Gehe zum Inhalt

FGR*

Full screen

FGR* Blog

April 3, 2011 21:00 , von Unbekannt - | No one following this article yet.

The Walking Dead: Michonne Episode 2 "Give No Shelter" Review GamersFTW

March 30, 2016 9:08, von FGR* Blog


Give No Shelter is a fantastic episode that more than makes up for the series’ disappointing premiere and sets things up nicely for next month’s finale. It’s got a great opening section, some of the most intense scenes ever delivered by Telltale, and a bunch of twists and turns to keep things interesting. If you’ve played the first episode and you’re not sure about wanting to give the series a second chance, I implore you to try this one and see for yourself why Telltale is one of the best storytellers in the business

(Android, iPad, iPhone, PC, PS3, PS4, The Walking Dead: Michonne – Episode 2, Xbox 360, Xbox One)



8.5/10


Source link

Security News This Week: The NSA Denied Hillary a Secure BlackBerry

March 30, 2016 9:02, von FGR* Blog

The US government’s war on crypto took the spotlight again this week. Beyond the bureau’s ongoing standoff with Apple over the encrypted iPhone of San Bernadino shooter Syed Rizwan Farook, new documents were unsealed in the case of Lavabit, an email provider that stood up to the FBI’s decryption demands in 2013. Whatsapp also received its own wiretap order to hand over a user’s communications, which it denied, arguing that it didn’t possess the necessary decryption keys. In two out of three of those cases, the government made significant slip-ups. When Apple responded to the FBI in its latest brief, it hit the agency’s lawyers with an embarrassing fact-check that pointed out the feds’ technical errors and legal misinterpretations in their last brief. And a redaction error in the Lavabit documents confirmed for the first time the long-suspected target of the government investigation into the company: Edward Snowden.

FBI crypto showdowns aside, the FCC proposed strict new privacy rules for internet service providers. A Chinese piracy program used a new flaw in the iPhone’s security to install a rogue app on phones—and the media blew the threat way out of proportion. Google released disturbing statistics on the low adoption rate of HTTPS web encryption. And the FBI issued a new public service announcement about the risks of car hacking.

And there was more: Each Saturday we round up the news stories that we didn’t break or cover in depth at WIRED, but which deserve your attention nonetheless. As always, click on the headlines to read the full story in each link posted. And stay safe out there.

The NSA Denied Hillary Clinton a Secure BlackBerry

Since he became president, Barack Obama has carried a special “secure” BlackBerry, altered by the NSA to make it as difficult as possible for hackers to turn it into a remote spying device. Now it’s been revealed in emails obtained by the conservative legal advocacy group Judicial Watch that Secretary of State Hillary Clinton asked in 2009 for one of those uncrackable BlackBerries, too, and the NSA denied her request for unknown reasons. Conservative pundits have used the news to argue that Clinton knew her BlackBerry was insecure and yet still used it for sensitive emails. But even Obama’s BlackBerry wasn’t designed to be secure enough to send classified email, only to protect its microphone from being remotely hijacked by cyberspies. And there’s no evidence that Clinton carried her insecure BlackBerry into sensitive meetings where it could be abused as a spying tool.

Feds Reportedly Pushed Tech Companies to Reveal Source Code

As Apple fights the FBI’s demand that it write software designed to crack its own security protections, ZDNet reports that the US government has made an equally troubling demand of “numerous” tech firms: That they hand over their proprietary source code. Those demands, which ZDNet says were granted in most cases, were reportedly made with the authorization of the Foreign Intelligence Surveillance Court, the secretive judicial body serves as the overseer of American government surveillance efforts. ZDNet cited only a single anonymous source, and none of the dozen-plus tech firms that it asked about the requests would confirm that they’d faced such a demand.

The FBI and Secret Service Are Investigating Anonymous’ War On Trump

The hacker collective anonymous has struck again—or at least they’re talking very loudly again about striking, something most of the information security community has learned to ignore after several years of empty threats. Hacktivists within the group released a collection of Donald Trump’s private information, including his cell phone and Social Security number. But a quick Google search reveals both numbers had already been made public months earlier. Anonymous has vowed to continue its hacking campaign, however, and the FBI and Secret Service are taking the promise seriously enough to tell Time that they’re investigating the matter.

News Sites Reportedly Hit With Malvertising Ransomware

Last weekend, hackers hijacked ad campaigns that ran across the web sites of the BBC, The New York Times, Newsweek, and other high-profile news domains, according to the security firm Malwarebytes, whose researchers first spotted the activity. As reported by The Guardian, the malware targeted US visitors and took advantage of numerous exploits to attempt to download itself on people’s computers, encrypt their hard-drives, and then demand bitcoin payment in order to decrypt their data. This episode combines two hot-button issues in online security right now: ransomware, the hostage-style hack that is on the rise, and malvertising, a hack that takes advantage of comprised ad networks and which is increasingly sited by privacy and security advocates as a reason to use controversial ad-blockers.

Go Back to Top. Skip To: Start of Article.


Source link

Deleted Batman V Superman Scene Hints At A Bigger Threat

March 30, 2016 5:07, von FGR* Blog

Batman v Superman: Dawn of Justice is a lengthy film, running just over two and a half hours. Though the film certainly has a ton of action-packed scenes for moviegoers to digest, not all of the scenes Zack Snyder and company shot made it into the theatrical release. Warner Bros. Pictures has released one such scene.

In case you couldn’t tell by the nature of this post, the following article and the video contained in it feature spoilers to Batman v Superman: Dawn of Justice.

In the deleted scene, which was posted on the official Warner Bros. YouTube channel, we get a new glimpse of Jesse Eisenberg’s Lex Luthor. Instead of dealing with Batman, Superman, Wonder Woman, or Doomsday, we see him interacting with a mysterious demonic figure. We don’t know who this character is, but some have theorized that it is related to Darkseid, one of the big bads of the DC universe. You can view the scene for yourself below.

While Batman v Superman: Dawn of Justice has garnered mostly negative reviews from critics, the fan base has been more divided. Either way, Batman v Superman: Dawn of Justice posted some impressive numbers over the course of its first weekend in theaters, earning its place atop the list of highest-earning superhero debuts. That not only increases the likelihood that the films will continue as planned, but it also means we could eventually learn who or what the mysterious creature Lex is communicating with in this scene is.

[Source: Warner Bros. Pictures on YouTube, The Hollywood Reporter]


Source link

Sedução – Harlequin Flor da Pele

March 30, 2016 4:00, von FGR* Blog



Compre agora!


SEDUÇÃO – HARLEQUIN FLOR DA PELE

Tópico: Tenente Blake Landon.
Status: Duas semanas de licença obrigatória.
Missão: Se distrair de qualquer maneira.
Obstáculo: Uma deliciosa tentação.
O fuzileiro naval Blake Landon conhece o regulamento do início ao fim e o cumpre com precisão. Mas quando uma missão termina em tragédia, todo o seu pelotão é afastado por duas semanas. Para sua sorte, Blake encontra uma ruiva estonteante e percebe que regras, principalmente as de sedução, apenas existem para serem quebradas.
A cientista Alexia Lane só pensa em sexo. Em parte, por causa de seu trabalho, mas, sobretudo porque deseja um homem que faça o seu sangue ferver. Ela tem apenas uma restrição: não namora militares. Mas o corpo fascinante de Blake exala prazer por todos os poros, e Alexia não consegue resistir. Ela estava a um passo de atingir o nirvana quando descobre que ele é um fuzileiro. E se uma regra é quebrada, é praticamente certo que outras também serão…



Hack Brief: Update iOS Now to Fix a Serious iMessage Crypto Flaw

March 30, 2016 3:01, von FGR* Blog

As Apple battles the FBI in court to fight the demand that the company help crack its own encryption, it’s helpful to remember: Crypto systems are pretty fragile to begin with. And nothing illustrates that better than Apple today pushing out a fix to a security flaw that could have left millions of supposedly secured photos and videos exposed to eavesdroppers. If you normally wait a while to update to the latest iOS, you should make an exception in this case, and do it now.

The Hack

In its release of iOS 9.3 on Monday, Apple has also included a patch that’s meant to repair a serious flaw in its iMessage encryption system. The fix comes in response to a possible attack revealed by researchers at Johns Hopkins University, who privately informed Apple of the problem in November of last year.

The researchers’ method, which they previewed to the Washington Post and will fully detail in an upcoming paper, takes advantage of how iMessage sends photos, videos and other files: By storing them in an encrypted form on an Apple server along with an encrypted key to decrypt them, and then allowing the intended recipient to download that data.

