1. IT-Security >
  2. Hacking >
  3. Data science hacking und das Leben der anderen

ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

Data science hacking und das Leben der anderen


Hacking vom | Direktlink: google.com Nachrichten Bewertung

Data science hacking und das Leben der anderen. 30. Juni 2020, 09:36. Andreas Eicher [Redaktion RiskNET]. Risiken einer ......

Externe Webseite mit kompletten Inhalt öffnen



https://www.google.com/url?rct=j&sa=t&url=https://www.risknet.de/themen/risknews/data-science-hacking-und-das-leben-der-anderen/&ct=ga&cd=CAIyGTgyODM0YzdkZTQ5NDM0MGE6ZGU6ZGU6REU&usg=AFQjCNG-3acr_FI_VQ6XprLuHpmBmCUj6A

Team Security Social Media

➤ Weitere Beiträge von Team Security | IT Sicherheit

  • Diving Deep Into a Pwn2Own Winning WebKit Bug

    vom 358.12 Punkte ic_school_black_18dp
    Pwn2Own Tokyo just completed, and it got me thinking about a WebKit bug used by the team of Fluoroacetate (Amat Cama and Richard Zhu) at this year’s Pwn2Own in Vancouver. It was a part of the chain that earned them $55,000 and was a nifty piece of
  • CVE-2020-0932: Remote Code Execution on Microsoft SharePoint Using TypeConverters

    vom 282.34 Punkte ic_school_black_18dp
    In April 2020, Microsoft released four Critical and two Important-rated patches to fix remote code execution bugs in Microsoft SharePoint. All these are deserialization bugs. Two came through the ZDI program from an anonymous researcher: CVE-2020-0931
  • CVE-2020-0729: Remote Code Execution Through .LNK Files

    vom 234.67 Punkte ic_school_black_18dp
    In this excerpt of a Trend Micro Vulnerability Research Service vulnerability report, John Simpson and Pengsu Cheng of the Trend Micro Research Team detail a recent remote code execution bug in Microsoft Windows .LNK files. The following is a portion of
  • ConstraintLayout 2.0.0 beta 7

    vom 216.34 Punkte ic_school_black_18dp
    We are happy to announce the release of ConstraintLayout 2.0 beta 7. It’s available from the google maven repository:dependencies {    implementation 'androidx.constraintlayout:constraintlayout:2.0.0-beta7'}or if using the android.support packages:dependencies {    implementation 'com.android.support.constraint:constraint
  • Deobfuscating/REversing Remcos - AutoIt, Shellcode, and RunPE

    vom 195.56 Punkte ic_school_black_18dp
    Remcos is a robust RAT actively being used in the wild. This multi-staged/evasive RAT provides powerful functionality to an attacker. Each stage is written in a different language: AutoIt -> Shellcode -> C++. I wanted to explore both the evasiven
  • ConstraintLayout 2.0.0 beta 2

    vom 193.11 Punkte ic_school_black_18dp
    We are happy to announce the release of ConstraintLayout 2.0 beta 2. It’s available from the google maven repository: dependencies {    implementation 'com.android.support.constraint:constraint-layout:2.0.0-beta2'} or if using the AndroidX packages: dependencies {    implementation 'androidx.con
  • ConstraintLayout 2.0.0 beta 5

    vom 183.34 Punkte ic_school_black_18dp
    We are happy to announce the release of ConstraintLayout 2.0 beta 5. It’s available from the google maven repository:dependencies {    implementation 'androidx.constraintlayout:constraintlayout:2.0.0-beta5'}or if using the android.support packages:dependencies {    implementation 'com.android.support.constraint:constraint
  • MindShaRE: Hardware Reversing with the TP-Link TL-WR841N Router

    vom 177.22 Punkte ic_school_black_18dp
    In early 2019, we received a bug submission from a new researcher affecting the TP-Link TL-WR841N Router. While this vulnerability is still in disclosure phase, we would like to share lessons learned when we were vetting this submission. TL-WR841N
  • ANDRAX - The First And Unique Penetration Testing Platform For Android Smartphones

    vom 175.12 Punkte ic_school_black_18dp
    ANDRAX The first and unique Penetration Testing platform for Android smartphones What is ANDRAX ANDRAX is a penetration testing platform developed specifically for Android smartphones, ANDRAX has the ability to run natively on Android so it behaves
  • ANDRAX v3 - The First And Unique Penetration Testing Platform For Android Smartphones

    vom 175.12 Punkte ic_school_black_18dp
    ANDRAX The first and unique Penetration Testing platform for Android smartphones.Thanks to Jessica Helena she made ANDRAX v3 possible. What is ANDRAX ANDRAX is a penetration testing platform developed specifically for Android smartphones, ANDRAX has
  • Local Privilege Escalation in Win32k.sys Through Indexed Color Palettes

    vom 168.67 Punkte ic_school_black_18dp
    This is the second in our series of Top 5 interesting cases from 2019. Each of these bugs has some element that sets them apart from the more than 1,000 advisories released by the program this year. Today’s blog looks a local privilege escalation in t
  • ConstraintLayout 2.0.0 beta 4

    vom 152.78 Punkte ic_school_black_18dp
    We are happy to announce the release of ConstraintLayout 2.0 beta 4. It’s available from the google maven repository:dependencies {    implementation 'androidx.constraintlayout:constraintlayout:2.0.0-beta4'}or if using the android.support packages:dependencies {    implementation 'com.android.support.constraint:constraint

Team Security Diskussion über Data science hacking und das Leben der anderen