+

Tagged With / 'security threat'



August 6, 2013

Events News NOTICE BOARD Redaction Comments Off

CISO Summit 2013

The CISO Summit, December 3-4, 2013, in Scottsdale, Ariz., is the premier stage for C-suite decision-makers to share insight on information security issues, while gaining access to cutting-edge solutions tailored to their individual challenges. This exclusive summit admits a finite selection of leading executives and vendors, employing a strategic agenda that balances relationship-building, thought leadership […]

Read more


December 7, 2011

Magazine Redaction 1 Comment

Hakin9 Mobile 1/11 (1)

Android Insecurities by Joey Peloquin The article will begin with a focus on what the author calls Offensive Mobile Forensics, an analysis technique that mimics the approach an attacker would take in the event they acquired a lost or stolen device. Readers will notice some stark differences between iOS and Android analysis. Next, the author […]

Read more


August 23, 2011


Practical Eavesdropping of Control Data From EPC Gen2 Queries With a Programmable RFID Toolkit

READ THE WHOLE ARTICLE Like in many other emerging technologies, security threats can target the unprotected wireless channel used between RFID readers and tags to exchange information. We present a practical eavesdropping attack to capture control data exchanged between a standard EPC Gen2 reader and a series of EPC Gen2 tags. We assume that the attacker […]

Read more


August 16, 2011


Online Banking Security Magazine 1/2011

The Compleat Angler – a Phishing Primer David Harley Attacks, Securing and Impacts on Mobile & Internet Banking Vivek P. Nair The Real Cost of Poor Security Menagement httP://www.qUAntAiniA.com/ Security Bridge in DTMF Amitay Dan Next Generation Mobile Banking Attevo A Close Look at The Most Evolved Security Threat to The Online Banking Hongsun Kim […]

Read more

July 28, 2011

Articles Redaction No Comments

The RFID and NFC Radio Frequency – Enabled Security Threat

A discussion on how radio frequency-enabled technology could leave people vulnerable to identity theft and then potential identity fraud. Read the article and find out why Expert Julian Evans claims, that it’s only a matter of time before someone or a cybercrime gang finds a method that steals both the personal and business data from […]

Read more


July 28, 2011

Magazine Redaction No Comments

Hacking RFID 8/2011

Latest News From the IT Security World By Armando Romeo, eLearnSecurity and ID Theft Protect Security by Hiding! By Ali Hadi I was once talking to a friend of mine about client side attacks, and how they can lead to a full compromise of the companies private network. He told me that they were safe […]

Read more

June 15, 2011

Articles Redaction No Comments

Exploit Kits – Cybercrime Made Easy

The playing field for cybercrime has changed. It has become wide open. Many of the top attack exploit toolkits are now free! Symantec released its 2010 Symantec Internet Security Threat Report the first week in April 2011. Their executive summary states that Symantec recorded over 3 billion malware attacks in 2010 and yet one stands […]

Read more


June 15, 2011

Magazine Redaction 3 Comments

Hakin9 Extra 1/2011 – Exploiting Software

Ask the Social Engineer: Exploitation of the Human OS – The Human Buffer Overflow by Chris Hadnagy Total domination is the goal for a penetration tester in every pentest – To utterly hack the company and demonstrate their true exposure to malicious attacks. Obtaining code execution is the easiest and most direct way to reach […]

Read more


June 15, 2011

EBOOKS Redaction No Comments

Review of Ninja Hacking

Review of Ninja Hacking Unconventional Penetration Testing Tactics and Techniques By Michael Munt www.syngress.com   This is an unusual title for a book that is being aimed at the Security community and when I first looked at it i thought it was someones attempt to bring some humour into the IT Security arena, then as […]

Read more


April 29, 2011

Magazine Redaction Comments Off

Cloud Security 05/2011

In brief Armando Romeo and ID Theft Protect A Beginners Guide to Ethical Hacking – review SHYAAM SUNDHAR Coranti – review MICHAEL MUNT IPv6 Secure Transition Network Architecture MICHEL BARBEAU IPv6 has the capability to handle an astronomically large address space. IPv6 deployment, although, has been marginal and several less drastic solutions have been used […]

Read more

April 29, 2011

Articles Redaction Comments Off

An analysis of the cloud security threat

The cloud is very much the talk of the IT media town these days. Client side computational resources are still in demand but IT vendors and businesses are looking to the cloud in the hope that third-party companies will manage the network infrastructure (including overload requirements whereby the company has to pay for additional hosting […]

Read more


December 1, 2010

Magazine Redaction Comments Off

Botnets, Malware, Spyware – Hakin9 11/2010

The Spyware Within YouRajat KhareYes, today’s spyware though resides in your computer or mobile but it’s pretty much inside you. Whatever we do, wherever we go it’s stored in a computer or an embedded device like mobile phone. The Ear of SauronJohn AycockIn The Lord of the Rings, Sauron wiles away the time peering out […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa