criminals

ID Theft - Hakin9 03/2011

ID Theft – Hakin9 03/2011

The best way, to learn and apply cryptography ARKADIUS C. LITWINCZUK The CrypTool project is about making the sometimes daunting subject of cryptography more accessible and easy to understand. It is the most comprehensive cryptography learning tool worldwide. Analysis of…

A Brief Analysis of the Cyber Security Threat

A definition of cyber security Cyber security can be broadly described as protecting personal/business or government digital assets from cyber attack from individuals, organised criminals or foreign governments. Cyber security encompasses three threat vectors; cyber warfare; cyber terrorism and cyber…

Proactive Defenses and Free Tools

Some of the best countermeasures and most of them are free. In my last article, I described the greatest breach in cyber history and made some suggestions on how it could have been avoided – enabling strong wireless encryption, testing…

Mobile Malware – the new cyber threat 08/2010

Mobile Malware – the new cyber threat

Botnet:The Six Laws And Immerging Command & Control Vectors Richard C. Batka New BotNet communication vectors are emerging. The industry is not prepared. For the next 20 years, BotNets will be what viruses were for the last 20. Hacking Trust…

Is Anti-virus Dead – The answer is YES. Here’s why…

There have been billions of dollars in damages caused by exploiters on the Internet. These exploiters are intelligent cyber terrorists, criminals and hackers who have a plethora of tools available in their war chest – ranging from spyware, rootkits, trojans,…

Beginner’s Guide to Cybercrime

Understanding Attack Methodologies and a More Proactive approach to Defense If you are a regular reader of Hakin9 Magazine, you probably already know a great deal about hacking. But do you know the difference between traditional crime and cybercrime? Do…

More Thoughts on Defeating AntiVirus

Faced with the daunting task of detecting and quaranting thousands of new viruses, Trojans and other malware discovered every day, AntiVirus software vendors rely on AV signatures to protect their customers. Author: JIM KELLY Source: Hakin9 3/2009 https://hakin9.org WHAT YOU WILL LEARN… How…