+

Category: News

March 30, 2012


Mozilla developing privacy based B2G mobile project

Mozilla (the developers behind the Firefox browser) are in early stage development of an open source mobile and tablet operating system called Boot to Gecko (B2G). The key differentiator of this mobile OS is that they are marketing this around a privacy permissions model rather than attempting to compete directly with Android, iOS or WP7/8. At […]

Read more

March 30, 2012


Lookout lost mobile device survey just doesn’t add up – Julian’s thoughts

Mobile security company Lookout recently published a survey that claims US citizens lost $30 billion worth of mobile devices in 2011. The Lookout survey makes it very clear that on average every US citizen loses a mobile device once a year. Really? Now, come on Lookout, this survey seems to be about creating media hype (and I’m […]

Read more

March 30, 2012


Employers accessing your Facebook login details

Facebook on Friday 23rd March warned employers around the world that requesting job applicants to provide their Facebook password is in breach of its Terms and will likely cause legal issues. Facebook has seen an increase in demand for job applicant login details. Erin Egan, Privacy Officer for Facebook has clearly stated Facebook will on no […]

Read more

March 30, 2012


Will the Pinterest Privacy and TOS update be enough?

Pinterest (which is a bookmarking image website) users will be seeing some privacy and Terms of Service (TOS) changes starting on April 6th. The 12 million Pinners that use Pinterest will have to now adhere to new terms of service and have to follow the updated acceptable use and privacy policies from the 6th. The Pinterest […]

Read more

March 30, 2012


Always password protect your mobile device

Enabling the inbuilt mobile password (passcode) protection should be one of the first things you do when you first fire up your new expensive cherished device. You don’t want someone to be able to read or post Facebook status updates, post tweets, and send SMS’s and emails or listen to your private voicemails do you? If […]

Read more

March 20, 2012


Why you should unhide Mac OS X filename extensions

Mac OS X users should be aware that there is a new variant of the Imuler Trojan. My colleagues at Intego found the latest iteration which attacked the user’s system disguised as an an image file with .zip archives titles “Pictures and the Article of Renzin Dorjee.zip” and “FHM Feb Cover Girl Irina Shayk H-Res […]

Read more

March 20, 2012


Caller ID spoofing isn’t a lost art just yet folks

Caller ID spoofing (this is an old social engineering trick actually) is where a hacker causes a recipient’s phone to display a Caller ID number that appears to originate from a legitimate business or individual from your contact list. Fraudsters are always looking for new opportunities and with the rise of mobile use, they now have […]

Read more

March 16, 2012


Pinterest gift card scam is testing the water

Pinterest lets you organise and share things you find on the web. It’s a virtual pin board of your online and offline life. Pinterest’s goals are to connect everyone in the world through the ‘things’ they find interesting. Someone who uses Pinterest is called a ‘Pinner’. The picture-based service has though become a target for […]

Read more

March 16, 2012


CrowdStrike identify WebKit Remote Code Execution (RCE)

CrowdStrike a new company formed by former CTO of McAfee George Kurtz recently purchased the 20 plus WebKit vulnerabilities ($1,400) that led to the Remote Code Execution (RCE) exploit being exposed at RSA earlier this month. George and his new team spent $14k weaponizing it into an actual Android exploit, with the aim of establishing root […]

Read more

March 16, 2012


AV-Test reissues Android security apps test

AV-Test.org a reputable anti-virus testing company, whom I know well, recently (March 6th) conducted a test to find out the level of protection offered by Android anti-malware solutions. The test would rank each of the 41 vendors by detection and remediation, similar to the testing they and other labs perform in the PC environment. The test […]

Read more

March 16, 2012


Mac OS X Keychain Access application hints and tips

Keychain Access is a Mac OS X application (password and certificate manager) that allows you to access the Apple Keychain and configure passwords for websites/applications, network shares, wireless networks, certificates and manage root certificates, keys and secure notes to name but a few features. More importantly you can use Keychain Access to store application passwords, chip […]

Read more


March 16, 2012


SecPoint’s Cloud Penetrator Review

SecPoint® Cloud Penetrator “Online vulnerability assessment scan” Waking up every morning a skeptic is not that difficult. By 10 AM there are usually two or three interactions that prove I was right. I was invited by Hakin9 to do an evaluation of a product called “SecPoint® Penetrator”, a service provided by SecPoint® of Copenhagen Denmark […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa