+

Archive for / 'Articles'

July 16, 2011


Phishing

As the world of cyber space evolved, so did the various beleaguered complications. Nothing it seems comes without a loophole. The reach of internet in banking and shopping domain has increased exponentially in the past decade and so has the innocuous attempts at gaining perfidious and pervert secret access to the various interacting channels of […]

Read more

July 16, 2011


Design Flaws in IP Surveillance Cameras – Exploiting Web Interfaces

IP surveillance cameras are used extensively for monitoring of live targets. However, inherent design of web interface of IP surveillance cameras suffers from various flaws. This paper sheds light on the vulnerabilities that exist in the design and deployment of web application interface of IP surveillance cameras. This paper is an outcome of the extensive […]

Read more

July 15, 2011


Proactively Defending Against Identity Theft

ID theft is a crime that takes place when someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception for financial gain. You might be able to protect your fingerprints for some time, as they are unique to you and cannot be given to someone else for their […]

Read more

July 15, 2011


Identity Proof Your Personal Data

Information is being collected about us every second of every day without us ever realizing what happens to it. Most of us don’t really care what happens to our personal data as long as it isn’t misused. So let’s go up close and persona by taking a brief glance at how you can protect your […]

Read more

July 15, 2011


Ask The Social-Engineer: How do Identity Thieves Use Social Engineering Skills?

This is a good question. There are quite a few ways that social engineering is used by malicious identity thieves, let me name just a few methods that are used and then you will see how they do their deeds. by Christopher Hadnagy Comments

Read more

July 15, 2011


Nessus Basics

The „Nessus” Project was started by Renaud Deraison in1998, Nessus was not the first free open-source vulnerability scanner but it is the most ubiquitous open source scanner. On October 5, 2005, Tenable Network Security changed Nessus 3 to a proprietary license. Organizations could now pay for reliable assistance or a fully supported appliance to operate […]

Read more

July 1, 2011


Web Testing Using Active and Passive Scanners

Website creation has become so simple that just anyone can do it. This doesn’t mean that everyone can do it well. There are so many frameworks and tools available to make dynamic sites easy to put up quickly. The author of this article shows how to scan systems using both an active and a passive […]

Read more

July 1, 2011


Does your BlackBerry smartphone have ears?

The smartphone becomes the most popular gadget all over the world. Undoubtedly, compactness, convenience and PCs’ functional capabilities have been winning modern users’ hearts. People may think that Internet surfing is safer with their favorite smartphone than by PCs and that the privacy loss risk is minimized, however analytical statistics show the opposite. From this […]

Read more

July 1, 2011


Mummies still walk among us!

Imagine all the great sources of information on the Internet today such as: news groups, blogs, websites and forums, and you still see networks, and websites being hacked and torn down using old hacking techniques. For God sake, isn’t that a walking mummy? The author in amusing way describes why it is so important to […]

Read more

July 1, 2011


Firestarter: Starter to your Firewall

The firewall is the first line of defense on the network perimeter and end points. Firewalls are the gatekeepers to facilitate the flow of necessary traffic to and from assets. The author in his article focuses on the best practices when setting up a host-based firewall on a Ubuntu 10.4 LTS laptop. He describes how […]

Read more

July 1, 2011


HTTP Parameter Pollution Vulnerabilities in Web Applications

Is your web application protected against HTTP Parameter Pollution? A new class of injection vulnerabilities allows attackers to compromise the logic of the application to perform client and server-side attacks. HPP can be detected and avoided. But how? This article discusses why and how applications may be vulnerable to HTTP Parameter Pollution. By analyzing different […]

Read more

July 1, 2011


Web Applications: Access Control and Authorization Issues

This article is about different kinds of Access Control mechanisms and issues with them in Web Applications. Where sufficient authorization checks are lacking, access controls may be abused by the logged-in user. The impact can be catastrophic. Improper access control handling may result in information leakage or worse unauthorized access to system components. The article […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa