Jump to content

Search the Community

Showing results for tags 'report'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Informatii generale
    • Anunturi importante
    • Bine ai venit
    • Proiecte RST
  • Sectiunea tehnica
    • Exploituri
    • Challenges (CTF)
    • Bug Bounty
    • Programare
    • Securitate web
    • Reverse engineering & exploit development
    • Mobile security
    • Sisteme de operare si discutii hardware
    • Electronica
    • Wireless Pentesting
    • Black SEO & monetizare
  • Tutoriale
    • Tutoriale in romana
    • Tutoriale in engleza
    • Tutoriale video
  • Programe
    • Programe hacking
    • Programe securitate
    • Programe utile
    • Free stuff
  • Discutii generale
    • RST Market
    • Off-topic
    • Discutii incepatori
    • Stiri securitate
    • Linkuri
    • Cosul de gunoi
  • Club Test's Topics
  • Clubul saraciei absolute's Topics
  • Chernobyl Hackers's Topics
  • Programming & Fun's Jokes / Funny pictures (programming related!)
  • Programming & Fun's Programming
  • Programming & Fun's Programming challenges
  • Bani pă net's Topics
  • Cumparaturi online's Topics
  • Web Development's Forum
  • 3D Print's Topics

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Yahoo


Jabber


Skype


Location


Interests


Biography


Location


Interests


Occupation

Found 17 results

  1. Am nevoie de un asemenea program...Lucrez pe PPI-uri si mi se fura nisele pe YouTube...Mi-a picat un video cu aproape 150k view ( a doua zi l-a urcat cineva cu aceiasi descriere + titlu )
  2. VirusTotal Scan Results Report retrieved: 12. 5. 2015; 12:55 +2, Report Date: 2015-05-07 21:28:57 MicroWorld-eScan 12.0.250.0: nProtect 2015-05-07.01: CMC 1.1.0.977: CAT-QuickHeal 14.00: McAfee 6.0.5.614: Malwarebytes 2.1.1.1115: Zillya 2.0.0.2172: AegisLab 1.5: K7AntiVirus 9.203.15838: Alibaba 1.0: K7GW 9.203.15841: TheHacker 6.8.0.5.563: Agnitum 5.5.1.3: F-Prot 4.7.1.166: Symantec 20141.2.0.56: WS.Reputation.1 Norman 7.04.04: TotalDefense 37.1.62.1: TrendMicro-HouseCall 9.700.0.1001: Avast 8.0.1489.320: ClamAV 0.98.5.0: Kaspersky 15.0.1.10: BitDefende
  3. KhiZaRix

    AV SCAN

    Log In Îmi place ca po?i scana mai multe în paralel , ?i nu le d? report la nenoroci?i
  4. VirusTotal Scan Results Report retrieved: 12. 5. 2015; 12:10 +2, Report Date: 2015-03-27 16:19:43 MicroWorld-eScan 12.0.250.0: nProtect 2015-03-27.01: CMC 1.1.0.977: CAT-QuickHeal 14.00: McAfee 6.0.5.614: Malwarebytes 1.75.0.1: VIPRE 38822: SUPERAntiSpyware 5.6.0.1032: TheHacker 6.8.0.5.540: BitDefender 7.2: K7GW 9.202.15403: K7AntiVirus 9.202.15405: Agnitum 5.5.1.3: F-Prot 4.7.1.166: Symantec 20141.2.0.56: Norman 7.04.04: TotalDefense 37.0.11517: TrendMicro-HouseCall 9.700.0.1001: Avast 8.0.1489.320: ClamAV 0.98.5.0: Kaspersky 15.0.1.10: Alibaba 1.0:
  5. VirusTotal Scan Results Report retrieved: 12. 5. 2015; 11:24 +2, Report Date: 2012-09-24 10:48:43 CAT-QuickHeal 12.00: McAfee 5.400.0.1158: TheHacker None: K7AntiVirus 9.152.7632: F-Prot 4.6.5.141: Symantec 20121.2.1.2: Norman 6.08.06: TotalDefense 37.0.10086: TrendMicro-HouseCall 9.700.0.1001: Avast 6.0.1289.0: eSafe 7.0.17.0: ClamAV 0.97.3.0: Kaspersky 9.0.0.837: BitDefender 7.2: Agnitum 5.5.1.3: ViRobot 2011.4.7.4223: ByteHero 1.0.0.1: Sophos 4.81.0: Comodo 13641: F-Secure 9.0.16440.0: DrWeb 7.0.3.07130: VIPRE 13208: AntiVir 7.11.44.4: TrendMicr
  6. VirusTotal Scan Results Report retrieved: 12. 5. 2015; 11:18 +2, Report Date: 2015-04-30 22:33:39 MicroWorld-eScan 12.0.250.0: nProtect 2015-04-30.01: CMC 1.1.0.977: CAT-QuickHeal 14.00: McAfee 6.0.5.614: Zillya 2.0.0.2162: SUPERAntiSpyware 5.6.0.1032: K7AntiVirus 9.203.15767: Alibaba 1.0: K7GW 9.203.15767: TheHacker 6.8.0.5.559: NANO-Antivirus 0.30.24.1357: F-Prot 4.7.1.166: Symantec 20141.2.0.56: WS.Reputation.1 Norman 7.04.04: TotalDefense 37.1.62.1: TrendMicro-HouseCall 9.700.0.1001: Avast 8.0.1489.320: ClamAV 0.98.5.0: Kaspersky 15.0.1.10: BitDefende
  7. Cyber-attacks against critical infrastructure companies have long since moved out of the realm of science fiction and into reality, and a new report from Trend Micro and the Organization of the American States (OAS) shows just how much. In a new survey, the challenges those organizations are facing today are laid bare. Forty percent of 575 security leaders polled said they had dealt with attempts to shut down their computer networks. Forty-four percent said they had faced attempts by attackers to delete files, while 60 percent have had attackers try to steal their information. Perhaps even mor
  8. Snapchat, the social network known for its disappearing messages, released its first transparency report Thursday showing hundreds of requests from US and foreign law enforcement agencies. Between November 1 and February 28, Snapchat said it received 375 requests from US law enforcement officials, and produced at least some data in 92 percent of those cases. "While the vast majority of Snapchatters use Snapchat for fun, it's important that law enforcement is able to investigate illegal activity," Snapchat said in a blog post. "We want to be clear that we comply with valid legal requests." The
  9. Facebook is in violation of EU data laws owing to its overly complex privacy policies and persistent tracking of users, even if they have opted out of such systems. This was the key claim in a report by researchers at the University of Leuven and the Free University of Brussels on behalf of the Belgian Privacy Commission. “Our analysis indicates [that] Facebook is acting in violation of European law,” the report said. Specifically, the researchers are concerned that almost all data tracking and monitoring done by Facebook, such as for advertising purposes or gathering location data, is done wi
  10. A new report prepared by the United States Department of Justice’s internal watchdog has revealed that two major federal law enforcement agencies have spent millions of dollars on 23 drones that for some reason, are not operational. The report, which was published on Wednesday by the DOJ’s Office of the Inspector General, also concludes that the FBI is the “only DOJ component that operationally deploys its own UAS,” using the government acronym for Unmanned Aerial System, or drone. The DOJ OIG report comes less than three months after the Department of Homeland Security OIG concluded that afte
  11. Intel sharing used as stick, Vice Chancellor says The US Government threatened to starve Berlin of intelligence if it harboured fugitive document-leaker Edward Snowden, German Vice Chancellor Sigmar Gabriel says. The National Security Agency (NSA) leaker considered Germany as a place of refuge after he fled to Russia from the United States via Hong Kong in 2013. Moscow granted Snowden a three-year residency permit in the country, which expires in August 2017. At that date Snowden will need to apply for citizenship or move elsewhere. In a speech given this week in Hamburg Gabriel said Washingt
  12. US industrial control systems were hit by cyber attacks at least 245 times over a 12-month period, the US Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) has revealed. The figure was included in a report by the ICS-CERT, which operates within the National Cybersecurity and Integration Center, itself a part of the Department of Homeland Security. The report is classed as covering the 2014 fiscal year which, under US government dates, was between 1 October 2013 and 30 September 2014. “ICS-CERT received and responded to 245 incidents reported by asset owners and industry partn
  13. A ban on online anonymity networks would be "technologically infeasible" and unwise, MPs have been told. Parliamentary advisers said networks such as Tor could be used for criminal ends but also in the public interest. The advice for MPs contradicted the Prime Minister David Cameron, who has said law enforcement should be handed the keys to encrypted communications. One expert said the document showed Mr Cameron's plans to be "noble", but ultimately unworkable. The Parliamentary Office of Science and Technology (Post), which issues advice to MPs, said that there was "widespread agreement that
  14. Twitter has revised and simplified its rules and process for reporting abusive behavior on the service, and users now have the ability to report people who are posting their personal information. The change essentially gives Twitter users a method to combat doxing, which is the process of dumping a victim’s personal information online. This often is done as a form of revenge or to embarrass someone. Doxing used to be done in forums or on underground sites, but Twitter has made it possible to broadcast the information to a much larger audience more quickly. Twitter officials are well aware of t
  15. Am cautat pe forum si nu l-am gasit postat asa ca am zis sa-l postez ( bine inteles pentru cei interesati ) Adversaries are committed to continually rening or developing new techniques that can evade detection and hide malicious activity. Meanwhile, the defenders—namely, security teams—must constantly improve their approach to protecting the organization and users from these increasingly sophisticated campaigns. Caught in the middle are the users. But now, it appears they not only are the targets, but also the complicit enablers of attacks. The Cisco 2015 Annual Security Report, which presents
  16. Email servers still compromised after THREE months An attack against US State Department servers is still ongoing three months after the agency spotted miscreants inside its email system, it's reported. In November the State Department was forced to suspend its unclassified email systems after it was successfully infiltrated by hackers unknown. At the time the agency said its classified emails were unaffected by the hack. Now Bloomberg and the Wall Street Journal report multiple sources saying that the attack is still ongoing: the bad guys and girls still have remote access to internal comput
  17. Hacktivists and gamers are becoming big users of net attacks that knock sites offline by bombarding them with data, suggests a report. Compiled by Arbor Networks, the report looks at 10 years of distributed denial of service (DDoS) attacks. The ease with which they could be staged had made them a favourite for groups with a grudge, said Arbor. Also, it said, insecure home routers were being enrolled into large groups of devices that mounted the attacks. Extortion attempt In the early days of DDoS, cybercrime gangs had used them to extort cash from websites run by betting and gambling firms tha
×
×
  • Create New...