Security News
2014.10.16
1 11
Borys Łącki b.lacki@logicaltrust.net
http://www.networkworld.com/article/2686187/microsoft-subnet/doj-wants-to-give-the-fbi-permission-to-hack-into-pcs-of-tor-and-vpn-users.html
2 11
3 11
http://gadgets.ndtv.com/apps/news/dropbox-apologises-for-selective-sync-bug-that-deleted-data-for-some-users-606161
http://www.theatlantic.com/business/archive/2014/10/why-the-jp-morgan-data-breach-is-like-no-other/381098/
4 11
http://zaufanatrzeciastrona.pl/post/krytyczna-luka-w-windows-uzywana-w-atakach-przez-rosyjskich-szpiegow/
5 11
http://www.youtube.com/watch?v=QZvdPM_h2o8
http://www.youtube.com/watch?v=QZvdPM_h2o8
6 11
https://srlabs.de/badusb
7 11
https://shellshocker.net/
8 11
http://poodlebleed.com/
9 11
10 11
Kontakt
Borys Łącki b.lacki@logicaltrust.net
11 11

More Related Content

PDF
Web and browser evolution
PDF
Firefox 4 & web
PPT
Hacking The World With Flash
PPTX
Browsers
PDF
Security news vol. 1 - 20140918 - Risk & Technology Wrocław Group
PDF
APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...
PDF
Advanced persistent threat (APT) - Twoja lista obronna
PDF
Security news vol. 6 - 20150528 - Risk & Technology Wrocław Group
Web and browser evolution
Firefox 4 & web
Hacking The World With Flash
Browsers
Security news vol. 1 - 20140918 - Risk & Technology Wrocław Group
APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...
Advanced persistent threat (APT) - Twoja lista obronna
Security news vol. 6 - 20150528 - Risk & Technology Wrocław Group

Viewers also liked (9)

PDF
Security news vol. 5 - 20150423 - Risk & Technology Wrocław Group
PDF
Cyberprzestepcy - Jak się bronić?
PDF
Ile kosztuje atak DDoS?
PDF
APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...
PDF
W każdym programie jest jeszcze jeden błąd... [SecurityBSides Warsaw 2014]
PDF
Testy bezpieczeństwa aplikacji WWW – dobre praktyki
PDF
Security news 20151119
PDF
Darmowe narzędzia wspomagające proces zabezpieczania Twojej firmy.
PDF
Pentester - fakty i mity
Security news vol. 5 - 20150423 - Risk & Technology Wrocław Group
Cyberprzestepcy - Jak się bronić?
Ile kosztuje atak DDoS?
APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...
W każdym programie jest jeszcze jeden błąd... [SecurityBSides Warsaw 2014]
Testy bezpieczeństwa aplikacji WWW – dobre praktyki
Security news 20151119
Darmowe narzędzia wspomagające proces zabezpieczania Twojej firmy.
Pentester - fakty i mity
Ad

Similar to Security news vol. 2 - 20141016 - Risk & Technology Wrocław Group (20)

PDF
Pwned in high ed
PPTX
News bytes Oct-2011
DOCX
A1 Games industry
PDF
PacNOG 27: Internet 101 — How secure are you?
PPTX
CSCI 3520 article
PDF
How Endpoint Mobility Kills Bare Metal Restore (infographic)
PPTX
de:code エスキュービズム勉強会0620
PPTX
SPTechCon SFO 2014 - Creating a Great User Experience in SharePoint
PPTX
SPTechCon Austin 2016 - Creating a Great User Experience in SharePoint
PPTX
SPTechCon Austin 2015 - Creating a Great User Experience in SharePoint
PPTX
SharePoint Tech Fest Houston 2015 - Creating a Great User Experience in Share...
PPTX
Creating a Great User Experience in SharePoint
PPTX
October 2017 Ivanti Patch Tuesday Analysis
PDF
[Azure Council Experts (ACE) 第14回定例会] Microsoft Azureアップデート情報 (2015/10/22-201...
PPTX
Exploring web apps with Fiddler and Chrome Dev Tools
PDF
Operations Security - SF Bitcoin Hackday March 2015
PDF
Microwind: main features are layout and FinFET
PDF
Secuirty News Bytes-Bangalore may 2014
PDF
Cyber Security Workshop @SPIT- 3rd October 2015
PDF
Mengenal Fitur Keamanan Dasar pada Windows 7
Pwned in high ed
News bytes Oct-2011
A1 Games industry
PacNOG 27: Internet 101 — How secure are you?
CSCI 3520 article
How Endpoint Mobility Kills Bare Metal Restore (infographic)
de:code エスキュービズム勉強会0620
SPTechCon SFO 2014 - Creating a Great User Experience in SharePoint
SPTechCon Austin 2016 - Creating a Great User Experience in SharePoint
SPTechCon Austin 2015 - Creating a Great User Experience in SharePoint
SharePoint Tech Fest Houston 2015 - Creating a Great User Experience in Share...
Creating a Great User Experience in SharePoint
October 2017 Ivanti Patch Tuesday Analysis
[Azure Council Experts (ACE) 第14回定例会] Microsoft Azureアップデート情報 (2015/10/22-201...
Exploring web apps with Fiddler and Chrome Dev Tools
Operations Security - SF Bitcoin Hackday March 2015
Microwind: main features are layout and FinFET
Secuirty News Bytes-Bangalore may 2014
Cyber Security Workshop @SPIT- 3rd October 2015
Mengenal Fitur Keamanan Dasar pada Windows 7
Ad

More from Logicaltrust pl (20)

PDF
Czy szczoteczka do zębów to wektor ataku?
PDF
Podsumowanie ze 100 pentestów - na co zwrócić uwagę.
PDF
Podsumowanie z 200 pentestow - na co zwrócić uwagę.
PDF
Certyfikaty: CRTP / CRTO - Testy z CobaltStrike czy jednak bez? Przygotowanie...
PDF
Redteaming na zapleczu sklepu - opis testów penetracyjnych wraz z testami bez...
PDF
Dzień z życia pentestera - proces oraz narzędzia do testów penetracyjnych
PDF
Jak cyberprzęstepcy okradają dziś firmy - webinar 2020.06.24
PDF
Security Awareness po polsku - webinar 2019.11.29
PDF
8 zasad skutecznego security awareness
PDF
Ataki socjotechniczne w praktyce - SecurityBSides Warsaw 2019
PDF
Ataki socjotechniczne w praktyce - Confidence 2019
PDF
Minerva_lib - fuzzing tool
PDF
"Spear phishing - jak się bronić? Case studies." - SecurityBSides 2018
PDF
Spear phishing - jak się bronić? Case studies - Confidence 2018
PDF
Redteaming in Poland - test cases (Security)
PDF
Redteaming w Polsce - przykłady
PDF
Testy bezpieczeństwa - niesztampowe przypadki
PDF
Krytyczne błędy konfiguracji
PDF
Urządzenia i usługi bezpieczeństwa IT - pełna ochrona czy... zaproszenie dla ...
PDF
Devops/Sysops security
Czy szczoteczka do zębów to wektor ataku?
Podsumowanie ze 100 pentestów - na co zwrócić uwagę.
Podsumowanie z 200 pentestow - na co zwrócić uwagę.
Certyfikaty: CRTP / CRTO - Testy z CobaltStrike czy jednak bez? Przygotowanie...
Redteaming na zapleczu sklepu - opis testów penetracyjnych wraz z testami bez...
Dzień z życia pentestera - proces oraz narzędzia do testów penetracyjnych
Jak cyberprzęstepcy okradają dziś firmy - webinar 2020.06.24
Security Awareness po polsku - webinar 2019.11.29
8 zasad skutecznego security awareness
Ataki socjotechniczne w praktyce - SecurityBSides Warsaw 2019
Ataki socjotechniczne w praktyce - Confidence 2019
Minerva_lib - fuzzing tool
"Spear phishing - jak się bronić? Case studies." - SecurityBSides 2018
Spear phishing - jak się bronić? Case studies - Confidence 2018
Redteaming in Poland - test cases (Security)
Redteaming w Polsce - przykłady
Testy bezpieczeństwa - niesztampowe przypadki
Krytyczne błędy konfiguracji
Urządzenia i usługi bezpieczeństwa IT - pełna ochrona czy... zaproszenie dla ...
Devops/Sysops security

Recently uploaded (20)

PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
PDF
Altius execution marketplace concept.pdf
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
Introduction to MCP and A2A Protocols: Enabling Agent Communication
LMS bot: enhanced learning management systems for improved student learning e...
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Module 1 Introduction to Web Programming .pptx
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
Lung cancer patients survival prediction using outlier detection and optimize...
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
Altius execution marketplace concept.pdf
Connector Corner: Transform Unstructured Documents with Agentic Automation
NewMind AI Weekly Chronicles – August ’25 Week IV
Data Virtualization in Action: Scaling APIs and Apps with FME
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
Rapid Prototyping: A lecture on prototyping techniques for interface design
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
Electrocardiogram sequences data analytics and classification using unsupervi...
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf