+

Tagged With / 'CIA'

November 10, 2011


Critical TCP/IP flaw fixed in November Patch Tuesday release

Microsoft released their November Patch Tuesday on the 8th November which also included a critical TCP/IP fix. The TCP/IP component affects Windows 7, Server 2008 and Vista. Microsoft said an attacker could use a specially crafted UDP data packet to trigger a crash and remotely execute code on a a targeted system. Microsoft has fixed […]

Read more

November 10, 2011

pic

Machine Learning Forensics for Law Enforcement, Security, and Intelligence

ISBN: 978-1439860694 RRP: $69.95 The first time that I quickly browsed through this book, I thought that maybe I was reading this in a slightly different language as there were new acronyms and different ways of thinking on how to process information for me to learn By the time I was finished my head was […]

Read more

November 4, 2011


Banks back UK government Midata identity project

The major UK banks and card schemes are a list of 26 companies that are working with the UK government on the creation of a new personal identity system for consumers transacting online. The ‘Midata‘ initiative is an online replacement of the abandoned UK national identity card scheme. The Midata concept plans to release all […]

Read more

October 31, 2011

Hacking Data

Hacking Data 11/11

Latest News From IT Security World By Schuyler Dorsey, eLearnSecurity i ID Theft Protect As usual specialists from companies eLearn Security and ID Theft protect will share with us latest news from IT security world. Read it to up-date yourself. Secure Log Server With Rsyslog By Leonardo Neves Bernardo This article will discuss how to […]

Read more

October 24, 2011

Exploiting Software 02/11 - Exploit Format Strings with Python

Exploiting Software 02/11 Exploit format Strings with Python

Cracking Java Applications Using AOP Exploits (part 2) By Daniel Drozdzewski AOP has been used in the domain of Software Security before. Its use was mainly for validation, auditing and authorization purposes, which in turn improve software security as a whole. Those crosscutting concerns are being woven into the existing software after the fully functional […]

Read more

October 20, 2011


Four million people victims of identity fraud in the UK

It’s National Identity Fraud Prevention Week this week in the UK. As part of Julian’s identity fraud awareness push he’d like just go over some old ground. Fellowes a paper-shredding supplier commissioned a report which highlighted that 7 per cent of the UK population (4 million people) have been a victim of identity fraud at […]

Read more

October 17, 2011

Hakin9 Botnet

Hakin9 Extra – Botnet 05/2011

A study of a Botnet creation process and the impact of a DDoS attack against a web server by Stavros N. Shaeles and Ioannis D. Psaroudakis Over the following paragraphs we are going to describe in steps, the procedure of setting up a botnet in order to execute our DDoS attack. The purpose of building […]

Read more

October 14, 2011


Apple fix 96 vulnerabilities in iOS 5 release

Apple has this week (12th October) released it’s latest mobile operating system called iOS 5. The new iOS 5 patches 96 vulnerabilities, including 69 security fixes for WebKit. The more notable security fixes included are; memory corruption issues that could lead to arbitrary code execution, cross-origin issues that could result in a cross-site scripting attack, […]

Read more

October 14, 2011


Facebook and Twitter social media API security

Julian Evans wondered for some time whether it might be possible to develop a security app for Facebook, that provides protection at levels similar to Internet security suites. Julian’s research has concluded that providing a scanning, tracking and notification based AV type system is very difficult to deploy due to restrictions in the Facebook and […]

Read more

October 7, 2011


SpyEye banking Trojan uses SMS hijacking feature

SpyEye has been observed trying to trick users into reassigning their cellphone numbers to receive one-time passwords (OTP) from their banks by SMS. The social engineering scam (assuming SpyEye has already infected the target PC) is found on fraudulent pages injected into a users online banking session that falsely claim they have been assigned a […]

Read more

October 7, 2011


Facebook scammers exploiting Steve Jobs death

Facebook scammers are exploiting the death of Apple chief Steve Jobs. A few hours after Steve Jobs’ death scammers were busy creating a Facebook page called “R.I.P.Steve Jobs” which contained a malicious URL and text claiming that 50 free iPads were being given away ‘in memory of Steve Jobs’. The page gained five new fans […]

Read more

September 28, 2011

ios_apple_logo

Apple OS X and iOS Hacking News

READ THE WHOLE ARTICLE This month’s article focuses on Apple technology hacking that has been identified thus far in 2011. Here you will find a compilation of some high profile media reports and research from the Web on the hacking of Apple technology. There are two sections – Mac OS X and iOS (iPad; iPod […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa