month but we still did around 450Gb in audio downloads from Amazon. w00t.[2012-08-14] - 21:31:39 - Risky Business 250 is up! http://t.co/kOuaAqcI FX talks about his Huawei DEFCON session, @ChrisGatford discusses @mat's woes and MOAR![2012-08-08] - 15:55:56 - Social engineering bug chaining. Very clever stuff.[2012-08-08] - 15:55:56 - Great news! Insomnia Security is sponsoring some Risky Business episodes! http://t.co/wxCzE5LM Thanks heaps guys...[2012-08-08] - 15:55:56 - .@PhobiaisGod but just because @mat says he won't press charges doesn't mean Apple or Amazon won't.[2012-08-08] - 15:55:56 - .@PhobiaisGod and I agree nothing would have changed at Apple or Amazon if this hack hadn't have taken place.[2012-08-08] - 15:55:56 - .@PhobiaisGod and of course I mean if the attacker ever logged into those Twitter accounts without Tor or solid source IP obfuscation[2012-08-03] - 18:25:41 - If anyone's looking to recruit I've got some pentesters and security manager types on my books at the moment who have awesome CVs...[2012-07-31] - 10:52:43 - @stilgherrian Nice work with Gaughan this week. He seems to just be advocating the retention of DHCP logs and nothing further.[2012-07-20] - 19:54:06 - This week's show is up. Brian Snow, former NSA tech director, information assurance, talks quantum computing. http://t.co/ZFmQWxat[2012-07-19] - 10:18:12 - I don't understand quantum physics. I must be really dumb because hipsters and potheads all say they LOVE quantum physics.[2012-07-19] - 10:18:12 - This week's show features former NSA technical director, information assurance, Brian Snow, discussing quantum computers. Show will run long[2012-07-19] - 10:18:12 - Long story short? Every cryptographic system on the planet could be invalidated by quantum computing within 15 years.[2012-07-19] - 10:18:12 - Brian Snow's Google keywords for the week are: NSA quantum computing Utah[2012-07-16] - 07:35:02 - So much hype on DNSChanger... and I love how the same meeja that hyped it up are now saying See? We told you it was nothing! hur hur![2012-06-27] - 19:20:29 - @mkotadia you need an Amazon S3 account. Dirt cheap, amazing uptime... set one up![2012-06-27] - 19:20:29 - @Beaker VMWare's core tech is basically a linux kernel with a hypervisor module and some management tech built around it...[2012-06-27] - 19:20:29 - @Beaker why laud this sort of stuff as cloud infrastructure??? It's a fucking hypervisor with some resource allocation tools...[2012-06-19] - 14:10:45 - @cipherson @neohindu @kirkj thanks guys! @xntrik what about, you know, Chrome? ;)[2012-06-19] - 14:10:45 - @sensepost is primarily sponsoring Risky Business to promote its training courses at BlackHat in Vegas. Buy some! :) http://t.co/JYXeD0yx[2012-06-19] - 14:10:45 - Sensepost is primarily sponsoring Risky Business to promote its training courses at BlackHat in Vegas. Buy some! http://t.co/JYXeD0yx[2012-06-19] - 14:10:45 - RT @snare: Bogans with giant prams on peak hour trams - you're even worse than those JavaScript assholes[2012-06-19] - 14:10:45 - RT @DaveBremer: @riskybusiness seems @parmy is getting 1-star spammed on amazon yesterday today - all by sfresh reviewers http:// ...[2012-06-15] - 10:59:28 - RT @pipesec: And the creative payload of the year award goes to?. http://t.co/RxoqAlxI --- awesome[2012-06-07] - 19:05:04 - Sneak peek at next version of Maltego: @AndrewMohawk auto-recons Argentinian gov 'net infrastructure in 10 mins. http://t.co/ued5kt8i[2012-06-02] - 03:05:13 - FPGA back doors. Who knew my electronics engineering degree would actually be useful?![2012-06-02] - 03:05:13 - @cgsy I'm talking about the Cambridge University research that found a super secret back door (aka debugging interface) in a milspec FPGA[2012-06-02] - 03:05:13 - Risky Business #240 is up! http://t.co/MM7ZHHdu Undocumented FPGA features: back door or debugger? Peter Gutmann explains![2012-06-02] - 03:05:13 - RT @j0hnnygear: @riskybusiness Javascript Bitcoin mining not as infeasible as was made out - here is some source for GPU Jscript mining ...[2012-05-29] - 05:39:43 - A JTAG interface is a debugger when in a US or European-made device and a sikrit gummint backdoor when present in a Chinese-made device.[2012-05-25] - 21:59:24 - http://t.co/GyyX0T7f is down... DDoS?[2012-05-25] - 21:59:24 - @0x1C it's an amazon S3 box... seems fine at this end! :)[2012-05-22] - 10:23:23 - @je_au A spoofed CLID wouldn't have put the call on Thomson's bill. It was on his bill.[2012-05-22] - 10:23:23 - I've posted the final two AusCERT 2012 podcasts at http://t.co/JnAdNykJ ... Big thanks to RB sound guy/hipster barista Ant Lawrence![2012-05-21] - 06:38:38 - How the hell do you clone a GSM phone without rendering the previous SIM inoperable? Maybe he's still on analogue?? Lol. #thomson[2012-05-21] - 06:38:38 - @davidramli @annabelcrabb there are a lot of technical reasons why Thomson's cloned phone scenario doesn't stack up.[2012-05-18] - 11:18:03 - @troyhunt the AusCERT podcasts are published in a different feed, RB2. You can find it in iTMS or at http://t.co/Ovu2GYVr[2012-05-18] - 11:18:03 - AusCERT day three. I have woken up feeling better than I do today, that's for sure.[2012-05-18] - 11:18:03 - Just posted Susan Landau's AusCERT plenary session: The risks posed by wiretapping technologies: http://t.co/P4FFr1Ob[2012-05-17] - 08:07:43 - Also posted a sponsor interview I did by phone last week. Arbor Networks Rob Malan on DDoSing mobile networks http://t.co/nMPY3qsJ[2012-05-17] - 08:07:43 - There you go, 3 bits of audio featuring dudes with planet-sized brains. You can find all my AusCERT coverage here http://t.co/PWbFE0pc[2012-05-17] - 08:07:43 - Nine podcasts up from AusCERT 2012. Check them out here: http://t.co/PWbFE0pc Subscribe to RB2 feed here: http://t.co/Ovu2GYVr[2012-05-16] - 18:15:35 - Packing up my gear this afternoon and driving up to AusCERT. This year's coverage sponsored by Sophos, Datacom TSS and Arbor Networks. Tks![2012-05-16] - 18:15:35 - I've put up three podcasts from AusCERT... should get another three up today... http://t.co/PWbFE0pc
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|
|
|
|
|