-->
#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Security Service Edge

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Phishing Site hacked for teaching lesson to Scam Lovers

Phishing Site hacked for teaching lesson to Scam Lovers

Oct 23, 2011
Phishing Site hacked for teaching lesson to Scam Lovers Researchers at the security firm GFI Labs found an email used to lure people to a phishing site called " canal-i. " The message attempts to scare unsuspecting readers by telling them they have exceeded the storage limit on their inbox, and says, " You will not be able to send or receive new mail until you upgrade your email. Click below link and fill the form to upgrade your account. " When clicked, that link directs users to a Web page that asks for their username, email address and password. For one hacker he or she has not been identified this was not just an ordinary phishing scam, but also a chance to teach others. The white-hat hacker "white hat" refers to hackers who exploit security bugs to improve security stripped the phishing page of its malicious content and replaced it with a stern educational message about the perils lurking in the online world. Hackers have created a fake tool es...
Anonymous Hackers Take Down 40 Child Porn Websites

Anonymous Hackers Take Down 40 Child Porn Websites

Oct 23, 2011
Anonymous Hackers Take Down 40 Child Porn Websites Anonymous has taken down more than 40 darknet-based child porn websites over the last week. Details of some of the hacks have been released via pastebin #OpDarknet , including personal details 1500 users of a site named 'Lolita City,' and DDoS tools that target Hidden Wiki and Freedom Hosting — alleged to be two of the biggest darknet sites hosting child porn. News of the Anonymous campaign to actively target anyone hosting child porn sites comes from statements associated with Anonymous on Pastebin and two Anonymous YouTube video channels. AnonNews has yet to issue a press release. The AnonMessage and BecomeAnonymous YouTube channels both posted videos with statements of intent to hunt, skin and kill pedobears everywhere, starting with Freedom Hosting.
Metasploit 4.1.0 Web UI Cross Site Scripting vulnerability

Metasploit 4.1.0 Web UI Cross Site Scripting vulnerability

Oct 22, 2011
Metasploit 4.1.0 Web UI Cross Site Scripting vulnerability The Web UI in Metasploit version 4.1.0 suffers from a stored cross site scripting vulnerability discovered by " Stefan Schurtz ". Technical Details Login to Web UI -> Create New Project -> Project name -> '"</script><script>alert(document.cookie)</script>
cyber security

AI Security Board Report Template

websiteWizAI Security / Compliance
This template helps security and technology leaders clearly communicate AI risk, impact, and priorities in language boards understand.
cyber security

AI Security Isn’t Optional—Join the Conversation at SANS Security West

websiteSANSCybersecurity Training
SANS Fellow, Eric Johnson addresses emerging risks and tactical responses.
Announcing Contest Winners for Ghost in the Wires Book

Announcing Contest Winners for Ghost in the Wires Book

Oct 22, 2011
Announcing Contest Winners for  Ghost in the Wires Book We ran a competition for the book " Ghost in the Wires by Kevin Mitnick " last week. We'd like to thank the following people for sending in the best of the best of reviews about Kevin Mitnick's new book, "Ghosts in the Wires." All the reviews we received were great and the editorial staff had a tough time narrowing it down to 3 winners. We felt the winners captured just what we were looking for about a great book and great author. Congratulations winners and enjoy your copy of Kevin's book. drknit3 "Study the past if you would define the future." I think one of the most important things our pioneers can do is pass on knowledge to those who are just getting into the field. Kevin Mitnick has obviously played a huge roll  in defining the industry. This sharing of knowledge and experience plays a huge roll in defining the future. Although Ghost in the Wires highlights just one aspect...
Occupy Wall Street : Anonymous Hackers Publish Law Enforcement Data

Occupy Wall Street : Anonymous Hackers Publish Law Enforcement Data

Oct 22, 2011
Occupy Wall Street : Anonymous Hackers Publish Law Enforcement Data Anonymous, the Internet “hactivist” group, today, apparently in support of the Occupy Wall Street protest movement, hacked into several different police databases and leaked sensitive personal data, among them passwords, names, addresses, phone numbers and social security numbers from the Boston Police Patrolmens’ Association (BPPA) and Birmingham, Alabama Police Department, according to several reports. Additionally, Anonymous claims to have hacked the International Association of Chiefs of Police, and offers the above image as proof. A press release by Anonymous said that the hack was timed to the IACP meeting as part of a "Day of Action Against Police Brutality." Another document appears to be about 1,000 user names and passwords belonging to the Boston Patrolmans' Association. In the video below, you can hear a hacker call the Baldwin country sheriff’s office to say “ your website has been def...
iPad 2 iOS 5 Lock Screen Bypass Vulnerability [Video Demonstration]

iPad 2 iOS 5 Lock Screen Bypass Vulnerability [Video Demonstration]

Oct 21, 2011
iPad 2 iOS 5 Lock Screen Bypass Vulnerability Marc Gurman at 9to5Mac has discovered a vulnerability on the iPad that allows for a limited bypass of the device’s lockscreen. Anyone with an iPad Smart Cover can gain access to the previously-open app (or the home screen if no app was open). By holding the power button to bring up the ‘Power Off’ screen, closing the smart cover, re-opening it, and clicking cancel, the attacker will be dropped into the screen that was open before the iPad was locked. If the attacker gets dropped into the home screen, then they’ll be able to see the installed apps, but won’t be able to open anything. If Safari or Mail (or any other app) was the open when the device was locked, then the attacker would have access to that app. From a locked iPad 2: 1) Lock a password protected iPad 2 2) Hold down power button until iPad 2 reaches turn off slider 3) Close Smart Cover 4) Open Smart Cover 5) Click cancel on the bottom of the screen This isn’t the f...
Stuxnet's Son "Duqu" Removal Tool released by Bitdefender

Stuxnet's Son "Duqu" Removal Tool released by Bitdefender

Oct 21, 2011
Stuxnet's Son " Duqu " Removal Tool released by Bitdefender Rootkit.Duqu is a new e-threat that combines the technology of the military-grade Stuxnet with an advanced keylogger and backdoor application. Due to its rootkit technology, the piece of malware can stay hidden from the user, the operating system’s defense mechanism and even from regular antivirus utilities.Just like its predecessor – the Stuxnet rootkit - Rootkit.Duqu.A is digitally signed with a stolen digital certificate that has been revoked in the meantime. This allows it to install itself on both 32- and 64-bit operating systems on Windows platforms ranging from Windows XP to Windows 7. The Duqu rootkit runs on the computer for 36 days and collects any kind of information entered via the keyboard, including passwords, e-mail or IM conversations. After the “surveillance” period ends, the rootkit gracefully removes itself from the system, along with the keylogger component. Rootkit malware is extremely diff...
Hackers leak Citigroup CEO’s personal data after Occupy Wall Street arrests

Hackers leak Citigroup CEO’s personal data after Occupy Wall Street arrests

Oct 21, 2011
Hackers leak Citigroup CEO ’s personal data after Occupy Wall Street arrests The mobile phone number and home address of Vikram Pandit, the chief executive of Citigroup, have been placed on the web by hacking group CabinCr3w in retaliation for the cuffing of protesters at an Occupy Wall Street demo. The hackers said in a statement online that they had accessed the data - which also included family information and some financial figures - and uploaded it online in response to events during the recent anti-bank protests on Wall Street. " During Occupy Wall Street [protests], protesters had made way to CitiBank to withdraw their funds and close their accounts. They were met with strong police prescence [sic] and arrested ," CabinCr3w wrote. " We as american citizens MUST have full control over our money and lively hood[sic].When this is taken away from us, what else do we have? So the CEO of CitiBank has blindly jumped into the sights of the CabinCr3w ". PLa...
OSSAMS - Open Source Security Assessment Management System

OSSAMS - Open Source Security Assessment Management System

Oct 21, 2011
OSSAMS - Open Source Security Assessment Management System As information security professionals, we conduct security assessments for companies. One of the biggest problems we have is after all the data is collected, how can we correlate the data accurately. So we decided to start a project to solve this problem, and we are calling it Open Source Security Assessment Management System (OSSAMS). OSSAMS is a framework for putting configuration files, security scan data files (like Nessus), and other data collected, during a security assessment or penetration test, into a RDBMS. The framework is going to be designed in a fashion similar to Metasploit, SNORT, or other systems that allow the security community to create plugins for new tasks as needed. The primary goal of OSSAMS is to normalize the data, there by allowing the security professional to better assess the current state of security for an organization. Completed: acunetix, burp, grendel, nessus, netsparker, nexpose commu...
Beware - Gaddafi malware on Internet

Beware - Gaddafi malware on Internet

Oct 21, 2011
Beware - Gaddafi malware on Internet As is not unusual when big news breaks, malware authors try to take advantage of the situation.A global computer virus that hides in an email about Gaddafi's death has been detected by Norman . The malware was caught in its worldwide network of spam traps. The email below was sent to a mailing list that receives information pertaining to the Uighur people. The mail appears to have been sent from Korea. Malicious hackers have spammed out an attack posing as pictures of Gaddafi's death, tricking users into believing that they came from the AFP news agency and are being forwarded by a fellow internet user. As unlikely as the legitimacy of these emails may seem - in this case, the latest photos being forwarded to you in an email attachment - the news is often just too interesting for people to ignore. Internet users are advised to avoid opening the email and updating or applying their security settings.
iPhone can be used as spy phone to get desktop Keystrokes

iPhone can be used as spy phone to get desktop Keystrokes

Oct 20, 2011
iPhone can be used as spy phone to get desktop Keystrokes What if a hacker could log every key you typed on your PC by placing a cellphone nearby? US researchers have shown how this is possible using any smartphone available today. At a conference in Chicago on Thursday, a group of computer researchers from Georgia Tech will report on another potential threat. The researchers have shown that the accelerometer and orientation sensor of a phone resting on a surface can be used to eavesdrop as a password is entered using a keyboard on the same surface. They were able to capture the words typed on the keyboard with as much as 80 percent accuracy. Normally when security researchers describe spyware on smartphones, they mean malicious code that can be used to snoop on calls, or to steal the data held on mobile phones.In this case, however, researchers have described how they have put software on smartphones to spy on activity outside the phone itself - specifically to track what a use...
Adobe Flash bug allow spying Webcam hole

Adobe Flash bug allow spying Webcam hole

Oct 20, 2011
Adobe Flash bug allow spying Webcam hole The flaw was disclosed in 2008 and can be exploited to turn on people's webcams or microphones without their knowledge. Attack involved putting the Adobe Flash Settings Manager page into an iFrame and masking it with a game, so that when the user clicked on the buttons he would actually change the settings and turn on the webcam. Adobe is working on a fix for a Flash Player vulnerability that can be exploited via clickjacking techniques to turn on people's webcams or microphones without their knowledge.The issue was discovered by a Stanford University computer science student named Feross Aboukhadijeh who based his proof-of-concept exploit on a similar one disclosed back in 2008 by an anonymous researcher. Once it was made public, Adobe fixed the issue by adding framebusting code to the Settings Manager page. But now, Stanford University computer science student Feross Aboukhadijeh managed to bypass the framebusting JavaScript co...
Million ASP.Net web sites affected with mass SQL injection attack

Million ASP.Net web sites affected with mass SQL injection attack

Oct 20, 2011
Million ASP.Net  web sites affected with mass SQL injection attack Hackers are in the midst of a massively successful SQL injection attack targeting websites built on Microsoft's ASP.Net platform. About 180,000 pages have been affected so far, security researchers say. Attackers have planted malicious JavaScript on ASP.Net sites that causes the browser to load an iframe with one of two remote sites: www3.strongdefenseiz.in and www2.safetosecurity.rr.nu , according to security researchers at Armorize who discovered the attack. From there, the iframe attempts to plant malware on the visitor's PC via a number of browser drive-by exploits. A drive-by exploit will load malware without a visitor's knowledge or participation (no need to open a file or click on a link). Fortunately, the attackers are using known exploits, with patches available, so the attack can only be successful if a visitor is using an outdated, unpatched browser without the latest version of Adobe PDF ...
There’s something “Human” to  Social Engineering !

There’s something “Human” to Social Engineering !

Oct 20, 2011
There’s something “ Human ” to  Social Engineering ! At the psychological skill of Social Engineering Social engineering is the human side of breaking into corporate or personal pc’s to gain information. Even companies that have an authentication process, firewalls, vpn’s and network monitoring software are subject to the skill of a good social engineer. In hacking we rely on our technical skill and in social engineering it is a game of getting your subject to tell you what you want to get into their system. Social engineering has been employed since the beginning of mankind, the art of trickery or deception for the purpose of information gathering, fraud, or in modern times, computer system access. In most cases today the social engineer never comes face to face with their target. In social engineering we exploit the attributes of the human decision making process known as “ cognitive biases .” That was the question asked by the Team of Social-engineer.org Gu...
Metasploit Community Edition - Advance penetration testing tool by Rapid7

Metasploit Community Edition - Advance penetration testing tool by Rapid7

Oct 19, 2011
Metasploit Community Edition - Advance penetration testing tool by Rapid7 Open-source penetration testing "Metasploit Framework" Rapid7 a project funded by the U.S. on October 18 (U.S. time), and penetration testing tools platform to Metasploit Framework "Metasploit Community Edition" was released. Available for free download from its Web site. According to Rapid7 Chief Security Officer and Metasploit Creator HD Moore, " The best way to tackle the increasing information security challenge is to share knowledge between practitioners, open source projects and commercial vendors. " Community Editioin is based on the Metasploit Framework, a combination of the basic user interface available in commercial versions. Using penetration testing exploit basic, GUI simple, that provides entry-level modules such as a browser. You can verify any exploitable vulnerabilities, that can streamline vulnerability management and data protection. Can also import third-par...
Indian National Congress Party Official Website Hacked by ZHC

Indian National Congress Party Official Website Hacked by ZHC

Oct 18, 2011
Indian National Congress Party  Official Website Hacked by ZHC ZHC Disastar [ZCompany Hacking Crew] Hackers from Pakistan today hack the Server of Indian National Congress Party  ,one of the two major political parties in India and deface their Official website with Message as shown in above image. Hackers Upload Shell at  http://allindiacongress.com/satyagraha.php  , From where They access the whole Server and Modify the Index.php file for defacing it. The Server is seems to be a Shared Server with Kernel " Linux harshul.anjuinfotech.com 2.6.18-238.19.1.el5 " , Which is easily exploitable. Mirror of Hack is available here .
Google Enable SSL-based searches, Will impact Google Analytic !

Google Enable SSL-based searches, Will impact Google Analytic !

Oct 18, 2011
Google Enable SSL-based searches, Will impact Google Analytic ! According to a blog post by Google, the company is taking steps towards making search more secure for its users. Users will be redirected to https:// instead of http:// when going to do a Google search. By forcing SSL on http://google.com, all keyword data will be hidden. The company is dedicated to SSL and securing search and privacy for its signed in users. But This will restricting search terms availability and also when user will sign out, One will redirect back to Unencrypted (http://) page. The company says this won’t change reporting data for webmasters who use analytics tools too see how much traffic Google sends them. How will this change impact Google Analytics users? When a signed in user visits your site from an organic Google search, all web analytics services, including Google Analytics, will continue to recognize the visit as Google “organic” search, but will no longer report the query te...
Duqu - Next Major Cyber Weapon like Stuxnet

Duqu - Next Major Cyber Weapon like Stuxnet

Oct 18, 2011
Duqu - Next Major Cyber Weapon like Stuxnet The Stuxnet cyberworm could soon be modified to attack vital industrial facilities in the US and abroad, cybersecurity experts warned Wednesday at a Senate hearing. Computer security companies agree that these virus is unprecedented and it means the dawn of a new world. Stuxnet and Duqu were not designed to steal money or send spam but to sabotage plants and cause damage in industrial environments. Expect the appearance of additional copies. The Stuxnet virus that attacked Iran's nuclear program can cripple the country's nuclear facilities for two years, a German computer expert announced on Wednesday, December 15, 2010. From what researchers can tell, Duqu's mission is to gather intelligence data and assets from entities like industrial control system manufacturers, to more easily conduct a future attack against another third party. According to Symantec, the next threat, dubbed “DuQu” because the code has the code strin...
Famous VPN service Proxpn compromised

Famous VPN service Proxpn compromised

Oct 18, 2011
Famous VPN service Proxpn compromised proXPN is one of the famous VPN client based on OpenVPN Service, today hacked by hacked named " TurkisH-RuleZ ". The Server is seems to be Compromised in this Hacking case. Compromised url is h ttp://proxpn.com/whmcs1/downloads and Mirror of Hack is available here .
Report says : US considered cyber war on Libya

Report says : US considered cyber war on Libya

Oct 18, 2011
Report says : US considered cyber war on Libya Officials in the US Obama administration considered compromising Libya's government computer networks to block early-warning data gathering and missile launches on NATO war planes during the American-led strikes, but decided against it, according to The New York Times. The report goes on to claim that, while the use of what is believed to be a pre-existing armoury of Trojans, viruses, malware and military hackers was suggested, the cyber-attack was never actually carried out. The attack would have tried to disrupt Libya's early-warning radar system and thus cripple the North African country's ability to fire back at attacking NATO aircraft.But the Obama administration and the Pentagon chose instead to mount a conventional attack, partly because an American cyberattack might have set a dangerous precedent, and Libya might not have been worth the risk. In the end, American officials rejected cyberwarfare and used convent...
Jynx Kit (LD_PRELOAD) Userland Rootkit Released

Jynx Kit (LD_PRELOAD) Userland Rootkit Released

Oct 17, 2011
Jynx Kit (LD_PRELOAD) Userland Rootkit Released Jynx Kit is a LD_PRELOAD userland rootkit. Fully undetectable from chkrootkit and rootkithunter. Includes magic packet SSL reverse back connect shell based on SEQ/ACK numbers in a single packet. Solid building block for further LD_PRELOAD rootkits. DOWNLOAD HERE Submitted by ErrProne (www.blackhatacademy.org)
More than 10,000 Facebook account hacked by TeamSwaSTika

More than 10,000 Facebook account hacked by TeamSwaSTika

Oct 17, 2011
More than 10,000 Facebook account hacked by TeamSwaSTika Another group of Hackers, self titled Team Swastika, have caused panic amongst Facebook users after releasing the details of 10,000 accounts onto popular text sharing site, Pastebin. Pastebin, usually used to share source code, has frequently been host to a number of text files that contain the details of specific hacks by hackitivists and hacker groups. Team Swastika is just one of these hackitivist groups but claims to be the most powerful hacking team in Nepal. They also said that next target will be Nepal Government website. Facebook hacked account dump: http://pastebin.com/KYsd0j5B (part1) - Removed by Pastebin http://pastebin.com/nN5uDrQS (part2) - Removed by Pastebin
National Cyber Security Bulletin on Anonymous

National Cyber Security Bulletin on Anonymous

Oct 17, 2011
National Cyber Security Bulletin on Anonymous DHS has analyzed the likelihood of Anonymous attacking industrial control systems (ICS) after the hacktivist group showed such intentions earlier this year. " Assessment of Anonymous Threat to Control Systems " that was drafted by the National Cybersecurity and Communications Integration Center (NCCIC) back in September. The document is not classified, but it is intended for official use only. The report describes an interest within Anonymous to target industrial control systems. " The capability of the individual to recognize and post code that would gain the attention of those knowledgeable in control systems, as well as their claims to have access to multiple control systems, indicates the individual has an increased interest in control systems, but does not demonstrate capabilities ," the NCCIC said in its report. Download Complete Bulletin
'Good to Know' campaign : Google Collaborates with Citizens Advice Bureau for Online Safety

'Good to Know' campaign : Google Collaborates with Citizens Advice Bureau for Online Safety

