Quantcast
Channel: Positive Technologies - learn and secure
Browsing all 198 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

Pegasus: analysis of network behavior

Source code for Pegasus, a banking Trojan, was recently published online. Although the Carbanak cybercrime gang was referenced in the archive name, researchers at Minerva Labs have shown that Pegasus...

View Article


Image may be NSFW.
Clik here to view.

Low-level Hacking NCR ATM

Image credit: Sascha Kohlmann, CC BY-SA 2.0Many of the systems that power the modern world are supposed to be beyond the reach of mere mortals. Developers naively assume that these systems will never...

View Article


Image may be NSFW.
Clik here to view.

Machine learning: good for security or a new threat?

Machine learning is no novelty anymore. On the contrary: every self-respecting startup feels compelled to apply machine learning in its offerings. The hunt for scarce developers has been superseded by...

View Article

Image may be NSFW.
Clik here to view.

Positive Technologies researcher finds vulnerability enabling disclosure of...

Image credit: UnsplashIntel has issued a patch in response to a serious vulnerability in Intel ME firmware discovered by Positive Technologies expert Dmitry Sklyarov. The vulnerability involved...

View Article

Image may be NSFW.
Clik here to view.

How we developed the NIOS II processor module for IDA Pro

IDA Pro UIIDA Pro has a well-earned place in the toolkit of security researchers worldwide. We at Positive Technologies are no exception. In fact, we like it so much that we developed a disassembler...

View Article


Image may be NSFW.
Clik here to view.

Intel ME Manufacturing Mode: obscured dangers and their relationship to Apple...

The weakness of "security through obscurity" is so well known as to be obvious. Yet major hardware manufacturers, citing the need to protect intellectual property, often require a non-disclosure...

View Article

Image may be NSFW.
Clik here to view.

How STACKLEAK improves Linux kernel security

STACKLEAK is a Linux kernel security feature initially developed by Grsecurity/PaX. I'm working on introducing STACKLEAK into the Linux kernel mainline. This article describes the inner workings of...

View Article

Image may be NSFW.
Clik here to view.

Advanced attacks on Microsoft Active Directory: detection and mitigation

Attacks on Microsoft Active Directory have been a recurrent topic of reports on Black Hat and Defcon during the last four years. Speakers tell about new vectors, share their inventions, and give...

View Article


Image may be NSFW.
Clik here to view.

Modernizing IDA Pro: how to make processor module glitches go away

Hi there,This is my latest article on a topic near and dear to my heart: making IDA Pro more modern and, well, better.Those familiar with IDA Pro probably know that feeling: there are glitches in the...

View Article


Image may be NSFW.
Clik here to view.

What We Have Learned About Intel ME Security In Recent Years: 7 Facts About...

Image: UnsplashIntel ME has captured the attention of researchers during the last years. There is an air of mystery about the technology. Although it has access to virtually all the data on the...

View Article

Image may be NSFW.
Clik here to view.

How to Protect Yourself When Shopping Online

Image credit: PexelsOnline shopping safety is a pressing issue for both consumers and business users, especially in the holiday season. As customers flock to online stores to cross off their Christmas...

View Article

Remarkable talks from 35C3

The 35th Chaos Communication Congress was held at the end of December 2018 in Leipzig, Germany. I have attended a lot of interesting lectures. In this article I'll share the list of great technical...

View Article

Image may be NSFW.
Clik here to view.

The Cost Of Security And Privacy For Telcos: How To Do The Math

Image credit: PexelsJoin Positive Technologies’ telecoms expert Michael Downs for a thought-provoking webinar on the processes and best practices all operators should be following to ensure their...

View Article


Image may be NSFW.
Clik here to view.

Detecting Web Attacks with a Seq2Seq Autoencoder

Attack detection has been a part of information security for decades. The first known intrusion detection system (IDS) implementations date back to the early 1980s.Nowadays, an entire attack detection...

View Article

Image may be NSFW.
Clik here to view.

How Not To Help Hackers: 4 Common Security Mistakes Of Office Workers

Image credit: UnsplashMore and more often cybercriminals target office staff, knowing full well that people are the weakest link in the corporate protection systems. Today we'll discuss mistakes in...

View Article


Image may be NSFW.
Clik here to view.

Protecting Money On The Internet. Five Tips To Secure Your Online Transactions

Image credit: UnsplashAccording to Positive Technologies research data, security of financial applications keeps growing. Banks make serious investments into improving security of their products. In...

View Article

Image may be NSFW.
Clik here to view.

DHCP security in Windows 10: analyzing critical vulnerability CVE-2019-0726

Image credit: PexelsWhen January updates for Windows got released, the public was alarmed by news of critical vulnerability CVE-2019-0547 in DHCP clients. A high CVSS score and the fact that Microsoft...

View Article


Image may be NSFW.
Clik here to view.

How analyzing one critical DHCP vulnerability in Windows 10 led to discovery...

Image credit: Unsplash As described in our earlier article about CVE-2019-0726, sometimes a search for details of a known vulnerability leads to discovery of a new one. Sometimes even more than one.The...

View Article

Image may be NSFW.
Clik here to view.

Four ways to phish: how to avoid falling for scammers' bait

Phishing is one of the main cybersecurity threats targeting Internet users. Today we will describe how these attacks work and how not to become a victim.Emails from trusted companiesAttackers often...

View Article

Image may be NSFW.
Clik here to view.

IDS Bypass contest at PHDays: writeup and solutions

Positive Hack Days 2019 included our first-ever IDS Bypass competition. Participants had to study a network segment of five hosts, and then either exploit a service vulnerability or meet a particular...

View Article
Browsing all 198 articles
Browse latest View live