If attackers can obtain that encrypted message, they can impersonate an Apple server (as far as the recipient’s phone is concerned) and repeatedly send different versions of the encrypted file and key, each one with a tiny portion of the message altered. How the phone responds to the attacker’s purposeful deformations—whether it accepts the form of the message or rejects it as invalid—reveals tiny hints about the contents. After about 130,000 of those attempts, the attacker can determine the entire key and decrypt the file. And because the server gives the phone an invalid download location of the target file that causes it to ultimately ignore every request, that entire interaction with the intended recipient’s phone isn’t revealed in messages popping up on his or her screen. “The user never sees it, the phone never displays anything,” says Ian Miers, one of the graduate researchers who developed the attack. “But the [recipient’s] computer has tried to reach out and grab the file, and we get to observe that and see whether we crafted the message correctly.”

Who’s Affected?

First, the good news: iOS 9.3, which Apple released today along with a parallel update Apple is releasing for the desktop version of iMessage, fixes the flaw. And the Johns Hopkin researchers kept the attack carefully under wraps until those patches were public. But now the bad news: anyone who doesn’t install the update to both their iPhone and their OSX iMessage client could still potentially have files that are sent to them decrypted using the technique. And it’s important to note that the recipient, not the sender, is the one whose devices must be patched to fully prevent the attack.

Even before today’s patch, older versions of iOS were more vulnerable to the attack than more recent ones. One major hurdle of the technique is that—as in all encryption attacks—the attackers need to somehow already get their hands on whatever message they’re hoping to decrypt. That encrypted file can be obtained from a law enforcement request or by hacking Apple’s servers. But there’s an easier way to get messages off phones running any iOS version before iOS 9: if the cryptographic certificate Apple uses to authenticate users can be spoofed, the encrypted message could also be obtained by eavesdroppers on the user’s network. After iOS 9, Apple implemented “certificate pinning,” a measure designed to prevent that spoofing.

How Serious Is This?

The Johns Hopkin researchers’ work represents a rare and deep crack in Apple’s encryption protections. But Miers says that the average iPhone owner shouldn’t panic: For more recent versions of iOS, at least, the technique requires hacking Apple’s server infrastructure or obtaining the company’s cooperation through legal demands. Even so, he advises that everyone should update immediately, not just those concerned with highly motivated hackers or law enforcement.

Miers says the larger point applies to the ongoing conversation around mandating backdoors in encryption, and the FBI’s standoff with Apple over its demand that the company help crack the encrypted iPhone of San Bernardino killer Syed Rizwan Farook. In fact, Apple had already come under fire from the DEA in 2013 specifically because of the encryption measures in iMessage. But even without law enforcement backdoors or special assistance from the company in cracking its own encryption, it turns out that iMessage’s data protections had significant flaws of their own, which law enforcement could have exploited.

“The real message is that encryption is hard. People thought iMessage was secure, and wanted to add ways for law enforcement to get access to it,” says Johns Hopkin’s Miers. “It’s hard [to protect data] even when you don’t to do that. When you do, you make it even harder.”

Go Back to Top. Skip To: Start of Article.


Source link

Fedora 24 Alpha

March 30, 2016 1:17, von FGR* Blog

O Fedora 24 Alpha foi recentemente lançado com a última versão do ambiente gráfico GNOME 3.20 e várias atualizações de bibliotecas, como: glibc 2.23 e GCC 6 Compiler Collection, FreeIPA 4.3 (Domain Controller role) para a edição Server, além de melhorias nos temas (GTK3). Essa versão vem com o kernel Linux 4.5.

Se tudo correr conforme o planejado pelos desenvolvedores, a versão final do Fedora 24 vai chegar dia 7 de junho. Até lá, não custa nada fazer o download da versão Alpha, testar o Fedora 24 e ajudar a comunidade a melhorar o sistema operacional.

Fedora 24 Alpha



Gurgamoth – Gameplay Trailer

March 30, 2016 1:06, von FGR* Blog


Please enter your date of birth to view this video

By clicking ‘enter’, you agree to GameSpot’s

Terms of Use and Privacy Policy


Source link

The Best Security Books

March 30, 2016 0:58, von FGR* Blog

Prepare o café, a mesa de estudos e se chover tudo bem (que bela e motivacional imagem, hein!). Esse tesouro de informações encontrei no excelente Coruja de TI, imediatamente fiz o upload para minha cloud e aqui disponibilizei para “consulta”.

Trata-se de uma lista com os melhores livros de segurança divulgado pela SANS, aprecie sem moderação.

  • The Art of War for Security Managers – Scott A. Watson
  • Beyond Fear – Bruce Schneier
  • Botnets: The Killer Web App – Schiller, Binkly et al
  • Counter Hack Reloaded: A Step-by Step Guide to Computer Attacks and Effective Defenses (2nd Edition) – Edward Skoudis and Tom Liston
  • Extrusion Detection – Richard Bejtlich
  • Google Hacking for Penetration Testers, Vol. 1 – Long, Skoudis, Eijkelenborg
  • Gray Hat Hacking: The Ethical Hacker’s Handbook – Harris, Harper, Eagle, Ness, Lester
  • Hacker’s Challenge I, II, III Series – Schiffman, Pennington, Pollio, O’Donnell
  • The Hacker’s Handbook: The Strategy Behind Breaking Into and Defending Networks – Susan Young and Dave Aitel
  • Hacking Exposed-VOIP – David Endler and Mark Collier
  • Hacking: The Art of Exploitation – Jon Erickson
  • Inside Network Perimeter Security – Stephen Northcutt and Judy Novak
  • Internet Forensics – Robert Jones
  • Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research – James Foster
  • The Oracle Hacker’s Handbook: Hacking and Defending Oracle – David Litchfield
  • Network Intrusion Detection, 3rd Edition – Stephen Northcutt and Judy Novak
  • Professional Pen Testing for Web Applications – Andres Andre
  • RailsSpace: Building a Social Networking Website with Ruby on Rails – Michael Hartl and Aurelius Prochazka
  • Real Digital Forensics: Computer Security and Incident Response – Jones, Bejtlich, Rose
  • Reversing: Secrets of Reverse Engineering – Eldad Eilam
  • Secrets and Lies – Bruce Schneier
  • Security Data Visualization Graphical Techniques for Network Analysis – Greg Conti
  • Security Metrics: Replacing Fear, Uncertainty, and Doubt – Andrew Jacquith
  • Security Warrior – Anton Chuvakin
  • Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures – Peter Thermos and Ari Takanen
  • The Shellcoder’s Handbook, 2nd Edition – Chris Anley
  • Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks – Michal Zalewski
  • The Tao of Network Security Monitoring: Beyond Intrusion Detection – Richard Bejtlich
  • The TCP/IP Guide – Charles M. Kozierok (No Starch Press)
  • The Web Application Hacker’s Handbook – Dafydd Stuttard and Marcus Pinto
  • Wi-Foo: The Secrets of Wireless Hacking (and Wi-Foo, 2nd edition) – Andrew Vladimirov, Konstantin V. Gavrilenko, Andrei A. Mikhailovsky
  • 802.11 Wireless Networks: The Definitive Guide (Second Edition) – Matthew S. Gast

The Best Security Books



A Menina que Roubava Livros

March 29, 2016 21:59, von FGR* Blog



Compre agora!

R$ 21,59

A trajetória de Liesel Meminger é contada por uma narradora mórbida, surpreendentemente simpática. Ao perceber que a pequena ladra de livros lhe escapa, a Morte afeiçoa-se à menina e rastreia suas pegadas de 1939 a 1943. Traços de uma sobrevivente: a mãe comunista, perseguida pelo nazismo, envia Liesel e o irmão para o subúrbio pobre de uma cidade alemã, onde um casal se dispõe a adotá-los por dinheiro. O garoto morre no trajeto e é enterrado por um coveiro que deixa cair um livro na neve. É o primeiro de uma série que a menina vai surrupiar ao longo dos anos. O único vínculo com a família é esta obra, que ela ainda não sabe ler.

Assombrada por pesadelos, ela compensa o medo e a solidão das noites com a conivência do pai adotivo, um pintor de parede bonachão que lhe dá lições de leitura. Alfabetizada sob vistas grossas da madrasta, Liesel canaliza urgências para a literatura. Em tempos de livros incendiados, ela os furta, ou os lê na biblioteca do prefeito da cidade.

A vida ao redor é a pseudo-realidade criada em torno do culto a Hitler na Segunda Guerra. Ela assiste à eufórica celebração do aniversário do Führer pela vizinhança. Teme a dona da loja da esquina, colaboradora do Terceiro Reich. Faz amizade com um garoto obrigado a integrar a Juventude Hitlerista. E ajuda o pai a esconder no porão um judeu que escreve livros artesanais para contar a sua parte naquela História. A Morte, perplexa diante da violência humana, dá um tom leve e divertido à narrativa deste duro confronto entre a infância perdida e a crueldade do mundo adulto, um sucesso absoluto – e raro – de crítica e público.

Best-seller da Veja



Em Busca de Heróis (Livro #1 O Anel Do Feiticeiro)

March 29, 2016 21:59, von FGR* Blog



Compre agora!


“O ANEL DO FEITICEIRO reúne todos os ingredientes para um sucesso instantâneo: tramas, intrigas, mistério, bravos cavaleiros e florescentes relacionamentos repletos de corações partidos, decepções e traições. O livro manterá o leitor entretido por horas e agradará a pessoas de todas as idades. Recomendado para fazer parte da biblioteca permanente de todos os leitores do gênero de fantasia.”

–Books and Movie Reviews, Roberto Mattos

O Best-seller #1, com mais de 400 comentários cinco estrelas na Amazon!

Da Autora de Best-sellers #1 — Morgan Rice — chega a estréia de uma nova série de fantasia deslumbrante. EM BUSCA DE HERÓIS (LIVRO #1 O ANEL DO FEITICEIRO) o qual gira em torno da épica história de amadurecimento de um garoto especial, um jovem de quatorze anos, de uma pequena vila nos arredores do Reino do Anel. Sendo o mais jovem de quatro filhos, o menos favorito de seu pai e odiado por seus irmãos, Thor sente que ele é diferente dos demais. Ele sonha com se tornar um grande guerreiro, unir-se aos homens do Rei e proteger o Anel das hordas de criaturas que vivem do outro lado do Canyon. Quando ele atinge a idade para tentar alistar-se na Legião do Rei e é proibido por seu pai de fazê-lo, Thor se recusa a aceitar a um não como resposta: ele empreende sua própria jornada solitária, determinado a abrir o seu caminho para a Corte do Rei e ser levado a sério.

Mas a corte do rei está repleta de seus próprios dramas familiares, lutas de poder, ambições, ciúmes, violência e traição. O Rei MacGil deve escolher um herdeiro entre os seus filhos e a antiga Espada do Destino, a fonte de todo o seu poder, permanece ainda intocada, aguardando a chegada do escolhido. Thorgrin chega como um forasteiro e luta para ser aceito e se juntar à Legião do Rei.

Thorgrin começa a perceber que ele tem poderes misteriosos os quais ele não entende bem; que ele tem um dom especial e um destino especial. Contra todas as probabilidades, ele se apaixona pela filha do rei e seu relacionamento proibido floresce; ele também descobre que possui rivais poderosos. Enquanto Thor luta para compreender o significado de seus poderes, o feiticeiro do rei o acolhe sob sua asa protetora e conta-lhe sobre a mãe que ele nunca conheceu, de uma terra longínqua, além do Canyon, além até mesmo da Terra dos Dragões.

Antes que Thorgrin possa aventurar-se e se tornar o guerreiro que ele tanto anseia ser, ele deve completar seu treinamento. Mas talvez isso possa ser abreviado, já que Thor se encontra no centro das tramas e intrigas reais, as quais podem ameaçar seu amor e derrubá-lo — juntamente com o Reino inteiro.

Com sua ambientação em um mundo sofisticado e sua caracterização de época, EM BUSCA DE HERÓIS é um conto épico sobre amigos e amantes, rivais e pretendentes, sobre cavaleiros e dragões, intrigas e maquinações políticas, sobre atingir a maioridade, corações partidos, mentira, ambição, e traição. É uma história de honra e coragem, de destinos, de feitiçaria. É uma fantasia que nos leva a um mundo que nunca esqueceremos e que vai interessar a todas as idades e gêneros. Contém 82.000 palavras.

.

3 livros, de um total de 13 da série, já estão disponíveis!

“Captou a minha atenção desde o início e eu não pude soltá-lo… Esta é uma história de aventura incrível que combina agilidade e ação desde o início. Você não encontrará nela nenhum momento maçante.”

–Paranormal Romance Guild {referindo-se a Transformada}

“Uma fantasia mística que tece elementos de mistério e intriga ao longo de sua história. EM BUSCA DE HERÓIS trata-se de armar-se de coragem e de viver uma vida com propósito, a qual conduz ao crescimento, maturidade e excelência.… Para aqueles que procuram aventuras de fantasia substanciais: os protagonistas, a trama, e a ação fornecem um vigoroso conjunto de situaçõe