Mobile

Mobile Digital Forensics Cover Your ASSets (CYA)

Contrary to what we wish, mobile digital forensics is made easy because we as individual like to think that no one is ease dropping, shoulder surfing, watching us type in our passwords, taking out our SIM card and copying it…

Hakin9 Extra 3/2011 - Forensics

Hakin9 Extra 3/2011 – Forensics

Basic Forensics Analysis by Marc-Andre Meloche Digital Forensics is mostly like the movies, the main aspect is to gather evidence or digital footprints which will help you understand any digital crimes that might have occurred inside your organization. This is…

Enterprise IT Security Magazine 2/2011

Enterprise IT Security Magazine 2/2011

Take Pain Out of The Value Chain by Simon Walker Hardening a Network Router by Dave Naples Networking Reconnaissance – Probing & Scanning by Dhananjay Garg Is Scanning of Computer Networks Dangerous? by Anton Keks Network Infrastructure Parser – Nipper…

Online Banking Security Magazine 1/2011

Online Banking Security Magazine 1/2011

The Compleat Angler – a Phishing Primer David Harley Attacks, Securing and Impacts on Mobile & Internet Banking Vivek P. Nair The Real Cost of Poor Security Menagement httP://www.qUAntAiniA.com/ Security Bridge in DTMF Amitay Dan Next Generation Mobile Banking Attevo…

An overview of Web Application Security Issues

Web application security is very much in its infancy – some security experts believe this is going to be a major emerging area of technology. Nowadays web apps are more complex and are based on a client-server architecture. This architecture…

Web App Security

Web App Security 7/2011

Latest News From the IT Security World By Armando Romeo, eLearnSecurity and ID Theft Protect Mummies still walk among us! By Ali Al-Shemery Imagine all the great sources of information on the Internet today such as: news groups, blogs, websites…

Wireless ad hoc Network and its Vulnerabilities

A mobile ad-hoc network (MANET) is a self configuring infrastructure-less network, consisting of mobile devices, connected via wireless links. Each device in MANET can move independently from others in any direction, and therefore change its links very frequently. Each device…

Insceure Acces Control

Insecure Access Control 06/2011

Latest News From the IT Security World by Armando Romeo, eLearnSecurity ID Theft Protect A Hole in Your Access Control! by Ali Al-Shemery A couple of days ago I was called out to a do a security audit on a…

Mobile Security - Hakin9 04/2011

Mobile Security – Hakin9 04/2011

Passware Forensic Kit 10.3 – reviewMICHAEL MUNT SpyShelter Application – reviewDAVID KNIFE How to use NetcatMOHSEN MOSTAFA JOKARNetcat is a network utillity for reading and writing network connections that support TCP and UDP protocol. Netcat is a Trojan that opens…