+

Tagged With / 'Security'

December 5, 2011


Reverse proxy flaw in Apache patch CVE-2011-3368

A security researcher has found that an old patch CVE-2011-3368 can still be exploited by a crafted request that could exploit a fully pateched Apache Web Server (even if Apache 2.2.21 with CVE-2011-3368 patch is applied) which would allow access to internal systems if the reverse proxy rules were configures incorrectly. Threads on line suggest […]

Read more

December 5, 2011


Skype flaw can track users’ location and P2P activity

Security researchers have found a security flaw in Skype. The flaw found several properties of Skype that can track not only a users’ locations over time, but also their P2P file activity. The researchers also found that “even when a user blocks callers or connects from behind a Network Address Translation (NAT), it does not […]

Read more

December 2, 2011

TOR Project

Hakin9 12/11: TOR Project

Latest News From IT Security World By Armando Romeo, eLearnSecurity and ID Theft Protect Duqu: The Precursor Stuxnet Attack By Rebecca Wynn Duqu is essentially the precursor to a future Stuxnet-like attack. The threat was written by the same authors, or those that have access to the Stuxnet source code, and the recovered samples have […]

Read more

November 29, 2011


Advanced SystemCare 5 Released!

Advanced SystemCare 5: IObit Debuts The New Release Of Its Flagship Software Suite. Advanced SystemCare is one of the most downloaded Windows utility programs; version 5 of the software sees new functionality and features, making it one of the most comprehensive PC maintenance and optimization suites available today. SAN FRANCISCO15th November 2011–The number of PC […]

Read more

November 21, 2011

Password, What Password?

Exploiting Software 03/11Password, What Password?

Malware Analisys for Windows Systems Administrators Using Sysinternal Tools By Dennis Distler Today administrators deal with malware infections almost daily. Often malware is customized for specific organizations, departments in an organization, and even individuals in the organization. This type of malware typically is not identified by anti-virus products, and it is up to the administrator […]

Read more

November 21, 2011


Call for Chapter Proposals

Call for chapter proposals for the book titled: Theory and Prctice of Cryptography Solutions for Secure Information Systmes has been announced. This book will focus on cryptography and its use for security of IS. Manuscripts will be expected to cover recent research and advanced development in the use of cryptography in IS. The book is […]

Read more

November 17, 2011


Hackers posting porn on Facebook in major attack on social network

Facebook has been under attack from violent images and porn on several users’ profile pages. It appears to be one of the most prolific breaches of Facebook security since it was first launched. Users have been tricked into pasting malcious code (possible clickjacking or XSS?) into their browsers which enable hackers to gain access to […]

Read more

November 16, 2011


ISSE 2011 – 22-23 November, Prague

This year’s Information Security Solutions Europe (ISSE) conference will be held in Prague on 22-23rd  November. ISSE is the only independent, interdisciplinary security conference in Europe. World-leading industry experts will speak about a number of most actual topics in IT security. The topics include: cloud computing; mobile and wireless security; security management; identity and access […]

Read more

November 14, 2011

Hakin9 Extra Rootkit

Hakin9 Extra – Rootkit 06/2011

Rootkits Hidden in Hardware of PC by Anibal Sacco Let’s think like an attacker for a second. There are multiple applications dedicated to find malicious code both in user and in kernel space. So new places have to be found to deploy your code while keeping it stealthy. TDSS aka TDL – Chronology by Eugene […]

Read more

November 10, 2011


Apple release critical Mac OS X 10.6 and 10.7 updates

Apple has updated vulnerabilities in Java for Mac OS X 10.6 and 10.7 systems, some of which could allow an attacker to execute code outside of the secure Java sandbox. Vulnerabilities in Shockwave and Java are becoming an increasing security issue for businesses. Most administrators fail to update these patches outside of Windows updates. Java […]

Read more

November 10, 2011


Adobe release critical ShockWave security update

Critical vulnerabilities have been identified in Adobe Shockwave Player 11.6.1.629 and earlier versions on the Windows and Macintosh operating systems. These vulnerabilities could allow an attacker, who successfully exploits these vulnerabilities, to run malicious code on the affected system. Adobe recommends users of Adobe Shockwave Player 11.6.1.629 and earlier versions update to Adobe Shockwave Player 11.6.3.633.Comments

Read more

November 10, 2011

pic

Machine Learning Forensics for Law Enforcement, Security, and Intelligence

ISBN: 978-1439860694 RRP: $69.95 The first time that I quickly browsed through this book, I thought that maybe I was reading this in a slightly different language as there were new acronyms and different ways of thinking on how to process information for me to learn By the time I was finished my head was […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa