+

Archive for / 'News'

February 3, 2012


Chrome 17 beta Do Not Track (DNT) extension

A privacy advocate has developed a Chrome version of the Firefox Do Not Track extension (by adding the Do Not Track header “DNT: 1″ to all requests) technology that comes as standard on Mozilla Firefox and Internet Explorer browsers. This extension (referred to as an ‘add-on’ in Firefox) lets you inform websites that you do not want your […]

Read more

February 3, 2012


The Facebook likejacking browser vulnerability

Facebook JavaScript attacks using a known scripting vulnerability in browsers doesn’t appear to be going away very soon (as the HTML specification actually make allowances for cross-site scripting). Facebook isn’t alone in attempting to address the malicious script redirects as malware writers know only too well that all browsers suffer from this scripting flaw. You […]

Read more

February 3, 2012


How you might circumvent a mobile network

Mobile technology is evolving and as smartphone memory (including increased flash storage space), battery life and network performance improves, so will the opportunities to circumvent the existing mobile networks. Nothing is impossible with the advances being made with smartphones right now. The events in Egypt, Libya and Syria, got me thinking about how mobiles could […]

Read more

February 3, 2012


Android architecture continues to expose concerns

The days of losing a phone and only losing your mobile contacts are long gone. Nowadays your smartphone is your ‘ilife’ and it (and the network) collects (logs) data not only from text messages, emails and calls, but your Facebook and Twitter profiles as well and much much more. I’d go as far as to say […]

Read more

February 2, 2012


Interview with Richard Johnson

Richard Johnson is a computer security specialist who spends his time playing in the realm of software vulnerability analysis. Richard currently fills the role of principal research engineer on Sourcefire’s Vulnerability Research Team, offering 10 years of expertise in the software security industry. Current responsibilities include research on exploitation technologies and automation of the vulnerability […]

Read more

January 26, 2012


How to securely delete Mac OS X files in Trash basket

Ever wondered whether your deleted files in the Mac OS X Trash basket are actually deleted forever? Well, let me tell you, that any files you have deleted in Trash could still be accessed. Deleting files on your Mac is of course very easy. All you do is drag the file(s) into the Trash basket or […]

Read more

January 26, 2012


The Mac OS X Quick Look Suspicious Package plug-in

One feature I really like about Mac OS X has to be the easily forgotten ‘Quick Look’. It’s a really useful tool (and also has lots of plug-in capabilities) to have and can save you lots of time. Select an item in ‘Finder’ and press the [Spacebar] and you will see a brief preview of […]

Read more

January 25, 2012


Android.Qicsomos open source Trojan in circulation

Security researchers have uncovered a new Android malware that claims to detect Carrier IQ software on an Android device. Android.Qicsomos is a modified version of an open source project which was used to detect Carrier IQ with additional code to dial a PRS SMS number. On start-up the rogue software displays information about the device […]

Read more

January 25, 2012


Carberp Trojan stealing Ukash e-cash vouchers

The Carberp Trojan is targeting Facebook users in an attempt to steal login credentials. Carberp allows its developers to anonymously exploit Facebook users who use Ukash e-cash vouchers. Carberp replaces a user Facebook page and redirects (using a MitB attack vector) the user to a fake page notifying the user that their Facebook account is […]

Read more

January 25, 2012


Members of TeaMp0ionN hacker group target T-Mobile

Hackers from hacker group TeaMp0ioN have recently published login information for T-Mobile staff and administrators. The hackers managed to identify a SQL injection vulnerability on the T-Mobile.com and the newsroom.T-Mobile.com websites. The hackers managed to extract names, emails, phone numbers and passwords of all the administrators and staff. The hackers highlighted the manual distribution of […]

Read more

January 25, 2012


NSA releases security enhanced Android OS

The National Security Agency (NSA) has this week (Jan16th) released a security-hardened version of Google mobile OS Android. The enhanced build is based on SELinux, which was also created by the NSA. The primary function of the hardened Android OS is to limit the behaviour of flawed or malicious Android apps. The hardened OS will […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa