security threat

ciso_summit_logo800px (3)

CISO Summit 2013

The CISO Summit, December 3-4, 2013, in Scottsdale, Ariz., is the premier stage for C-suite decision-makers to share insight on information security issues, while gaining access to cutting-edge solutions tailored to their individual challenges. This exclusive summit admits a finite…

Hakin9 Mobile Cover

Hakin9 Mobile 1/11 (1)

Android Insecurities by Joey Peloquin The article will begin with a focus on what the author calls Offensive Mobile Forensics, an analysis technique that mimics the approach an attacker would take in the event they acquired a lost or stolen…

Online Banking Security Magazine 1/2011

Online Banking Security Magazine 1/2011

The Compleat Angler – a Phishing Primer David Harley Attacks, Securing and Impacts on Mobile & Internet Banking Vivek P. Nair The Real Cost of Poor Security Menagement httP://www.qUAntAiniA.com/ Security Bridge in DTMF Amitay Dan Next Generation Mobile Banking Attevo…

Hacking RFID

Hacking RFID 8/2011

Latest News From the IT Security World By Armando Romeo, eLearnSecurity and ID Theft Protect Security by Hiding! By Ali Hadi I was once talking to a friend of mine about client side attacks, and how they can lead to…

Exploit Kits – Cybercrime Made Easy

The playing field for cybercrime has changed. It has become wide open. Many of the top attack exploit toolkits are now free! Symantec released its 2010 Symantec Internet Security Threat Report the first week in April 2011. Their executive summary…

Exploiting Software

Hakin9 Extra 1/2011 – Exploiting Software

Ask the Social Engineer: Exploitation of the Human OS – The Human Buffer Overflow by Chris Hadnagy Total domination is the goal for a penetration tester in every pentest – To utterly hack the company and demonstrate their true exposure…

ninja cover

Review of Ninja Hacking

Review of Ninja Hacking Unconventional Penetration Testing Tactics and Techniques By Michael Munt www.syngress.com   This is an unusual title for a book that is being aimed at the Security community and when I first looked at it i thought…

Cloud Security 05/2011

Cloud Security 05/2011

In brief Armando Romeo and ID Theft Protect A Beginners Guide to Ethical Hacking – review SHYAAM SUNDHAR Coranti – review MICHAEL MUNT IPv6 Secure Transition Network Architecture MICHEL BARBEAU IPv6 has the capability to handle an astronomically large address…

An analysis of the cloud security threat

The cloud is very much the talk of the IT media town these days. Client side computational resources are still in demand but IT vendors and businesses are looking to the cloud in the hope that third-party companies will manage…

Botnets, Malware, Spyware - Hakin9 11/2010

Botnets, Malware, Spyware – Hakin9 11/2010

The Spyware Within YouRajat KhareYes, today’s spyware though resides in your computer or mobile but it’s pretty much inside you. Whatever we do, wherever we go it’s stored in a computer or an embedded device like mobile phone. The Ear…