+

Tagged With / 'Security'

November 4, 2011


Android 4.0 Ice Cream Sandwich security enhanced

The Android 4.0 operating system, otherwise known as “Ice Cream Sandwich”, has been in the security news recently. Android 4.0 is possibly Google’s most secure operating system, to date, so to hear that Android 4.0 has added address layout randomization (ASLR) is good news for enteprise and mobile security for end-users (consumers included ) in […]

Read more


October 31, 2011

Magazine Redaction 47 Comments

Hacking Data 11/11

Latest News From IT Security World By Schuyler Dorsey, eLearnSecurity i ID Theft Protect As usual specialists from companies eLearn Security and ID Theft protect will share with us latest news from IT security world. Read it to up-date yourself. Secure Log Server With Rsyslog By Leonardo Neves Bernardo This article will discuss how to […]

Read more

October 27, 2011


Google Chrome 15 fixes 27 security flaws

Google’s bug bounties is certainly working. Security researchers have identified over 27 flaws in Google Chrome – one researcher Sergey Glazunov found a number of flaws earning him a respectable $12.174 for five high impact flaws in what Google calls ‘cross-origin-policy violations’. Good work Sergey! Other high impact flaws fixed in Chrome 15 include: CVE-2011-2845: […]

Read more


October 24, 2011

Magazine Redaction 46 Comments

Exploiting Software 02/11 Exploit format Strings with Python

Cracking Java Applications Using AOP Exploits (part 2) By Daniel Drozdzewski AOP has been used in the domain of Software Security before. Its use was mainly for validation, auditing and authorization purposes, which in turn improve software security as a whole. Those crosscutting concerns are being woven into the existing software after the fully functional […]

Read more


October 17, 2011

Magazine Redaction No Comments

Hakin9 Extra – Botnet 05/2011

A study of a Botnet creation process and the impact of a DDoS attack against a web server by Stavros N. Shaeles and Ioannis D. Psaroudakis Over the following paragraphs we are going to describe in steps, the procedure of setting up a botnet in order to execute our DDoS attack. The purpose of building […]

Read more

October 14, 2011


Apple fix 96 vulnerabilities in iOS 5 release

Apple has this week (12th October) released it’s latest mobile operating system called iOS 5. The new iOS 5 patches 96 vulnerabilities, including 69 security fixes for WebKit. The more notable security fixes included are; memory corruption issues that could lead to arbitrary code execution, cross-origin issues that could result in a cross-site scripting attack, […]

Read more

October 14, 2011


Facebook and Twitter social media API security

Julian Evans wondered for some time whether it might be possible to develop a security app for Facebook, that provides protection at levels similar to Internet security suites. Julian’s research has concluded that providing a scanning, tracking and notification based AV type system is very difficult to deploy due to restrictions in the Facebook and […]

Read more

October 14, 2011


How identity fraudsters steal your overdraft facility

Fraudsters are smart, so much so that they know how to outwit the banks security, clearing system and best of all innocent account holders. So how do fraudsters use identity theft to steal your overdraft facility? Read on to find out more. Here is a good example of how an ‘overdraft fraud’ works. When a […]

Read more

October 13, 2011

Events Redaction No Comments

The Kingdom Cloud Computing Summit

The Kingdom Cloud Computing Summit provides a networking platform for key public sector IT decision makers and leading cloud computing solution providers. Under the theme of ‘The Kingdom’s Roadmap to Virtualisation,’ attendees have the opportunity to discuss the future of the Kingdom’s ICT market. Key Topics: • Is the Kingdom ready for cloud computing? • […]

Read more

October 7, 2011


Facebook launches anti-malware URL scanning service

Facebook is introducing URL (link scanning) protection for its users as from today (Oct 3rd, 2011). When a user clicks on any link in Facebook, Websense using its ThreatSeeker Cloud Malware Identification Platform, will analzye each URL in real-time for potential malicious content. If ThreatSeeker finds malicious content the user will be warned “Security Alert: […]

Read more

October 7, 2011


nVidia GeForce GPU cracks six character password in four seconds

An nVidia GeForce GT220 graphics card, which costs about 30 GBP, is capable of cracking strong passwords in a matter of hours. Security experts were able to crack a  6 character password in 4 seconds, a 7 character password in less than 5 minutes, and 8 character password in four hours. It appears people have […]

Read more

October 6, 2011


Microsoft fix 23 vulnerabilities for “Patch Tuesday”

Microsoft have released their “Patch Tuesday” update for October 11th which includes a critical flaw that could give attackers the ability to remotely spread a virus through compromised Internet Explorer and Windows users. The security update will contain eight security bulletins for a total of 23 bugs. The other critical vulnerability Microsoft will fix exists […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa