Hackers about hacking techniques in our IT Security Magazine

malware

07

Oct'11

Facebook launches anti-malware URL scanning service

Facebook is introducing URL (link scanning) protection for its users as from today (Oct 3rd, 2011). When a user clicks …

Read More

29

Sep'11

Google Chrome AutoFill privacy and security issues

Google Chrome users who read julianevansblog.com, have voiced concerns on a number of occasions recently about the AutoFill feature. Let’s …

Read More

21

Sep'11

WordPress IE PHP code injection threat identified

New malware is found which is infecting into the WordPress. The Mal/Badsrc-c is detected in the index.html, which would display …

Read More

21

Sep'11

The Facebook friend request data mining plug-in

A new cross platform Java Facebook proof of concept (PoC) hacking plug-in data mining tool could turn your closest friends …

Read More

14

Sep'11

Microsoft release 15 patches on Patch Tuesday

Microsoft has released 15 patches for vulnerabilities affecting the Microsoft Server Software and Windows Microsoft office software. The Vulnerabilities in …

Read More

14

Sep'11

McAfee/Intel announce CPU hardware anti-rootkit technology

CPU hardware anti-rootkit protection was mentioned by me some years ago as I always felt that root level kernel protection …

Read More

14

Sep'11

SpitMo SpyEye toolkit targeting Android smartphones

The SpitMo SpyEye hacking toolkit app is targeting smartphones running on the Android operating system according to security vendor Trusteer. …

Read More

12

May'11

Canada Becomes Second-Largest Malware Source

Cyber-criminals appear to be on the move, switching from Chinese and Eastern European IP addresses in favour of Canadian ones, …

Read More

12

May'11

Zeus Source Code Leaked

The source code to the infamous Zeus crimeware kit, which has been sold on underground forums for years, has been …

Read More

06

Apr'11

Social network malvertising on the rise

A recent security report has highlighted a significant rise in the number of malware and malvertising attacks on social networks. …

Read More