CIA

Hack Apple

Hack Apple 10/11

In Brief By Schuyler Dorsey, eLearnSecurity i ID Theft Protect As usual specialists from companies eLearn Security and ID Theft protect will share with us latest news from IT security world. Read it to up-date yourself. Hacking Tools on iOS…

9781439801505

Review of Vulnerability Management

Review of Vulnerability Management By Aby Rao, CISSP, CISA, ITIL, Security+, ISO/IEC 20000 http://www.crcpress.com/product/isbn/9781439801505   Imagine this: You are a Security Engineer in a medium-size company and you are invited into your bosses’ office for an important one-on-one meeting. Your…

9781439801505

Vulnerability Management

Vulnerability Management By Park Foreman August 2009 Publisher: CRC Press http://www.crcpress.com/product/isbn/9781439801505   50% DISCOUNT for Hakin9 SUBSCRIBERS!!! To save 50% enter given below discount code, during checkout at www.crcpress.com. Description As old as the threat of danger itself, vulnerability management…

The Facebook friend request data mining plug-in

A new cross platform Java Facebook proof of concept (PoC) hacking plug-in data mining tool could turn your closest friends into your worst enemies – social engineering anyone? The plug-in tool (created by a team at RISST), called “Facebook Pwn“,…

Backtrack 5 book image

BackTrack 5 Wireless Penetration Testing Beginner’s Guide

Packt has recently published BackTrack 5 Wireless Penetration Testing Beginner’s Guide – a new book that will help users master bleeding edge wireless testing techniques. Specially for Hakin9 readers Packt granted a code: bt5wpteb, which gives 30% discount for e-copy…

Android

Hakin9 Extra – Android Security

Mobile Malware Analysis by Cory Adams With the emergence of the Android OS into the mobile market, nation state hackers and criminals alike are actively conducting attacks against the OS and its users for information gathering and financial gain. A…

back track cover

BackTrack 4: Assuring Security by Penetration Testing

BackTrack 4: Assuring Security by Penetration Testing By Shakeel Ali, Tedi Heriyanto Publisher: Packt http://link.packtpub.com/Ks5ViS 30% DISCOUNT for Hakin9 WHOLE SUBSCRIBERS!!! Add the eBook to the shopping cart on the Packt website. Eenter the CODE: ‘opbgsms‘ in the ‘Enter Promotion…

Secure Coding

Secure Coding 9/11

In Brief By Armando Romeo, eLearnSecurity and ID Theft Protect The Bug Story By Ali Hadi Despite the fact that our Networks gardens are full of beautiful/gorgeous things, at same time they’re full of bugs. The problem is that the…

Social Media

Twitter, Facebook, Gmail, LinkedIn, Skype, the list goes on and on and a majority of the one billion people that use these social net working sites consistently use them while at work. This unchecked flow of data is a new…

penetration tester's open source cover

Review of Penetration Tester’s Open Source Toolkit

Review of Penetration Tester’s Open Source Toolkit 3rd Edition By Michael Munt www.syngress.com   There are so many different varieties of penetration testing tools available, and the commercial versions of these can be very expensive and not always that easy…