Tagged With / 'CIA'

August 17, 2011

Ask The Social-Engineer: Neuro-Linguistic Hacking-The New Age of Social Engineering

Social engineering is nothing new. From some of the oldest stories recorded in mankind? history till today, social engineering has been used. The interesting part about social engineering is that the methods used have not changed much. Sure there is new technology and a deeper understanding of humans and psychology, but the underlining principles of […]

Read more

August 17, 2011

Hakin9 Extra 3/2011 - Forensics

Hakin9 Extra 3/2011 – Forensics

Basic Forensics Analysis by Marc-Andre Meloche Digital Forensics is mostly like the movies, the main aspect is to gather evidence or digital footprints which will help you understand any digital crimes that might have occurred inside your organization. This is used in most cases related to computer crimes. New crime vectors are now implicating the […]

Read more

August 16, 2011

Pwering the Cloud 2011

‘Powering the Cloud’ is the exciting new theme for the 2011 editions of SNW Europe, Datacenter Technologies and Virtualization Worldtaking place on 2nd and 3rd November at Congress Frankfurt. Cloud computing, impacting almost every size and type of organisation today, is the new wave of IT architecture, a natural evolution of the widespread adoption of […]

Read more

August 15, 2011

CyberLympics 2011-2012

U.N. Cybersecurity Arm Endorses EC-Council’s Global CyberLympics Global CyberLympics, a new initiative by the EC-Council to foster stronger international cooperation on information security issues and to improve cybersecurity training and awareness in developing nations and third world countries. Created by EC-Council, the Global CyberLympics is a series of ethical hacking games comprised of both offensive […]

Read more

August 12, 2011

Cloud Security Alliance Congress 2011

Event: Cloud Security Alliance Congress 2011 Date: November 16-17, 2011 Venue: Disney’s Yacht Club Resort, Orlando, FL http://www.misti.com/ The Second Annual Cloud Security Alliance Congress will provide practical solutions for managing the transition to the cloud, and implementing security as a key component rather than an afterthought of this transition. It will provide insight on […]

Read more

August 11, 2011

Created by Gildas Avoine

Stay Informed on Current Research Activities in RFID Security and Privacy!

The RFID Security and Privacy Lounge is a free website dedicated to researchers and engineers that references scientific works on security and privacy in Radio Frequency IDentification. Created in 2004, the lounge is nowadays a key-reference all around the world. With pointers to more than 500 publications, it keeps growing steadily and was visited nearly […]

Read more

August 5, 2011

Mining – tutorial for rookies miners

One of the most desirable aspect of internet’s currency, Bitcoin, is the way it is produced. Very differently from most currencies, where the power and decision to make more money are held on the hands of central and commercial banks along with governmental interests, the bitcoin system has a very open and decentralized production where […]

Read more

August 3, 2011


Hakin9 StarterKit – Bitcoin 1/2011

BitCoin A Secure Coin by David Montero „In this article we will know where bitcoins come from, their future, how to get them, what can we do with them, and most importantly, how to protect them.” BitCoin – how it works by Jeremy Lichtman „BitCoins are a fascinating experiment in economics – a field that […]

Read more

July 28, 2011


Defense Against the Black Arts: How Hackers Do What They Do and How to Protect Against It

Defense Against the Black Arts: How Hackers Do What They Do and How to Protect Against It By Jesse Varsalone and Matthew McFadden September 2011 Publisher: CRC Press http://www.crcpress.com/product/isbn/9781439821190 50% DISCOUNT for Hakin9 SUBSCRIBERS!!! To save 50% enter given below discount code, during checkout at www.crcpress.com. Description As technology has developed, computer hackers have become increasingly sophisticated, […]

Read more

July 28, 2011


The Security Risk Assessment Handbook

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments By Douglas Landoll May 2011 Publisher: CRC Press http://www.crcpress.com/product/isbn/9781439821480 50% DISCOUNT for Hakin9 SUBSCRIBERS!!! To save 50% enter given below discount code, during checkout at www.crcpress.com. Description Picking up where its bestselling predecessor left off, The Security Risk Assessment Handbook: A Complete Guide […]

Read more

July 27, 2011

rebecca cover

Identity Theft/Fraud – Self Protection Toolkit

READ THE WHOLE ARTICLE! Your identity is a valuable commodity. You need it to function in everyday life. You need evidence of who you are to open bank accounts, obtain credit cards, finance, loans and mortgages, to obtain goods or services, or to claim benefits. But you may not be the only person using your […]

Read more

July 15, 2011

Proactively Defending Against Identity Theft

ID theft is a crime that takes place when someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception for financial gain. You might be able to protect your fingerprints for some time, as they are unique to you and cannot be given to someone else for their […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa