Tagged With / 'hack'

November 17, 2011

Hackers posting porn on Facebook in major attack on social network

Facebook has been under attack from violent images and porn on several users’ profile pages. It appears to be one of the most prolific breaches of Facebook security since it was first launched. Users have been tricked into pasting malcious code (possible clickjacking or XSS?) into their browsers which enable hackers to gain access to […]

Read more

October 31, 2011

Hacking Data

Hacking Data 11/11

Latest News From IT Security World By Schuyler Dorsey, eLearnSecurity i ID Theft Protect As usual specialists from companies eLearn Security and ID Theft protect will share with us latest news from IT security world. Read it to up-date yourself. Secure Log Server With Rsyslog By Leonardo Neves Bernardo This article will discuss how to […]

Read more

October 27, 2011

Sixty popular Swedish websites hacked by ‘sc3a5j’

Sixty popular Swedish websites have been identified as potential targets in a massive password hacking incident in Sweden. A leading Swedish Democrat had his Twitter account hacked. The hacker(s) preceded to tweet email addresses and MD5 hashes of passwords of top Swedish journalists. In addition to this databreach, popular Swedish blogging portal ‘Bloggtoppen’ says that […]

Read more

October 17, 2011

Hakin9 Botnet

Hakin9 Extra – Botnet 05/2011

A study of a Botnet creation process and the impact of a DDoS attack against a web server by Stavros N. Shaeles and Ioannis D. Psaroudakis Over the following paragraphs we are going to describe in steps, the procedure of setting up a botnet in order to execute our DDoS attack. The purpose of building […]

Read more

October 7, 2011

nVidia GeForce GPU cracks six character password in four seconds

An nVidia GeForce GT220 graphics card, which costs about 30 GBP, is capable of cracking strong passwords in a matter of hours. Security experts were able to crack a  6 character password in 4 seconds, a 7 character password in less than 5 minutes, and 8 character password in four hours. It appears people have […]

Read more

October 5, 2011

Events SecurityUniversity No Comments

OCTOBER 2, 2011 9/11 GI Bill allows non-dgree SU Q/ISP Classes

Leading Hands-on Q/ISP IS Graudate Certification & classes 9/11 GI BILL Approved Q/ISP CyberSecurity IS Certification Classes Q/ISP® Cert Exam CNSS 4011/4012/4013/4015/ 4016A Q/EH® Qualified/ Ethical Hacker Certification Q/SA® Qualified/ Security Analyst Pen Tester Cert. Q/PTL Qualified/ Penetration Tester License Q/FE® Qualified/ Forensic Expert Certification Q/ND® Qualified/ Network Defender Certification Q/ISP® Qualified/ Information Security Professional […]

Read more

September 29, 2011

UKChatterbox IRC website personal data stolen

Popular UK IRC service UKChatterbox has commenced advising users to change their passwords following a databreach which culminated in compromised data being stolen. Users had been reporting outages which were originally put down to maintenance upgrades – however it has become clear that the reason wasn’t maintenance but a hack attack. UKChatterbox has been the […]

Read more

September 28, 2011


Apple OS X and iOS Hacking News

READ THE WHOLE ARTICLE This month’s article focuses on Apple technology hacking that has been identified thus far in 2011. Here you will find a compilation of some high profile media reports and research from the Web on the hacking of Apple technology. There are two sections – Mac OS X and iOS (iPad; iPod […]

Read more

September 28, 2011

Hack Apple

Hack Apple 10/11

In Brief By Schuyler Dorsey, eLearnSecurity i ID Theft Protect As usual specialists from companies eLearn Security and ID Theft protect will share with us latest news from IT security world. Read it to up-date yourself. Hacking Tools on iOS By Alexandre Lacan One day I was asked if the iPhone is a good phone. […]

Read more

September 23, 2011

Exploting Software

Exploiting Software 1/2011

CONTENT: Cracking Java Applications Using AOP exploits (part 1) By Daniel Drozdzewski Aspect Oriented Programming is a paradigm that aims to modularise software further by the separation of crosscutting concerns. Daniel will show us the basics of AOP and a simple, yet powerful idea behind the exploit. Smashing the Stack By Mariano Graxziano and Marco […]

Read more

September 22, 2011

CryptoTutorials: Part 4

By Israel Torres, a hacker at large with interests in the hacking realm and an author of crypto challenge: http://hakin9.israeltorres.org Tools when understood are quite helpful in saving time. This tutorial goes over using a few homebrew tools to help validate old and new algorithms. This both helps find strengths and flaws in your own […]

Read more

September 21, 2011

The Facebook friend request data mining plug-in

A new cross platform Java Facebook proof of concept (PoC) hacking plug-in data mining tool could turn your closest friends into your worst enemies – social engineering anyone? The plug-in tool (created by a team at RISST), called “Facebook Pwn“, lets Facebook criminals (and normal users like us) — steal personal profile information from any […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa