Publications, études, rapports 2012 S15

=> Cookies publicitaires : l’UFMD publie son guide des bonnes pratiques. 10/04/2012. «L’UFMD a présenté un guide des bonnes pratiques des cookies publicitaires. Un guide qui veut apporter un peu de transparence sur un sujet susceptible de bouleverser une économie qui pèse plus de 70 milliards d’euros (…).»
Source : www.journaldunet.com/ebusiness/le-net/cookies-publicitaires-guide-ufmd-0412.shtml
Billets en relation :
10/04/2012. Best practices regarding the fair use of advertising cookies : www.ufmd.org/file/122296/
10/04/2012. Guide de bonnes pratiques concernant l’usage des cookies publicitaires : www.ufmd.org/file/122295/

=> Tor – March 2012 Progress Report. 10/04/2012. «Ur progress report for March 2012 is now available. Highlights include lots and lots of metrics work, bridge infrastructure work, new tor alpha release, support queue stats, and some press and speaking slots (…).»
Source : blog.torproject.org/blog/march-2012-progress-report

=> Slides – ARCSI 2012. 10/04/2012. «La SSI au cœeur de l’I.E. (…).» ‘présentations’ de cet évènement.
Source : www.arcsi.fr/actes_collq_120323.html

=> Financial Services Firms Hit by DDoS Attacks According to Prolexic’s Q1 2012 Report . 11/04/2012. «Prolexic Technologies, the global leader in Distributed Denial of Service (DDoS) protection services, today announced that financial services firms were in the cross hairs of attackers during Q1 2012. This is one of a number of key findings contained in the company’s
Quarterly Global DDoS Attack Report , which was released today (…).
»
Source : www.prolexic.com/company/news-events/financial-services-firms-hit-by-ddos-attacks/index.html

=> Technical paper: The ZeroAccess rootkit under the microscope. 11/04/2012. «ZeroAccess is a sophisticated kernel-mode rootkit that is quickly becoming one of the most widespread malware threats. In a new technical paper from SophosLabs, malware researcher James Wyke explores the ZeroAccess threat, examines how it works and looks at what the malware’s ultimate goal is (…).»
Source : nakedsecurity.sophos.com/2012/04/11/technical-paper-the-zeroaccess-rootkit-under-the-microscope/
Billets en relation :
11/04/2012. ZeroAccess technical paper [pdf] : sophosnews.files.wordpress.com/2012/04/zeroaccess.pdf

=> Hack in the Box Magazine #8 available now. 11/04/2012. «Every one or two quarters, there’s the one day we all wait for – and that’s when the latest issue of the Hack in the Box Magazine is released (…).»
Source : j00ru.vexillium.org/?p=1076
Billets en relation :
11/04/2012. HITB-Ezine-Issue-008 [pdf] : magazine.hitb.org/issues/HITB-Ezine-Issue-008.pdf
15/04/2012. Exploit Distribution Mechanism in BEPs – HITB : secniche.blogspot.fr/2012/04/exploit-distribution-mechanism-in-beps.html

=> CanSecWest 2012 Files. 12/04/2012. «CanSecWest 2012 Files/slides (…).»
Source : cansecwest.com/csw12archive.html

=> A Survey of Obfuscations in Prevalent Packer Tools by Kevin Roundy (march 2012 – slides) [pdf]. 12/04/2012. «A Survey of Obfuscations in Prevalent Packer Tools by Kevin Roundy (march 2012 – slides) [pdf] (…).»
Source : www.dyninst.org/sites/default/files/downloads/w2012/roundy-obfuscations.pdf
Billets en relation :
12/04/2012. Source : twitter.com/#!/2gg/statuses/189846271564062721

=> Document from #Syria gov detailing all specs of their #Internet backbone,incl. monitoring systems [PDF]. 13/04/2012. «Document from #Syria gov detailing all specs of their #Internet backbone,incl. monitoring systems [PDF] (…).»
Source : files.piratenpartei.de/presse/bidinvitation.pdf

=> « Hacking the NFC credit cards for fun and debit ;) » presentation slides – HES2012 – Renaud Lifchitz. 13/04/2012. «MasterCard and Visa are currently releasing new contactless credits cards worldwide. Payments can become faster, simpler and easier but are they becoming more secure? We have worked on such cards and found nearly no security. Partial card cloning and unsollicited payments are possible (…).»
Source : readnfccc.googlecode.com/files/hes2012-bt-contactless-payments-insecurity.pdf

=> PE101 – a windows executable walkthrough [pdf]. 14/04/2012. «A first draft of my latest work « PE101 – a windows executable walkthrough » http://xchg.info/corkami/pe101-draft1.pdf what do you think, guys? (…).»
Source : xchg.info/corkami/pe101-draft1.pdf
Billets en relation :
14/04/2012. Source : twitter.com/#!/Ivanlef0u/statuses/191297347177820160

=> Phrack – #68. 14/04/2012. «PHRACK ISSUES (…).»
Source : www.phrack.org/issues.html?issue=68

Vous pourriez aussi aimer...

Une réponse

  1. Gof dit :

    Qui a échappé à la brève, je le rajoute en commentaire :

    Disrupting Cybercrime via Hosts and ISPs : Timely events provide the backdrop to the latest HostExploit’s Top 50 Bad Host and Networks report for Q1 2012. Recent disruptions of cybercriminal operations – the result of cross-industry and international cooperation – show signs of a new willingness to target supporting infrastructures as the enablers of cybercriminal operations.
    => http://hostexploit.com/blog/14-reports/3537-disrupting-cybercrime-via-hosts-and-isps.html

Laisser un commentaire

Votre adresse de messagerie ne sera pas publiée. Les champs obligatoires sont indiqués avec *

Vous pouvez utiliser ces balises et attributs HTML : <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

Notifiez-moi les commentaires à venir via email. Vous pouvez aussi vous abonner sans commenter.