CIA

Fake Verizon email with malicious ZIP in circulation

Microsoft is warning users about a fake Verizon notification which is carrying a Trojan. The email appears to come from Verizon and attempts to make the customer feel a sense of urgency by claiming it contains crucial account information from…

hc

Get 20 % discount NOW!

Huge discounts on security books from Feisty Duck! Feisty Duck is providing all readers of Hakin9 with a special discount for additional 20% off our current prices. Use code HAKIN9MS for 45% off list price for ModSecurity Handbook Use code…

TOR Project

Hakin9 12/11: TOR Project

Latest News From IT Security World By Armando Romeo, eLearnSecurity and ID Theft Protect Duqu: The Precursor Stuxnet Attack By Rebecca Wynn Duqu is essentially the precursor to a future Stuxnet-like attack. The threat was written by the same authors,…

Advanced SystemCare 5 Released!

Advanced SystemCare 5: IObit Debuts The New Release Of Its Flagship Software Suite. Advanced SystemCare is one of the most downloaded Windows utility programs; version 5 of the software sees new functionality and features, making it one of the most…

Facebook is following me from website to website

Back in March of this year I (Julian Evans blog) wrote a post about the Facebook ‘Like’ button JavaScript threat. In it I highlighted how easy it was for Facebook to collect data for internal analysis (i.e.improve their site) rent…

Get Rid of Spam!

Hakin9 Special Issue – Get Rid of Spam!

DOWNLOAD FOR FREE! Inside this issue you will find articles on anti-spam, email filtering and archiving. You will also get familiar with Roaring Penguin’s producs, sources of company creation and its founder itself. CONTENTS: March of the Roaring Penguin By…

MacXDVD Thanksgiving Special Offer

Thanksgiving day is around the corner, MacXDVD would like to take this opportunity to express our thanks for your help and are glad to provide 10, 000 copies of MacX DVD Ripper Pro for give away, along with 60% off…

Hakin9 Extra Rootkit

Hakin9 Extra – Rootkit 06/2011

Rootkits Hidden in Hardware of PC by Anibal Sacco Let’s think like an attacker for a second. There are multiple applications dedicated to find malicious code both in user and in kernel space. So new places have to be found…

Thieves using Facebook and Twitter to identify targets

Most of Julian’s (http://julianevansblog.com) readers probably have a Facebook account, and some of you might also have a Twitter and foursquare account. Given Julian’s blog is all about protecting your online and offline identity you might want to reconsider posting…