Tagged With / 'criminals'

March 1, 2011

Magazine admin Comments Off
ID Theft - Hakin9 03/2011

ID Theft – Hakin9 03/2011

The best way, to learn and apply cryptography ARKADIUS C. LITWINCZUK The CrypTool project is about making the sometimes daunting subject of cryptography more accessible and easy to understand. It is the most comprehensive cryptography learning tool worldwide. Analysis of a Scam RICH HOGGAN It’s all to often that we hear about being scammed on […]

Read more

November 1, 2010

A Brief Analysis of the Cyber Security Threat

A definition of cyber security Cyber security can be broadly described as protecting personal/business or government digital assets from cyber attack from individuals, organised criminals or foreign governments. Cyber security encompasses three threat vectors; cyber warfare; cyber terrorism and cyber attacks. Each of these threat vectors’will need to be addressed by a country’s citizens, its […]

Read more

October 1, 2010

Proactive Defenses and Free Tools

Some of the best countermeasures and most of them are free. In my last article, I described the greatest breach in cyber history and made some suggestions on how it could have been avoided – enabling strong wireless encryption, testing your wireless routers for vulnerabilities, visiting http:// nvd.nist.gov, limiting the number of trusted devices allowed […]

Read more

August 18, 2010

Magazine admin Comments Off
Mobile Malware – the new cyber threat 08/2010

Mobile Malware – the new cyber threat

Botnet:The Six Laws And Immerging Command & Control Vectors Richard C. Batka New BotNet communication vectors are emerging. The industry is not prepared. For the next 20 years, BotNets will be what viruses were for the last 20. Hacking Trust Relationships Part II Thomas Wilhelm This is the second article in a series of six […]

Read more

August 1, 2010

Mobile Malware – the new cyber threat – An analysis of the potential malware threat to mobiles

Mobile phone malware first appeared in June 2004 and it was called Cabir. The mobile-phone features at most risk are text messaging (using social engineering), contacts list, video and buffer overflows. GSM, GPS, Bluetooth, MMS and SMS will indeed be some of the attack vector to expect this year and beyond. Author: JULIAN EVANS Source: […]

Read more

August 1, 2010

Is Anti-virus Dead – The answer is YES. Here’s why…

There have been billions of dollars in damages caused by exploiters on the Internet. These exploiters are intelligent cyber terrorists, criminals and hackers who have a plethora of tools available in their war chest – ranging from spyware, rootkits, trojans, viruses, worms, zombies and botnets to various other blended threats. From old viruses to these […]

Read more

July 1, 2010

Securing the Cloud: Is it a Paradigm Shift in Information Security?

First let me start by saying No. There’s really nothing new in the Cloud except where risk appears to shift. But does it really? Author: GARY S. MILIEFSKY Source: Hakin9 7/2010 https://hakin9.org What you will learn… The Basics of Cloud Computing Holes in the Cloud Hardening the Cloud What you should know… Basic Networking Scanning for […]

Read more

May 1, 2010

Beginner’s Guide to Cybercrime

Understanding Attack Methodologies and a More Proactive approach to Defense If you are a regular reader of Hakin9 Magazine, you probably already know a great deal about hacking. But do you know the difference between traditional crime and cybercrime? Do you know where are the cybercrime magnets? Source: Hakin9 5/2010 https://hakin9.org What you will learn… Types […]

Read more

June 1, 2009

A Look at How the Mobile Phone Opens the Door to Location (LBS) Tracking, Proximity Marketing and Cybercrime

A Brief History of Mobile Time The very first public commercial mobile phone network was ARP network in Finland which was launched as far back as 1971. Then a few years later the first generation mobile cellular network was launched by Bell Labs in Chicago in 1978, with the second generation (2G) appearing in 1991 […]

Read more

May 1, 2009

The Underworld of CVV Dumping Carding and the Effects on Individuals and Business and Ways to Prevent it

What is a CVV Number? CVV stands for CARD VERIFICATION VALUE CODE (CVV). CVV is an authentication procedure which was established by credit card companies to further efforts towards reducing fraud over the Internet. The procedure is in fact very simple indeed. It requires the card holder to enter the CVV number whenever a transaction […]

Read more

March 1, 2009

More Thoughts on Defeating AntiVirus

Faced with the daunting task of detecting and quaranting thousands of new viruses, Trojans and other malware discovered every day, AntiVirus software vendors rely on AV signatures to protect their customers. Author: JIM KELLY Source: Hakin9 3/2009 https://hakin9.org WHAT YOU WILL LEARN… How to modify code to defeat signature based antivirus software How to recompile code to avoid […]

Read more

February 1, 2009

How Does Your Benchmark of Physical Security Affect Your Environment?

Many of us are familiar with the equation: Risk = Threat x Vulnerability x Consequence and we have also learned that in order to make the most sense of that equation we must define, and then weigh, those three variables. Author: MARY ELLEN KENNEL Source: Hakin9 2/2009 https://hakin9.org WHAT YOU WILL LEARN… An increased awareness of security systems […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa