+

Archive for / 'Articles'

August 5, 2011


PayPal is a scum! – Interview with Amir Taaki and Patrick Strateman.

Recently 77 milions accounts on Sony Playstations have been hacked, and with those creditcards details people can spend the money. If they had used bitcoins that wouldn’t have happened…” – says Amir Taaki and Patrick Strateman from bitcoin developers team in the interview given too Hakin9 SUBSCRIPTION FOR INDIVIDUAL SUBSCRIBERS Comments

Read more

August 5, 2011


Bitcoin online and off-line opportunities for commerce

If you are planning on integrating Bitcoin into your online shop, you probably know most of the benefits of Bitcoin. Although many people may already know about Bitcoin’s lack of need for a central authority, and its ability to bypass slow, expensive, insecure, and cumbersome payment networks built during the 20th century, not many technologists […]

Read more

August 5, 2011


Bitcoin – Destined to Fail

„Security is not built into the Bitcoin system, and the system does not actively protect users from themselves. It is destined to fail.” by Rebecca Wynn SUBSCRIPTION FOR INDIVIDUAL SUBSCRIBERS Comments

Read more

August 3, 2011


Passive RFID Tag Security: Electronic Product Code E-Passport and Contactless Credit Card

Because on their impact on the applications, security vulnerabilities of RFID tag technologies, when they are uncovered, easily draw media attention. The wireless security and access control of some key recent RFID-based technologies have been, although, interestingly designed. From this article you will learn what three key RFID-based applications are doing to secure their wireless […]

Read more

July 28, 2011


RFID for Newbies, Sauce Security

Everyone knows what RFID means. However, details behind this word are usually unknown or misunderstood. We provide in this article an introduction to the Radio-Frequency IDentification technology and highlight the related security and privacy issues related to this ubiquitous technology. This is an introducing article to RFID security issues. Read it before enjoying the rest […]

Read more

July 28, 2011


RFID Security and Privacy Issues

Here’s a real-world scenario: You’re a successful executive at a large software company. You’re about to be robbed but it won’t be through cyber-crime or zero-day malware exploiting CVEs, as I usually write about. As you walk into your local Starbucks to pick up your favorite cup of coffee, a young man bumps into you, […]

Read more

July 28, 2011


The RFID and NFC Radio Frequency – Enabled Security Threat

A discussion on how radio frequency-enabled technology could leave people vulnerable to identity theft and then potential identity fraud. Read the article and find out why Expert Julian Evans claims, that it’s only a matter of time before someone or a cybercrime gang finds a method that steals both the personal and business data from […]

Read more

July 28, 2011


RFID and Privacy – An Interview With Dr. Ann Cavoukian

Dr. Ann Cavoukian is recognized as one of the leading privacy experts in the world. An avowed believer in the role that technology can play in protecting privacy, Dr. Cavoukian’s leadership has seen her office develop a number of tools and procedures to ensure that privacy is protected in Ontario – and around the world. […]

Read more

July 28, 2011


MITM using Cain: Client Side Attack

As a Boss, have you ever tried to find out what your employee is working on with his office desktop? As a network admin, have you thought of finding who is flooding the network with trivial issues? As a parent, are you eager to know what sites your kid is browsing? If your answer is […]

Read more

July 28, 2011


When is Private Not Private? Making Sense of European Privacy Law

The EU has recently changed the law regarding the saving of cookies on users’ computers by websites. The Privacy and Electronic Communications Regulations (PECR) have been updated to increase privacy for website visitors and require websites to obtain consent from visitors prior to storing a cookie on the visitor’s computer. Let’s think about this for […]

Read more

July 28, 2011


Security by Hiding!

I was once talking to a friend of mine about client side attacks, and how they can lead to a full compromise of the companies private network. He told me that they were safe because: first – they use a third party to host their website, and second – no one knows what IP address […]

Read more

July 28, 2011


The Astalavista Experience

The Astalavista Experience Astalavista.com is an IT News & Security community. It serves as a starting point for IT and security news with its continuous news stream on the main page. But Astalavista is much more, for the technical interested and IT savvy people there are a multitude of tools which can be used. These […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa