GameTrailers.com: 5 Ways to Survive XCOM 2
March 30, 2016 13:10
Please note that any reproduction of this video without the express written consent of GameTrailers is expressly forbidden.
Source link
A Ascensão dos Dragões (Reis e Feiticeiros – Livro 1)
March 30, 2016 10:01“Se você achou que não havia mais motivos para viver após o final da série O Anel do Feiticeiro, você estava enganado. Em A ASCENSÃO DOS DRAGÕES, Morgan Rice começa o que pode se se tornar mais uma série brilhante, que nos levará a um mundo de fantasia com trolls e dragões em uma história de luta, honra, coragem, mágina e confiança quanto ao destino. Morgan mais uma vez conseguiu criar personagens fortes que deixarão todos na torcida a cada página… Recomendado para fazer parte da biblioteca permanente de leitores que apreciam o gênero de fantasia.”
–Books and Movie Reviews, Roberto Mattos
Bestseller nº1!
Da autora Besteseller Morgan Rice surge uma nova série de fantasia épica: A ASCENSÃO DOS DRAGÕES (REIS E FEITICEIROS – Livro 1).
Kyra, 15 anos, sonha em se tornar uma guerreira famosa, como seu pai, embora ela seja a única garota em uma fortaleza de meninos. Enquanto luta para entender suas habilidades especiais, – sua misteriosa força interior, ela percebe que é diferente dos demais. Mas um segredo quanto ao seu nascimento e sobre uma profecia está sendo guardado, deixando Kyra se perguntando quem ela realmente é.
Quando Kyra atinge a idade prevista e um senhor local se aproxima para levá-la embora, seu pai planeja realizar um casamento para salvá-la. Mas Kyra se recusa, e começa sua própria jornada, por uma floresta perigosa, onde ela encontra um dragão ferido – e inicia uma série de eventos que mudarão o reino para sempre.
Enquanto isso, Alec, um garoto de 15 anos, se sacrifica pelo irmão, assumindo o seu lugar durante a convocação e sendo levado para as Chamas, uma parede de fogo com cem metros de altura, pra impedir o avanço do exército de trolls em direção ao Ocidente. Do outro lado do reino, Merk, um mercenário que luta para deixar seu passado para trás, atravessa a floresta em busca de se tornar um Vigilante das Torres e ajudar a proteger a Espada de Fogo, a fonte de todo o poder mágico do reuno. Mas os Trolls também querem a Espada – e se preparam para uma invasão em massa que poderia destruir o reino para sempre.
Com esta forte atmosfera e personagens complexos, A ASCENSÃO DOS DRAGÕES é uma saga de cavaleiros e guerreiros, reis e senhores, honra e coragem – uma história mágica, repleta de monstros e dragões. É uma história de amor e corações partidos; de decepções, ambição e traições. O melhor do gênero de fantasia, levando os leitores de todas as idades a um mundo que nunca será esquecido..
Livro nº 2 da série REIS E FEITICEIROS será publicado em breve.
“A ASCENSÃO DOS DRAGÕES é um sucesso – desde o começo… Uma excelente história de fantasia… Ela começa, como deveria, com as dificuldades de um protagonista e se desenvolve em uma série de eventos envolvendo cavaleiros, dragões, mágica, monstros e destino… Todos os ingredientes do gênero da fantasia estão presentes, desde soldados e batalhas a questionamentos internos… Uma ótima recomendação para os fãs de fantasia, em uma narrativa impulsionada por protagonistas fortes e jovens.”
–Midwest Book Review, D. Donovan, eBook Reviewer
”
The Walking Dead: Michonne Episode 2 "Give No Shelter" Review GamersFTW
March 30, 2016 9:08
Give No Shelter is a fantastic episode that more than makes up for the series’ disappointing premiere and sets things up nicely for next month’s finale. It’s got a great opening section, some of the most intense scenes ever delivered by Telltale, and a bunch of twists and turns to keep things interesting. If you’ve played the first episode and you’re not sure about wanting to give the series a second chance, I implore you to try this one and see for yourself why Telltale is one of the best storytellers in the business
(Android, iPad, iPhone, PC, PS3, PS4, The Walking Dead: Michonne – Episode 2, Xbox 360, Xbox One)
8.5/10
Source link
Security News This Week: The NSA Denied Hillary a Secure BlackBerry
March 30, 2016 9:02
The US government’s war on crypto took the spotlight again this week. Beyond the bureau’s ongoing standoff with Apple over the encrypted iPhone of San Bernadino shooter Syed Rizwan Farook, new documents were unsealed in the case of Lavabit, an email provider that stood up to the FBI’s decryption demands in 2013. Whatsapp also received its own wiretap order to hand over a user’s communications, which it denied, arguing that it didn’t possess the necessary decryption keys. In two out of three of those cases, the government made significant slip-ups. When Apple responded to the FBI in its latest brief, it hit the agency’s lawyers with an embarrassing fact-check that pointed out the feds’ technical errors and legal misinterpretations in their last brief. And a redaction error in the Lavabit documents confirmed for the first time the long-suspected target of the government investigation into the company: Edward Snowden.
FBI crypto showdowns aside, the FCC proposed strict new privacy rules for internet service providers. A Chinese piracy program used a new flaw in the iPhone’s security to install a rogue app on phones—and the media blew the threat way out of proportion. Google released disturbing statistics on the low adoption rate of HTTPS web encryption. And the FBI issued a new public service announcement about the risks of car hacking.
And there was more: Each Saturday we round up the news stories that we didn’t break or cover in depth at WIRED, but which deserve your attention nonetheless. As always, click on the headlines to read the full story in each link posted. And stay safe out there.
The NSA Denied Hillary Clinton a Secure BlackBerry
Since he became president, Barack Obama has carried a special “secure” BlackBerry, altered by the NSA to make it as difficult as possible for hackers to turn it into a remote spying device. Now it’s been revealed in emails obtained by the conservative legal advocacy group Judicial Watch that Secretary of State Hillary Clinton asked in 2009 for one of those uncrackable BlackBerries, too, and the NSA denied her request for unknown reasons. Conservative pundits have used the news to argue that Clinton knew her BlackBerry was insecure and yet still used it for sensitive emails. But even Obama’s BlackBerry wasn’t designed to be secure enough to send classified email, only to protect its microphone from being remotely hijacked by cyberspies. And there’s no evidence that Clinton carried her insecure BlackBerry into sensitive meetings where it could be abused as a spying tool.
Feds Reportedly Pushed Tech Companies to Reveal Source Code
As Apple fights the FBI’s demand that it write software designed to crack its own security protections, ZDNet reports that the US government has made an equally troubling demand of “numerous” tech firms: That they hand over their proprietary source code. Those demands, which ZDNet says were granted in most cases, were reportedly made with the authorization of the Foreign Intelligence Surveillance Court, the secretive judicial body serves as the overseer of American government surveillance efforts. ZDNet cited only a single anonymous source, and none of the dozen-plus tech firms that it asked about the requests would confirm that they’d faced such a demand.
The FBI and Secret Service Are Investigating Anonymous’ War On Trump
The hacker collective anonymous has struck again—or at least they’re talking very loudly again about striking, something most of the information security community has learned to ignore after several years of empty threats. Hacktivists within the group released a collection of Donald Trump’s private information, including his cell phone and Social Security number. But a quick Google search reveals both numbers had already been made public months earlier. Anonymous has vowed to continue its hacking campaign, however, and the FBI and Secret Service are taking the promise seriously enough to tell Time that they’re investigating the matter.
News Sites Reportedly Hit With Malvertising Ransomware
Last weekend, hackers hijacked ad campaigns that ran across the web sites of the BBC, The New York Times, Newsweek, and other high-profile news domains, according to the security firm Malwarebytes, whose researchers first spotted the activity. As reported by The Guardian, the malware targeted US visitors and took advantage of numerous exploits to attempt to download itself on people’s computers, encrypt their hard-drives, and then demand bitcoin payment in order to decrypt their data. This episode combines two hot-button issues in online security right now: ransomware, the hostage-style hack that is on the rise, and malvertising, a hack that takes advantage of comprised ad networks and which is increasingly sited by privacy and security advocates as a reason to use controversial ad-blockers.
Source link
Deleted Batman V Superman Scene Hints At A Bigger Threat
March 30, 2016 5:07

Batman v Superman: Dawn of Justice is a lengthy film, running just over two and a half hours. Though the film certainly has a ton of action-packed scenes for moviegoers to digest, not all of the scenes Zack Snyder and company shot made it into the theatrical release. Warner Bros. Pictures has released one such scene.
In case you couldn’t tell by the nature of this post, the following article and the video contained in it feature spoilers to Batman v Superman: Dawn of Justice.
In the deleted scene, which was posted on the official Warner Bros. YouTube channel, we get a new glimpse of Jesse Eisenberg’s Lex Luthor. Instead of dealing with Batman, Superman, Wonder Woman, or Doomsday, we see him interacting with a mysterious demonic figure. We don’t know who this character is, but some have theorized that it is related to Darkseid, one of the big bads of the DC universe. You can view the scene for yourself below.
While Batman v Superman: Dawn of Justice has garnered mostly negative reviews from critics, the fan base has been more divided. Either way, Batman v Superman: Dawn of Justice posted some impressive numbers over the course of its first weekend in theaters, earning its place atop the list of highest-earning superhero debuts. That not only increases the likelihood that the films will continue as planned, but it also means we could eventually learn who or what the mysterious creature Lex is communicating with in this scene is.
[Source: Warner Bros. Pictures on YouTube, The Hollywood Reporter]
Source link
Sedução – Harlequin Flor da Pele
March 30, 2016 4:00SEDUÇÃO – HARLEQUIN FLOR DA PELE
Tópico: Tenente Blake Landon.
Status: Duas semanas de licença obrigatória.
Missão: Se distrair de qualquer maneira.
Obstáculo: Uma deliciosa tentação.
O fuzileiro naval Blake Landon conhece o regulamento do início ao fim e o cumpre com precisão. Mas quando uma missão termina em tragédia, todo o seu pelotão é afastado por duas semanas. Para sua sorte, Blake encontra uma ruiva estonteante e percebe que regras, principalmente as de sedução, apenas existem para serem quebradas.
A cientista Alexia Lane só pensa em sexo. Em parte, por causa de seu trabalho, mas, sobretudo porque deseja um homem que faça o seu sangue ferver. Ela tem apenas uma restrição: não namora militares. Mas o corpo fascinante de Blake exala prazer por todos os poros, e Alexia não consegue resistir. Ela estava a um passo de atingir o nirvana quando descobre que ele é um fuzileiro. E se uma regra é quebrada, é praticamente certo que outras também serão…
Hack Brief: Update iOS Now to Fix a Serious iMessage Crypto Flaw
March 30, 2016 3:01
As Apple battles the FBI in court to fight the demand that the company help crack its own encryption, it’s helpful to remember: Crypto systems are pretty fragile to begin with. And nothing illustrates that better than Apple today pushing out a fix to a security flaw that could have left millions of supposedly secured photos and videos exposed to eavesdroppers. If you normally wait a while to update to the latest iOS, you should make an exception in this case, and do it now.
The Hack
In its release of iOS 9.3 on Monday, Apple has also included a patch that’s meant to repair a serious flaw in its iMessage encryption system. The fix comes in response to a possible attack revealed by researchers at Johns Hopkins University, who privately informed Apple of the problem in November of last year.
The researchers’ method, which they previewed to the Washington Post and will fully detail in an upcoming paper, takes advantage of how iMessage sends photos, videos and other files: By storing them in an encrypted form on an Apple server along with an encrypted key to decrypt them, and then allowing the intended recipient to download that data.
If attackers can obtain that encrypted message, they can impersonate an Apple server (as far as the recipient’s phone is concerned) and repeatedly send different versions of the encrypted file and key, each one with a tiny portion of the message altered. How the phone responds to the attacker’s purposeful deformations—whether it accepts the form of the message or rejects it as invalid—reveals tiny hints about the contents. After about 130,000 of those attempts, the attacker can determine the entire key and decrypt the file. And because the server gives the phone an invalid download location of the target file that causes it to ultimately ignore every request, that entire interaction with the intended recipient’s phone isn’t revealed in messages popping up on his or her screen. “The user never sees it, the phone never displays anything,” says Ian Miers, one of the graduate researchers who developed the attack. “But the [recipient’s] computer has tried to reach out and grab the file, and we get to observe that and see whether we crafted the message correctly.”
Who’s Affected?
First, the good news: iOS 9.3, which Apple released today along with a parallel update Apple is releasing for the desktop version of iMessage, fixes the flaw. And the Johns Hopkin researchers kept the attack carefully under wraps until those patches were public. But now the bad news: anyone who doesn’t install the update to both their iPhone and their OSX iMessage client could still potentially have files that are sent to them decrypted using the technique. And it’s important to note that the recipient, not the sender, is the one whose devices must be patched to fully prevent the attack.
Even before today’s patch, older versions of iOS were more vulnerable to the attack than more recent ones. One major hurdle of the technique is that—as in all encryption attacks—the attackers need to somehow already get their hands on whatever message they’re hoping to decrypt. That encrypted file can be obtained from a law enforcement request or by hacking Apple’s servers. But there’s an easier way to get messages off phones running any iOS version before iOS 9: if the cryptographic certificate Apple uses to authenticate users can be spoofed, the encrypted message could also be obtained by eavesdroppers on the user’s network. After iOS 9, Apple implemented “certificate pinning,” a measure designed to prevent that spoofing.
How Serious Is This?
The Johns Hopkin researchers’ work represents a rare and deep crack in Apple’s encryption protections. But Miers says that the average iPhone owner shouldn’t panic: For more recent versions of iOS, at least, the technique requires hacking Apple’s server infrastructure or obtaining the company’s cooperation through legal demands. Even so, he advises that everyone should update immediately, not just those concerned with highly motivated hackers or law enforcement.
Miers says the larger point applies to the ongoing conversation around mandating backdoors in encryption, and the FBI’s standoff with Apple over its demand that the company help crack the encrypted iPhone of San Bernardino killer Syed Rizwan Farook. In fact, Apple had already come under fire from the DEA in 2013 specifically because of the encryption measures in iMessage. But even without law enforcement backdoors or special assistance from the company in cracking its own encryption, it turns out that iMessage’s data protections had significant flaws of their own, which law enforcement could have exploited.
“The real message is that encryption is hard. People thought iMessage was secure, and wanted to add ways for law enforcement to get access to it,” says Johns Hopkin’s Miers. “It’s hard [to protect data] even when you don’t to do that. When you do, you make it even harder.”
Source link
Fedora 24 Alpha
March 30, 2016 1:17O Fedora 24 Alpha foi recentemente lançado com a última versão do ambiente gráfico GNOME 3.20 e várias atualizações de bibliotecas, como: glibc 2.23 e GCC 6 Compiler Collection, FreeIPA 4.3 (Domain Controller role) para a edição Server, além de melhorias nos temas (GTK3). Essa versão vem com o kernel Linux 4.5.
Se tudo correr conforme o planejado pelos desenvolvedores, a versão final do Fedora 24 vai chegar dia 7 de junho. Até lá, não custa nada fazer o download da versão Alpha, testar o Fedora 24 e ajudar a comunidade a melhorar o sistema operacional.

Gurgamoth – Gameplay Trailer
March 30, 2016 1:06
Please enter your date of birth to view this video
By clicking ‘enter’, you agree to GameSpot’s
Terms of Use and Privacy Policy
Source link
The Best Security Books
March 30, 2016 0:58Prepare o café, a mesa de estudos e se chover tudo bem (que bela e motivacional imagem, hein!). Esse tesouro de informações encontrei no excelente Coruja de TI, imediatamente fiz o upload para minha cloud e aqui disponibilizei para “consulta”.
Trata-se de uma lista com os melhores livros de segurança divulgado pela SANS, aprecie sem moderação.
- The Art of War for Security Managers – Scott A. Watson
- Beyond Fear – Bruce Schneier
- Botnets: The Killer Web App – Schiller, Binkly et al
- Counter Hack Reloaded: A Step-by Step Guide to Computer Attacks and Effective Defenses (2nd Edition) – Edward Skoudis and Tom Liston
- Extrusion Detection – Richard Bejtlich
- Google Hacking for Penetration Testers, Vol. 1 – Long, Skoudis, Eijkelenborg
- Gray Hat Hacking: The Ethical Hacker’s Handbook – Harris, Harper, Eagle, Ness, Lester
- Hacker’s Challenge I, II, III Series – Schiffman, Pennington, Pollio, O’Donnell
- The Hacker’s Handbook: The Strategy Behind Breaking Into and Defending Networks – Susan Young and Dave Aitel
- Hacking Exposed-VOIP – David Endler and Mark Collier
- Hacking: The Art of Exploitation – Jon Erickson
- Inside Network Perimeter Security – Stephen Northcutt and Judy Novak
- Internet Forensics – Robert Jones
- Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research – James Foster
- The Oracle Hacker’s Handbook: Hacking and Defending Oracle – David Litchfield
- Network Intrusion Detection, 3rd Edition – Stephen Northcutt and Judy Novak
- Professional Pen Testing for Web Applications – Andres Andre
- RailsSpace: Building a Social Networking Website with Ruby on Rails – Michael Hartl and Aurelius Prochazka
- Real Digital Forensics: Computer Security and Incident Response – Jones, Bejtlich, Rose
- Reversing: Secrets of Reverse Engineering – Eldad Eilam
- Secrets and Lies – Bruce Schneier
- Security Data Visualization Graphical Techniques for Network Analysis – Greg Conti
- Security Metrics: Replacing Fear, Uncertainty, and Doubt – Andrew Jacquith
- Security Warrior – Anton Chuvakin
- Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures – Peter Thermos and Ari Takanen
- The Shellcoder’s Handbook, 2nd Edition – Chris Anley
- Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks – Michal Zalewski
- The Tao of Network Security Monitoring: Beyond Intrusion Detection – Richard Bejtlich
- The TCP/IP Guide – Charles M. Kozierok (No Starch Press)
- The Web Application Hacker’s Handbook – Dafydd Stuttard and Marcus Pinto
- Wi-Foo: The Secrets of Wireless Hacking (and Wi-Foo, 2nd edition) – Andrew Vladimirov, Konstantin V. Gavrilenko, Andrei A. Mikhailovsky
- 802.11 Wireless Networks: The Definitive Guide (Second Edition) – Matthew S. Gast



