+

Tagged With / 'CIA'

September 28, 2011

Hack Apple

Hack Apple 10/11

In Brief By Schuyler Dorsey, eLearnSecurity i ID Theft Protect As usual specialists from companies eLearn Security and ID Theft protect will share with us latest news from IT security world. Read it to up-date yourself. Hacking Tools on iOS By Alexandre Lacan One day I was asked if the iPhone is a good phone. […]

Read more

September 26, 2011

9781439801505

Review of Vulnerability Management

Review of Vulnerability Management By Aby Rao, CISSP, CISA, ITIL, Security+, ISO/IEC 20000 http://www.crcpress.com/product/isbn/9781439801505   Imagine this: You are a Security Engineer in a medium-size company and you are invited into your bosses’ office for an important one-on-one meeting. Your boss breaks the news that you have been entrusted with the job of starting a […]

Read more

September 25, 2011

9781439801505

Vulnerability Management

Vulnerability Management By Park Foreman August 2009 Publisher: CRC Press http://www.crcpress.com/product/isbn/9781439801505   50% DISCOUNT for Hakin9 SUBSCRIBERS!!! To save 50% enter given below discount code, during checkout at www.crcpress.com. Description As old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms […]

Read more

September 21, 2011


The Facebook friend request data mining plug-in

A new cross platform Java Facebook proof of concept (PoC) hacking plug-in data mining tool could turn your closest friends into your worst enemies – social engineering anyone? The plug-in tool (created by a team at RISST), called “Facebook Pwn“, lets Facebook criminals (and normal users like us) — steal personal profile information from any […]

Read more

September 15, 2011

Backtrack 5 book image

BackTrack 5 Wireless Penetration Testing Beginner’s Guide

Packt has recently published BackTrack 5 Wireless Penetration Testing Beginner’s Guide – a new book that will help users master bleeding edge wireless testing techniques. Specially for Hakin9 readers Packt granted a code: bt5wpteb, which gives 30% discount for e-copy of the book!   Overview of BackTrack 5 Wireless Penetration Testing Beginner’s Guide Learn Wireless […]

Read more

September 15, 2011

Android

Hakin9 Extra – Android Security

Mobile Malware Analysis by Cory Adams With the emergence of the Android OS into the mobile market, nation state hackers and criminals alike are actively conducting attacks against the OS and its users for information gathering and financial gain. A high reward tool in an attacker’s arsenal is malicious software or malware, which allows information […]

Read more

September 13, 2011

passware-kit-11-180

Passware Kit Forensic v11 Cracks Mac User Login Passwords

Password extraction is possible even if the computer is locked or put to sleep – after a user logs in, password remains in memory. Passware Kit Forensic is the first commercial software that recovers login passwords for Mac OS users in a matter of minutes. It supports all modern versions of Mac OS, including 10.6 […]

Read more

September 6, 2011

back track cover

BackTrack 4: Assuring Security by Penetration Testing

BackTrack 4: Assuring Security by Penetration Testing By Shakeel Ali, Tedi Heriyanto Publisher: Packt http://link.packtpub.com/Ks5ViS 30% DISCOUNT for Hakin9 WHOLE SUBSCRIBERS!!! Add the eBook to the shopping cart on the Packt website. Eenter the CODE: ‘opbgsms‘ in the ‘Enter Promotion Code’ field. Then Click ‘Add Promotional Code’ and the discount will be applied. Description BackTrack […]

Read more

August 31, 2011

Secure Coding

Secure Coding 9/11

In Brief By Armando Romeo, eLearnSecurity and ID Theft Protect The Bug Story By Ali Hadi Despite the fact that our Networks gardens are full of beautiful/gorgeous things, at same time they’re full of bugs. The problem is that the Internet serves as connection between these gardens, which makes it easy for bugs to travel […]

Read more

August 25, 2011


Social Media

Twitter, Facebook, Gmail, LinkedIn, Skype, the list goes on and on and a majority of the one billion people that use these social net working sites consistently use them while at work. This unchecked flow of data is a new source of sensitive information and creates se curity loopholes for serious cyber attacks. From a […]

Read more

August 25, 2011


Secure Out-of-band Management of Critical Infrastructure at The Enterprise Branch Office

As the enterprise pushes into the cloud, it is important to remain mindful of the distributed IT and communications assets that ar fundamental to day-to-day operations. The widespread adoption of IaaS solutions to virtualize back office infrastructure has allevi ated some of the management and maintenance headaches as sociated with physical IT infrastructure, however it […]

Read more

August 25, 2011

penetration tester's open source cover

Review of Penetration Tester’s Open Source Toolkit

Review of Penetration Tester’s Open Source Toolkit 3rd Edition By Michael Munt www.syngress.com   There are so many different varieties of penetration testing tools available, and the commercial versions of these can be very expensive and not always that easy to use, this book will aid you in choosing certain types of tools for certain […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa