-->
#1 Trusted Cybersecurity News Platform
Followed by 5.40+ million
The Hacker News Logo
Subscribe – Get Latest News
cybersecurity

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

India - US sign Cyber Shield deal

India - US sign Cyber Shield deal

Jul 20, 2011
India - US sign Cyber Shield deal India and the US on Tuesday inked a pact on cybersecurity to intensify information exchange on threats to computers and networks and initiate joint work on technologies against cyber-attacks. A joint statement on the India-US strategic dialogue has announced the cybersecurity agreement among new initiative by the two countries. These initiatives also include a plan to develop a software platform to make available non-sensitive government data to the public and to award $3 million each year to entrepreneurial projects that commercialise technologies to improve health. A memorandum of understanding between the Indian and the American Computer Emergency Response Teams (CERT) is expected to lead to routine exchange of information on vulnerabilities and co-operation on cybersecurity technologies, Indian CERT officials said. "This comes at a time when cybersecurity-related incidents are increasing in number and becoming more and more sophistic...
WLAN Security Megaprimer DVD Released - 10+ hours of Wi-Fi Hacking and Pwnage !

WLAN Security Megaprimer DVD Released - 10+ hours of Wi-Fi Hacking and Pwnage !

Jul 20, 2011
WLAN Security Megaprimer DVD Released - 10+ hours of Wi-Fi Hacking and Pwnage ! With over 40+ HD videos containing 12+ hours of Wireless Ownage, this DVD weighs in at around 4.2 Gigabytes! SecurityTube.net just released a 4.2 GB DVD containing over 40+ HD quality videos of their WLAN Security Megaprimer. These videos run over 10+ hours and start from the very basics of wireless hacking, then slowly build momentum and eventually introduces you to the more advanced attacks and hacks. The videos are fully practical and every hack is demonstrated. They have voice over with detailed explanations of every attack thus allowing a genuine learner to understand, learn and practice, rather then providing just a quick guide to using ready made tools. We contacted SecurityTube and this initiative is part of larger program they are planning to provide free security and hacking education to everyone, especially students in developing countries like India. THN has always been an advocate of ...
Sify.com hacked with SQL Injection Vulnerability

Sify.com hacked with SQL Injection Vulnerability

Jul 20, 2011
Sify.com hacked with SQL Injection Vulnerability Sify's website contain SQL injection Vulnerability and Hackers are able to Database Access, Database Dump, Possibility of shell uploading. Sify is one of India’s leading integrated Information Communications Technology companies. Sify was one of the first private sector player to offer internet access, when internet access was opened to private sector. It leased international bandwidth from global vendors, domestic connectivity from telecom players and set up last mile connectivity by multiple methods: wi-fi connections using roof top antennae, copper connections using phone lines or cable TV connections. Sify also started providing internet network connectivity for business enterprises in India. Sify set up a chain of franchised internet cafes (today a network of over 3,300+ cybercafes). No data has been dumped by Hackers. Database has been accessed just to take screenshots so that we can make company believethat the vuln...
cyber security

Master High-Velocity Defense: SentinelOne's Virtual Cyber Threat Forum 2026

websiteSentinelOneCyber Resilience / Threat Intel
See Jayson E. Street deconstruct a bank breach and learn to hunt high-velocity threats at machine speed.
cyber security

99% of Mythos Findings Remain Unpatched. Defenders Are Building the Response

websitePicus SecurityAI Security / Security Validation
Autonomous Validation Summit, May 12 and 14. Register free and get 12 recommendations for the Mythos era.
2011 Linux Auto Rooter Beta 1.0 Coded by CrosS

2011 Linux Auto Rooter Beta 1.0 Coded by CrosS

Jul 20, 2011
2011 Linux Auto Rooter Beta 1.0 Coded by CrosS Source Code : #!/usr/bin/perl #Coded By CrosS ( 2011 Linux Auto r00t3r ) print "###########################################################\n"; print "# (Beta 1.0 ) Auto rooter by CrosS #\n"; print "# Usage : #\n"; print "# perl $0 root => To root #\n"; print "# perl $0 del => Delete Exploit #\n"; print "# #\n"; print "# as R00TW0RM - Private Community is back #\n"; print "# so Releasing 2011 auto rooter =) #\n"; print "# in case of error mailto: mr.0x0day[AT]live.com #\n"; print "# #\n"; print "# Thanks to: r0073r and L0rd CrusAd3r #\n";...
WD TV Live Hub Compromised - Multiple Vulnerabilities Found By Dr. Alberto Fontanella

WD TV Live Hub Compromised - Multiple Vulnerabilities Found By Dr. Alberto Fontanella

Jul 20, 2011
WD TV Live Hub Compromised - Multiple Vulnerabilities Found By Dr. Alberto Fontanella Dr. Alberto Fontanella found on (Western Digital) WD TV Live Hub appliance with the last firmware installed (2.06.10) and 3 exploits to get admin password, deface appliance and get root shell: Author: Dr. Alberto Fontanella E-mail: itsicurezza<0x40>yahoo.it Web: www.fulgursec.com Vendor: Western Digital Vendor Web: www.wdc.com Version: WD TV Live Hub <= 2.06.10 (firmware) ALL VERSIONS Type: Appliance Issues: Storage Anonymous Access, Full Path Disclosure, Bypass Authentication Schema, Appliance Command Execution, DoS, OS , Command Execution, Root Shell ;-) * AF - Owning WD TV Live Hub FILE: AF-Owning_WD_TV_Live_Hub.pdf INFO: Paper that shows all issues found on WD TV Live Hub and how use it to get Root! * AF - PoC/Exploit WD TV Live Hub Get Admin Password FILE: AF-WD_TV_Live_Hub_password.sh INFO: Exploit (Bypass Authentication Schema) to Get Admin Password o...
Association Of American Feed Control Officials (AAFCO) Hacked by ZHC

Association Of American Feed Control Officials (AAFCO) Hacked by ZHC

Jul 20, 2011
Association Of American Feed Control Officials (AAFCO) Hacked by  ZHC The Offocial Website of Association Of American Feed Control Officials (AAFCO) Hacked By ZHC TOSHIRO & ZHC MONGOOSE - ZCompany Hacking Crew - [ZHC] . Hacked Domains are  http://www.aafco.org/ and http://www.petfood.aafco.org/  . The Deface pages contain some message related to Their Protest Regarding PALESTINE. Mirrors of Hack available at  http://www.zone-h.com/mirror/id/14445813 and http://www.zone-h.com/mirror/id/14445892
Anonplus.com (Anonymous Social Networking Site) Hacked by AKINCILAR

Anonplus.com (Anonymous Social Networking Site) Hacked by AKINCILAR

Jul 20, 2011
Anonplus.com (Anonymous Social Networking Site)  Hacked by AKINCILAR After several members of Anonymous were reportedly banned from Google+ , the hacker group has announced they will be building their own social network called Anonplus.com  . Today  Anonplus.com  Got defaced by AKINCILAR with page title " The Seal to Anonymous from AKINCILAR ". Message posted on site: We Are TURKIYE We Are AKINCILAR This logo suits you more..How dare you rise against to the World..Do you really think that you are Ottoman Empire?We thought you before that you cannot challenge with the world and we teach you cannot be socialNow all of you go to your doghouse..
FBI Raids Homes of Suspected Anonymous Hackers at New York

FBI Raids Homes of Suspected Anonymous Hackers at New York

Jul 20, 2011
FBI Raids Homes of Suspected Anonymous Hackers at New York The FBI executed search warrants at the New York homes of three suspected members of notorious hacking group Anonymous early Tuesday morning. More than 10 FBI agents arrived at the Baldwin. The agents spent an hour and 40 minutes at Jordan's house, other agents investigated a second Long Island, N.Y., home and one in Brooklyn. The targets of the FBI searches are all in their late teens to early 20s. Search warrants were part of an ongoing investigation into Anonymous, which claimed responsibility for attacks against a variety of websites including Visa and Mastercard. Anonymous is a loose collection of cybersavvy activists inspired by WikiLeaks and its flamboyant head Julian Assange to fight for " Internet freedom " along the way defacing websites, shutting down servers, and scrawling messages across screens web-wide.
LulzSec will release Murdoch email archive

LulzSec will release Murdoch email archive

Jul 20, 2011
LulzSec will release Murdoch email archive LulzSec behind a hack on The Sun's website claim to have extracted an email archive which they plan to release later on Tuesday. The Sun's website were redirected towards a fake story on the supposed death of Rupert Murdoch by infamous hacktivist collective LulzSec. The group also redirected visitors to the main News International website to the LulzSec Twitter account. Sabu leader of LulzSec said via Twitter that the group was sitting on emails of News International staffers that it planned to release. Sabu released email login details for former News International chief exec Rebekah Brooks, a central figure in the News of the World voicemail-hacking scandal. The hackers also posted the mobile phone numbers of three News International execs. This information seems to have come from an old database.
FBI arrests AT&T employee for leaking information to Anonymous

FBI arrests AT&T employee for leaking information to Anonymous

Jul 20, 2011
FBI arrests AT&T employee for leaking information to Anonymous The Tech Herald reported on information given to us by Ryan Cleary shortly before his arrest. AT&T insider who handed sensitive information and a bootable USB disk over to Anonymous. On Tuesday, the FBI arrested an AT&T employee connected to the leak, during a nationwide sweep targeting Anonymous. The public first learned of the AT&T files from a Torrent release by LulzSec. The documents were included in the group’s final release before they disappeared from the public eye. The release also marked the second major data leak under the AntiSec movement, which has targeted both government and private sector organizations since its founding. In addition to documents, the insider leak also included a bootable USB drive used by AT&T. while interviewing Cleary for a separate story, he bragged about the AT&T leak, and the fact an insider delivered the information and software to Anonymous. “ …a...
BackTrack 5 Release 1 will be available on 10th of August,2011

BackTrack 5 Release 1 will be available on 10th of August,2011

Jul 20, 2011
BackTrack 5 Release 1 will be available on 10th of August,2011 BackTrack 5 R1 (Release one) will be available for download on the 10th of August,2011. This will complete our first 3 month cycle since the last release. With over 100 bug fixes, numerous package updates and the addition of over 30 new tools and scripts.  BackTrack Crew  will have a pre-release event of BackTrack 5 R1 at the BlackHat / Defcon Conference a few days earlier.
Microsoft offers $250,000 reward for information of Rustock Botnet

Microsoft offers $250,000 reward for information of Rustock Botnet

Jul 18, 2011
Microsoft offers $250,000 reward for information of Rustock Botnet Microsoft is offering a $250,000 reward for providing information of Rustock botnet. The Rustock botnet is responsible for a great deal of cyber crime, spam (the botnet has capacity for 30 billion spam mails every day), dodgy pharmaceuticals, counterfeit stuff and pirated software. The size of the Rustock botnet has already been cut in half, but that still leaves it with hundreds of thousands of systems under its control. In order to bring down the entire botnet Microsoft is now turning to the legal system. Microsoft Declares " Today, we take our pursuit a step further. After publishing notices in two Russian newspapers last month to notify the Rustock operators of the civil lawsuit, we decided to augment our civil discovery efforts to identify those responsible for controlling the notorious Rustock botnet by issuing a monetary reward in the amount of $250,000 for new information that results in the identifi...
NetSecL Linux 3.2 released with new XFCE

NetSecL Linux 3.2 released with new XFCE

Jul 18, 2011
NetSecL Linux 3.2 released with new XFCE NetSecL 3.2 comes with a brand new XFCE which increased dramatically the performance experience, we closed many bugs and also gained more compatibility to OpenSuse 11.4 – most packages are 11.4 compatible. GrSecurity kernel is updated to 2.6.32.8 please check installation instructions if you wish to use GrSecurity. Features : - Ext4 issue with GrSecurity is resolved - booting in VM with new GrSecurity resolved - New Metasploit - Firefox 5 - Updated Exploit-db repository - GrSecurity Kernel – locked from zypper – you can update the whole system without worrying - Snort-inline reintegrated (get snort rules and change them to drop – if you use the advanced firewall) - Size of the ISO smaller with 200 MB this allowed us to have a sub project NetSecL Toolset a minimal VM with console, webshell and all pentesting tools! Minimal System Requirements for running the live DVD: 512 MB of RAM Minimal System Requiremen...
Auth3ntiQ & shika01 found Local file include on numericable.be & numericable.lu

Auth3ntiQ & shika01 found Local file include on numericable.be & numericable.lu

Jul 18, 2011
Auth3ntiQ & shika01 found local file include on numericable.be & numericable.lu Hackers named " Auth3ntiQ and shika01 " found local file include on numericable.be & numericable.lu . Venerable Links : Link 1 Link 2 Bugs are critical , Hackers can steal all account with this LFI .
Tourism Development Corporation of Punjab - Pakistan (TDCP) Hacked by Code Injector

Tourism Development Corporation of Punjab - Pakistan (TDCP) Hacked by Code Injector

Jul 18, 2011
Tourism Development Corporation of Punjab - Pakistan (TDCP) Hacked by Code Injector Code Injector from Team Indishell hack the official website of Tourism Development Corporation of Punjab - Pakistan and Deface it. Visitor to the website can see a deface page with some message on homepage. Hackers provide the screenshot of FTP shell :
Linux kernel 3.0 - 343 changes made by Microsoft developer K. Y. Srinivasan

Linux kernel 3.0 - 343 changes made by Microsoft developer K. Y. Srinivasan

Jul 18, 2011
Linux kernel 3.0 - 343 changes made by Microsoft developer K. Y. Srinivasan Linux Kernal Change Logs figures were published on Thursday in an LWN.net article : 343 Changes made by Microsoft developer K. Y. Srinivasan 1,085 change provided by independent developers Red Hat provided 1,000 Changes in Kernal 3.0 Intel provide 839 changes Srinivasan comes in at the top because he made a lot of minor changes. Srinivasan and Microsoft are therefore nearer the bottom of the list. LWN.net found that Microsoft developers changed 11,564 lines of code (1.3 per cent) – compared to Intel's 163,232 (18.1 per cent).
Damn Small SQLi Scanner (DSSS) v0.1b - 100 Lines Python Code

Damn Small SQLi Scanner (DSSS) v0.1b - 100 Lines Python Code

Jul 18, 2011
Damn Small SQLi Scanner (DSSS) v0.1b  - 100 Lines Python Code SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application (like queries). The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. It happens from using Microsoft SQL or other poorly designed query language interpreters. Source Code : #!/usr/bin/env python import difflib, httplib, optparse, random, re, sys, urllib2, urlparse NAME = "Damn Small SQLi Scanner (DSSS) < 100 LOC (Lines of Code)" VERSION = "0.1b" AUTHOR = "Miroslav Stampar (http://unconciousmind.blogspot.com | @stamparm)" LICENSE = "GPLv2 (www.gnu.org/licenses/gpl-2.0.html)" NOTE = "This is a fully working PoC proving that commercial (SQLi) scanners can be beaten under 100 li...
Israel Web Hosting Server Hacked For Palestine By Dr T

Israel Web Hosting Server Hacked For Palestine By Dr T

Jul 18, 2011
Israel Web Hosting Server Hacked For Palestine By Dr T Israel Web Hosting Server Rooted Via Server Intrusion and all Domains on Server are Mass Defaced For Palestine By Dr Torjan and Code5 named hackers.  Hacked Websites List is available at :  http://pastebin.com/WvQmSSKh  .
Lady Gaga website hacked and fans details stolen by Hackers

Lady Gaga website hacked and fans details stolen by Hackers

Jul 16, 2011
Lady Gaga website hacked and fans details stolen by Hackers Lady Gaga has called in police after thousands of her fans personal details were stolen from her website. Her record label Univeral acted after the site was hacked into by US cyber attackers SwagSec. A source said: “ She’s upset and hopes police get to the bottom of how this was allowed to happen. ” The group struck on June 27 but did not make the information, which included names and email addresses, public until this week. The hackers, who also issued a death threat against the singer, bizarrely branded her homophobic. Their statement comes after Gaga recently described as “ ridiculous ” claims she uses the gay community to sell records. Universal said yesterday: “ The hackers took a content database dump from www.ladygaga.co.uk and a section of email, first name and last name records were accessed. There were no passwords or financial information taken. “ We take this very seriously and have put in place addit...
THE CRAZIES Hackers Leaks Server Certificates of Defense Information Systems Agency (DISA)

THE CRAZIES Hackers Leaks Server Certificates of Defense Information Systems Agency (DISA)

Jul 16, 2011
THE CRAZIES Hackers Leaks Server Certificates of Defense Information Systems Agency (DISA) THE CRAZIES Hackers steal the Several Certificate revocation lists (CRLs) from Server of Defense Information Systems Agency (DISA) -  http://disa.mil/  and leak the  Certificates at : http://www.mediafire.com/?dvli58a9logojld http://www.mediafire.com/?k8z168aazj6s1k8 Reason of Hacking is Freedom of Libyan nation, Hackers blaming U.S govt. for that they are killing  Libyan for OIL. Certificate revocation lists  are used to distribute information about revoked certificates to individuals, computers, and applications attempting to verify the validity of certificates.The Revocation List tab lists the serial numbers of certificates that have been revoked and the date they were revoked. The Revocation entry field may also provide information about the reason a certificate was revoked.The General tab provides additional information about the CR...
4000 Websites hacked by The 077 ( HamDi HaCker )

4000 Websites hacked by The 077 ( HamDi HaCker )

Jul 15, 2011
4000 Websites hacked by The 077 ( HamDi HaCker ) One of the youngest good hacker "HamDi HaCker" akka "The 077" Deface 4000 more sites in one hit again.  List of 4000 hacked websites and their mirror is here .
AntiSecShell v.0.5 Shell Released by underground hackers of Antisec

AntiSecShell v.0.5 Shell Released by underground hackers of Antisec

Jul 15, 2011
AntiSecShell v.0.5 Shell Released by underground hackers of Antisec AntiSecShell (ASS) was built by the underground hacking community and groups like h0no, ac1db1tch3z and others who wish to remainanonymous, have helped altogether to create this new shell. It hasmany functions but most important of all - it bypasses ALL securityof web servers. It is not only a php shell it is a symbol offreedom and the anti-sec movement which we, the hacking underground, approve and support. Note : Shell can be backdoored, Use at your own Risk. Download the shell :  .....Link Removed..... Username : antisec Password : forever Message By Hackers : "On 25.07.2011 at the IRC of notorious group Anonymous (we support them too), underground groups will reveal 0-day exploits exclusively only for selected members with verification code. The code is in the AntiSecShell we released earlier, it is displayed at the bottom of the page. What will 0-days cover you ask? - Apache 2.X branch R...
Parliament Of Botswana hacked by V0iD

Parliament Of Botswana hacked by V0iD

Jul 15, 2011
Parliament Of Botswana hacked by V0iD V0iD hacker again strike with Parliament Of Botswana  http://www.parliament.gov.bw/  . Hacker Releases the database table   information and Admin users login details at  http://pastebin.com/Ts21HhEz  .
Jawahar Knowledge Center website Hacked & Databse leaked by PCA

Jawahar Knowledge Center website Hacked & Databse leaked by PCA

Jul 15, 2011
Jawahar Knowledge Center website Hacked & Databse leaked by PCA Pakistan Cyber Army (PCA) admin Shak hack the website of Jawahar Knowledge Center ( http://www.ieg.gov.in/ ) . They Release the Database backup, which is available for Download at   http://www.multiupload.com/IFLRXDT53W  .  The database includes the password, surname, name, designation, address, phone, useremail, collegecode,dateofreg, gender, districtid, hallticketno, question, answer, alternate mail of Members.
EC-Council Academy Hacked by GaySec (Malaysian hackers)

EC-Council Academy Hacked by GaySec (Malaysian hackers)

Jul 15, 2011
EC-Council Academy Hacked by GaySec (Malaysian hackers) EC-Council Academy ( http://eccouncilacademy.org )   Hacked by GaySec (Malaysian hackers). EC-Council Academy is a separate distinct company with no corporate connection between itself and EC-Council or EC-Council University. Some months before same site was got hacked by some other hacker. Read here ... Some Hack Proofs : [-] Enter Target: -> www.eccouncilacademy.org [-] Enter Path: -> / [-] Port: -> 80 [+] Connecting to www.eccouncilacademy.org... [+] Connected to eccouncilacademy.org [+] Searching for token... [+] W000t!! got it! "AMXhybB3FSBDBYJZU" [+] Convert the token to the RCE Payload [+] Execute the shell... [+] Trying... [+] Got it!!! -> Reverse Shell Started $ id; uname -a; pwd uid=7647041(ecco1665) gid=100450(inetuser) groups=100450(inetuser) context=user_u:system_r:unconfined_t:s0 Linux sg2nlhg017.shr.prod.sin2.secureserver.net 2.6.18-194.32.1.el5PAE #1 SMP Wed Jan 5 1...
Songs.pk hacked by Indishell Against Mumbai blasts

Songs.pk hacked by Indishell Against Mumbai blasts

Jul 15, 2011
Songs.pk hacked by Indishell Against Mumbai blasts Patriotic Indian Hackers " Indishell " / Indian Cyber Army finally Strike to the Biggest Pirated Music Download Website of Bollywood Albums run by Pakistan crew. The hack is perform against the  Mumbai blasts - Wednesday 13 July 2011. Pakistan issues a condemnation after three attacks blamed on terrorists strike Mumbai, targeting the city's Opera House district, its Zaveri bazaar and the central Dadar area. Indian hackers Hack the Songs.pk and add there deface page with a message at  http://songs.pk/usersonline/usersonline.php  . Message By Indishell " Pray for all the innocent victims of Mumbai attack ..This is a small answer from All Indians.. Remember we are Together..You can just kill innocent people .. Women & Childrens..But There is no Future for you.. We are coming with huge speed..Corruption will be under control.. Every Indian will have Money n Power..Then there will be no one to Save you...
Yellowstone County website hacked - Tax Payers Information at Risk

Yellowstone County website hacked - Tax Payers Information at Risk

Jul 15, 2011
Yellowstone County website hacked - Tax Payers Information at Risk Yellowstone County has taken its website offline after the state's technology department discovered the site had been hacked. The website will be brought back online in stages when it is safe to do so, a process that is expected to go into next week, county officials said. It's possible that taxpayers who paid property taxes by electronic bank transfer may have had their account number exposed to the hacker. This does not include taxpayers who made payments by paper check or debit/credit cards. The county system has been taken off line at this time. KTVQ-TV reports that county officials are working with forensic security examiners to determine what, if any, information was taken. The county apologizes for any inconvenience caused by this criminal act of the hacker.
Armitage 07.12.11 - Updated Version

Armitage 07.12.11 - Updated Version

Jul 15, 2011
Armitage 07.12.11 - Updated Version Armitage is a graphical cyber attack management tool for Metasploit that visualizes your targets, recommends exploits, and exposes the advanced capabilities of the framework. Armitage aims to make Metasploit usable for security practitioners who understand hacking but don’t use Metasploit every day. If you want to learn Metasploit and grow into the advanced features, Armitage can help you. This is the official change log : Fixed a race condition causing some file browser actions to fail on Windows hosts at times. Files downloaded through file browser are now archived in: [host]Downloads Hail Mary output nows goes to [log dir]allhailmary.log Added Crack Passwords button to Credentials tab. This opens the launcher for John the Ripper: auxiliary/analyze/jtr_crack_fast Added Post Modules item to Meterpreter N -> Explore and Shell N menus. This menu item will show applicable post-exploitation modules in the module browser. Loot browser now...
Pentagon Admits to biggest ever data breach

Pentagon Admits to biggest ever data breach

Jul 15, 2011
Pentagon Admits to biggest ever data breach According to Report, Department of Defense and Pentagon is disclosing news of the one of the largest data loss events to date . From investigation, officials to believe the intrusion was orchestrated by a foreign government. The theft of around 24,000 sensitive Pentagon documents occurred in March 2011. From the Associated Press: The Pentagon is revealing that it suffered one of its largest-ever losses of sensitive defense data this spring to a cyber attack that it blames on an unspecified foreign government. The loss is an example of why the Pentagon has developed new cyber security rules that emphasize deeper defenses, more collaboration with private industry and new steps to stop thefts by malicious insiders.  William Lynn, the deputy secretary of defense, said in a speech outlining the new strategy that 24,000 files were stolen from a defense industry computer network in a single intrusion in March. He offered no details....
UK Vodafone Phone Hacking method exposed

UK Vodafone Phone Hacking method exposed

Jul 14, 2011
UK Vodafone Phone Hacking method exposed The Hacker's Choice announced a security problem with Vodafone's Mobile Phone Network today. An attacker can listen to any UK Vodafone customer's phone call. An attacker can exploit a vulnerability in 3G/UMTS/WCDMA - the latest and most secure mobile phone standard in use today. Vodafone released its femto cell to the general public. This means anyone can run his own UMTS network in his house. The box connects back via your DSL connection into their mobile network. This is an initial project to gather information about the technology and verify the security. This project started in 2009 together with hackers from the french underground. Read Complete Details Here
PuTTY v.0.61 New Version released After 4 years

PuTTY v.0.61 New Version released After 4 years

Jul 14, 2011
PuTTY v.0.61  New Version   released  After 4 years After four Years, Putty's New version finally Released today.Here are the PuTTY files themselves: PuTTY (the Telnet and SSH client itself) PSCP (an SCP client, i.e. command-line secure file copy) PSFTP (an SFTP client, i.e. general file transfer sessions much like FTP) PuTTYtel (a Telnet-only client) Plink (a command-line interface to the PuTTY back ends) Pageant (an SSH authentication agent for PuTTY, PSCP, PSFTP, and Plink) PuTTYgen (an RSA and DSA key generation utility). These features are new in beta 0.61 Kerberos/GSSAPI authentication in SSH-2. Local X11 authorisation support on Windows. (Unix already had it, of course.) Support for non-fixed-width fonts on Windows. GTK 2 support on Unix. Specifying the logical host name independently of the physical network address to connect to. Crypto and flow control optimisations. Support for the zlib@openssh.com SSH-2 compression method. Support for new Wind...
RootRepeal – Rootkit Detector v1.3.5 Download Now

RootRepeal – Rootkit Detector v1.3.5 Download Now

Jul 13, 2011
RootRepeal – Rootkit Detector v1.3.5 Download Now RootRepeal is a new rootkit detector currently in public beta.  It is designed with the following goals in mind: Easy to use – a user with little to no computer experience should be able to use it. Powerful – it should be able to detect all publicly available rootkits. Stable – it should work on as many different system configurations as possible, and, in the event of an incompatibility, not crash the host computer. Safe – it will not use any rootkit-like techniques (hooking, etc.) to protect itself. Currently, RootRepeal includes the following features: Driver Scan – scans the system for kernel-mode drivers.  Displays all drivers currently loaded, and shows if a driver has been hidden, and whether the driver’s file is visible on-disk. Files Scan – scans any fixed drive on the system for hidden, locked or falsified* files. Processes Scan – scans the system for processes.  Displays all processes currently r...
Expert Insights Articles Videos
Cybersecurity Resources