Sergio Pastrana

@serpastrana

Researcher in Computer Security and Cybercrime.

Vrijeme pridruživanja: studeni 2017.

Tweetovi

Blokirali ste korisnika/cu @serpastrana

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @serpastrana

  1. proslijedio/la je Tweet
    3. velj

    For we are happy to have a great lineup for our PC. Get a look here

    Poništi
  2. proslijedio/la je Tweet
    24. sij

    WACCO is the perfect venue to present technical and non-technical papers on cyber-crime! We encourage submissions from any field. The CfP is open: Deadline: 21 Feb.

    Poništi
  3. proslijedio/la je Tweet
    23. sij

    The last year was amazing. I totally recommend to submit or attend. Got first hand high quality content and it was great to meet other researchers in this area.

    Poništi
  4. proslijedio/la je Tweet
    18. sij

    The privacy paranoid among us have long worried that all of our online photos would be scraped to create a universal face recognition app. My friends, it happened and it’s here:

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    18. sij

    After the success of the 1st edition, we are happy to announce that WACCO will be co-located with the IEEE EuroS&P2020 . Are you interested in cyber-crime activities? WACCO 2020 is the right place for you. Submit your work now. Deadline 21-Feb.

    Poništi
  6. proslijedio/la je Tweet
    16. sij

    Bueno, estamos que ebullimos 😎 Mañana iremos y a ¡a impartir otro taller ! ¿Cuántos sabrán después qué significa la tríada “CIA” en criptografía? 🙃 cc we’ll miss you

    Poništi
  7. proslijedio/la je Tweet
    14. sij

    Today my Head of Department emailed me about something. It sounded urgent, though it's odd he switched to using a Gmail address [thread]

    Are you available at the moment,




Best Regards,
Head of department,
Steve.
    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    6. sij

    I Understanding eWhoring This new type of has been studied by Alice Hutchings et Sergio Pastrana . Check out our last issue of the p5 to learn more about it and how it works.

    Poništi
  10. proslijedio/la je Tweet
    16. pro 2019.

    Episode 4 - Understanding eWhoring. from helps us understand what this novel is and how it works .

    Poništi
  11. proslijedio/la je Tweet
    25. stu 2019.

    A hacking group is mass-scanning the internet for Docker systems with exposed API endpoints to mine cryptocurrency - they've already made 14.82 XMR ($740) in 2 days - they're also stealing rConfig config files - they're also leaving SSH backdoors behind

    Poništi
  12. proslijedio/la je Tweet
    24. stu 2019.

    12-year-old Nigerian boy based in the UK, Chika Ofili, has been presented with a Special Recognition Award for making a new discovery in Mathematics. The little Mathematician just discovered a new formula for divisibility by 7 in Maths. Shouldn't this be named Ofili's theorem?

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    25. stu 2019.

    Racoon stealer is a nice example of why it’s important to control the different entry vectors. The usage of legitimate 3rd party applications to infect everyone is a widely used technique nowadays

    Poništi
  14. proslijedio/la je Tweet
    20. stu 2019.

    Anonymous hacker gets a whopping six years in prison for some lame DDoS attacks > Hacker's account: > Attacked a bunch of sites, but barely made a dent > Most attacks targeted Akron's website > Nobody knew this guy until his arrest

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    20. stu 2019.

    When you read: "Facebook bug turns on iPhone camera in the background" () Really a "bug"?

    Poništi
  16. proslijedio/la je Tweet
    14. stu 2019.

    Machine learning is a bit like cocaine in the 1880s: - been used in a weaker form for centuries - some surprisingly successful early applications led to it now being over-prescribed - beginning to understand that performance degrades after repeated use, negative feedback loops

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet

    Crypto-mining malware is the culprit to the first attempt to weaponize the infamous BlueKeep RDP vulnerability in the wild! Check our IMC'19 paper to learn more about illicit crypto-mining and it's ecosystem /cc .

    Poništi
  18. proslijedio/la je Tweet
    25. lis 2019.

    Researchers working with adversarial ML: In your experience what percentage of malware in the wild uses adversarial evasion? I have yet to find even a single person who is willing to give such an estimate! RT for visibility!

    Poništi
  19. proslijedio/la je Tweet
    Poništi
  20. proslijedio/la je Tweet

    Just in: Illinois Supreme Court upholds IL's "revenge porn" law against 1st Amendment challenge, adopting many arguments from 's amicus brief:

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·