Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @serpastrana
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @serpastrana
-
Sergio Pastrana proslijedio/la je Tweet
For
#WACCO2020 we are happy to have a great lineup for our PC. Get a look herehttps://wacco-workshop.eu/#organizationHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sergio Pastrana proslijedio/la je Tweet
WACCO is the perfect venue to present technical and non-technical papers on cyber-crime! We encourage submissions from any field. The CfP is open: https://wacco-workshop.eu/#call Deadline: 21 Feb.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sergio Pastrana proslijedio/la je Tweet
The
@waccoworkshop last year was amazing. I totally recommend to submit or attend. Got first hand high quality content and it was great to meet other researchers in this area.#WACCO2020https://twitter.com/waccoworkshop/status/1122616629920182272 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sergio Pastrana proslijedio/la je Tweet
The privacy paranoid among us have long worried that all of our online photos would be scraped to create a universal face recognition app. My friends, it happened and it’s here:https://www.nytimes.com/2020/01/18/technology/clearview-privacy-facial-recognition.html …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sergio Pastrana proslijedio/la je Tweet
After the success of the 1st edition, we are happy to announce that WACCO will be co-located with the IEEE EuroS&P2020
@IEEEEUROSP. Are you interested in cyber-crime activities? WACCO 2020 is the right place for you. Submit your work now. Deadline 21-Feb.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sergio Pastrana proslijedio/la je Tweet
Bueno, estamos que ebullimos
Mañana iremos @aigtf y@serpastrana a@colegioMTeresa ¡a impartir otro taller@cryptogogame! ¿Cuántos sabrán después qué significa la tríada “CIA” en criptografía?
cc @mbelcrypt_vasco we’ll miss you#secundaria#ciberseguridad#criptografíapic.twitter.com/H5fRsNTeg4Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sergio Pastrana proslijedio/la je Tweet
Today my Head of Department emailed me about something. It sounded urgent, though it's odd he switched to using a Gmail address [thread]pic.twitter.com/w1eyNMit9Z
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sergio Pastrana proslijedio/la je TweetPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Sergio Pastrana proslijedio/la je Tweet
#Digest I Understanding eWhoring This new type of#cybercrime has been studied by Alice Hutchings@message4bob et Sergio Pastrana@serpastrana . Check out our last issue of the#Digest p5 to learn more about it and how it works. http://ow.ly/r4XL50xK5i9 pic.twitter.com/SsUJsirur0
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sergio Pastrana proslijedio/la je Tweet
Episode 4 - Understanding eWhoring.
@message4bob from@Cambridge_Uni helps us understand what this novel#cybercrime is and how it works .https://www.cybercrimeology.com/episodes/understanding-ewhoring …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sergio Pastrana proslijedio/la je Tweet
A hacking group is mass-scanning the internet for Docker systems with exposed API endpoints to mine cryptocurrency - they've already made 14.82 XMR ($740) in 2 days - they're also stealing rConfig config files - they're also leaving SSH backdoors behind https://www.zdnet.com/article/a-hacking-group-is-hijacking-docker-systems-with-exposed-api-endpoints/ …pic.twitter.com/UyDjXrYeXZ
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sergio Pastrana proslijedio/la je Tweet
12-year-old Nigerian boy based in the UK, Chika Ofili, has been presented with a Special Recognition Award for making a new discovery in Mathematics. The little Mathematician just discovered a new formula for divisibility by 7 in Maths. Shouldn't this be named Ofili's theorem?pic.twitter.com/lLZHEG0rIT
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sergio Pastrana proslijedio/la je Tweet
Racoon stealer is a nice example of why it’s important to control the different entry vectors. The usage of legitimate 3rd party applications to infect everyone is a widely used technique nowadayshttps://securityaffairs.co/wordpress/94339/malware/raccoon-stealer-evasion-technique.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sergio Pastrana proslijedio/la je Tweet
Anonymous hacker gets a whopping six years in prison for some lame DDoS attacks > Hacker's account:
@AkronPhoenix420 > Attacked a bunch of sites, but barely made a dent > Most attacks targeted Akron's website > Nobody knew this guy until his arrest https://www.zdnet.com/article/anonymous-hacker-gets-a-whopping-six-years-in-prison-for-some-lame-ddos-attacks/ …pic.twitter.com/pkG7SbDAia
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sergio Pastrana proslijedio/la je Tweet
When you read: "Facebook bug turns on iPhone camera in the background" (https://www.welivesecurity.com/2019/11/13/facebook-bug-iphone-camera-background …) Really a "bug"?pic.twitter.com/yDwB35J7AO
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sergio Pastrana proslijedio/la je Tweet
Machine learning is a bit like cocaine in the 1880s: - been used in a weaker form for centuries - some surprisingly successful early applications led to it now being over-prescribed - beginning to understand that performance degrades after repeated use, negative feedback loops
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sergio Pastrana proslijedio/la je Tweet
Crypto-mining malware is the culprit to the first attempt to weaponize the infamous BlueKeep RDP vulnerability in the wild! Check our IMC'19 paper to learn more about illicit crypto-mining and it's ecosystem /cc
@serpastrana .@kryptoslogic https://arxiv.org/pdf/1901.00846.pdf …https://twitter.com/kryptoslogic/status/1190825547460427776 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sergio Pastrana proslijedio/la je Tweet
Researchers working with adversarial ML: In your experience what percentage of malware in the wild uses adversarial evasion? I have yet to find even a single person who is willing to give such an estimate! RT for visibility!
#AISecurityPrague#CyberSecurity@CyberSecTUDelftHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sergio Pastrana proslijedio/la je Tweet
A longitudinal measurement of the crypto-mining malware ecosystem https://arxiv.org/pdf/1901.00846.pdf … with
@serpastrana at#IMC2019 https://twitter.com/jetapiador/status/1186232567311273984 …pic.twitter.com/mZWhdh1APF
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sergio Pastrana proslijedio/la je Tweet
Just in: Illinois Supreme Court upholds IL's "revenge porn" law against 1st Amendment challenge, adopting many arguments from
@CCRInitiative's amicus brief: https://courts.illinois.gov/Opinions/SupremeCourt/2019/123910.pdf …@MiamiLawSchoolPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

