Kali Linux: how to install and use the distro for ethical hacking

Kali Linux: how to install and use the distro for ethical hacking

Kali Linux is a distribution based on Debian and specially designed for computer security audits. Developed by Offensive Security, it incorporates a wide catalog of tools to carry out computer forensics, penetration and reverse engineering testing… It can be truly useful for professionals in charge of IT security in an organization, administrators and network architects, security auditors, or anyone interested in learning about how to discover and even exploit vulnerabilities.

Nearly 9 million cyber threats related to Covid-19 in 6 months

Nearly 9 million cyber threats related to Covid-19 in 6 months

During the first half of this year 2020, the security firm Trend Micro blocked 8.8 million cyber threats that took advantage of Covid-19 to infect computers. Spam through email was the main way used to carry out different types of fraud, accounting for almost 92% of the total.

This data comes from the report for the first six months of the year published by Trend Micro, which shows how cybercriminals changed their strategies since the beginning of the year to take advantage of the interest aroused by the pandemic around the world.

Lockdown security module bypass on Linux

Lockdown security module bypass on Linux

The Lockdown security module introduced in Linux 5.4 to lock certain parts of the kernel seems not to be as effective as expected. A developer has managed to skip this protection on Ubuntu 18.04 and break Secure Boot. To do this, he has used ACPI tables, the standard that controls the operation of the BIOS and provides advanced functionalities to manage and save energy.

Covid-19 related phishing campaigns increase 30%

Covid-19 related phishing campaigns increase 30%

The security firm Check Point warns of a significant increase in the number of cyber-attacks that take advantage of the search for information about the Covid-19 to infect more and more users. During the last three weeks, there have been 30% more threats, specifically about 192,000 weekly. 17% of the newly registered domains related to Coronavirus are malicious or suspicious and new phishing campaigns have been discovered that impersonate the World Health Organization (WHO) and popular video conferencing platforms to steal sensitive information.

Telecommuting and IT security in the days of Covid-19

Telecommuting and IT security in the days of Covid-19

The current health crisis, due to the expansion of Covid-19, is responsible for the rise of remote work. The Governments of the affected territories recommend it, and even impose it, and companies are quick to seek a fast solution so that their staff can continue to carry out their work from home.

In a matter of days, teleworking has gone from being a minority practice to becoming the only formula for employees that due to the characteristics of their job can adopt it and keep on working.

Google open sources tools to create security keys

Google open sources tools to create security keys

Companies and users are increasingly aware of the need to be extremely cautious when surfing the Internet and to properly protect their connected devices. The FIDO security keys are a way to provide extra protection against practices such as phishing. These are physical devices with an appearance similar to USB that users can connect to their terminals and are responsible for carrying out the double factor authentication (2FA).

With the aim of improving this technology and accelerating its adoption, Google has launched OpenSK, an Open Source project so that any organization or developer can create their own security keys compatible with FIDO U2F and FIDO2.

Skip to content