Oct 17, 2011
'Good to Know' campaign : Google Collaborates with Citizens Advice Bureau for Online Safety Google’s first ever advertising campaign for online safety launches today, in association with the Citizens Advice Bureau. It covers topics such as choosing a password, scam emails and using two factor authentication.The company said future campaigns may deal more extensively with how Google uses people's personal data. The two organisations by using various means and methods, like using adverts in newspapers, on public transports and online, will try to encourage users to adopt secure passwords, log out of web browsers and computers after using them and also to adopt more complex ways to sign in their email accounts which is known as “two-factor authentication”.The campaign also focuses on child protection and use of ‘cookies’ in web browsers. This is the first campaign by Google, which is promoting something different than products such as web browser Chrome. The campaign is p...
Miley Cyrus Needs A Lecture on Cyber Security

Miley Cyrus Needs A Lecture on Cyber Security

Oct 17, 2011
Miley Cyrus Needs A Lecture on Cyber Security The man, who is currently facing up to 121 years behind bars, has been charged with 26 counts of identity theft , wire-tapping and unauthorised access to protected computer.Chaney, who has been in contact with TMZ for the last two years, has contacted the gossip website with details on how he hacked into Miley Cyrus's Gmail account. With celebrity phone hacker Christopher Chaney arrested, another hacker has reached out to TMZ to share how laughably easy it was for him to hack into Miley Cyrus‘ Gmail account. Here’s a lesson in the Internet, Miley: Don’t use the name of your best friend (which the Internet knows) as your security question.First he tracked down her Gmail name; though he doesn’t say what it is, I just did a quick Google search and came up with two possibilities through Yahoo! Answers already. Obviously that part won’t take long. When he tried to log in, he got a security question—the name of one of Miley’s girlfriends...
Sesame Street YouTube Channel Hacked, Porn Posted

Sesame Street YouTube Channel Hacked, Porn Posted

Oct 17, 2011
Sesame Street YouTube Channel Hacked, Porn Posted On Sunday afternoon, some of the world’s worst lowlifes decided to hack the Sesame Street YouTube channel and replace some of the videos with pornographic clips. For about 20 minutes yesterday, visitors to the YouTube channel of the popular children’s show saw hardcore porn instead of Elmo and Big Bird. The channel has nearly 150,000 subscribers, and usually hosts dozens of clips from the PBS program.But Sunday, the hackers replaced the page’s banner to read, “ SESAME STREET: I’TS [sic] WHERE PORN LIVES .” In the profile description, the hackers wrote: “ WHO DOESN’T LOVE PORN KIDS? RIGHT! EVERYONE LOVES IT…PLEASE DON’T LET SESAME STREET TO GET THIS ACCOUNT BACK KIDS …WE GONNA MAKE ALL THE AMERICA HAPPY! ” " We apologize for any inconvenience our audience may have experienced yesterday on our Sesame Street YouTube channel ," read a message on the channel's home page , which appeared to have been restored around 11 a...
Armorize Partners With Symantec to Provide Powerful Anti-Malvertising Technology

Armorize Partners With Symantec to Provide Powerful Anti-Malvertising Technology

Oct 17, 2011
Armorize Partners With Symantec to Provide Powerful Anti-Malvertising Technology Armorize Partners With Symantec to Provide Its Powerful Anti-Malvertising Technology to Symantec's New Solution, AdVantage, to Help Customers Protect Themselves From the Growing Threat of Malicious Advertising Attacks. The partnership will utilize the advanced malware detection engine from Armorize's successful HackAlert product lines to power Symantec's new cloud-based anti-malvertising solution, Symantec AdVantage.The Symantec AdVantage solution will provide its customers with the ability to monitor the ads displayed on their websites for web malware. The product dashboard will also present valuable statistics which enable publishers to compare the quality of ads and ad networks they work with based on the safety ratings and reputation scores for each specific ad or network. Some of the users who visited KickassTorrents (KAT), one of the most popular torrent trackers on the Internet, ...
UNESCO E-platform domain got hacked by Fatal Error Crew

UNESCO E-platform domain got hacked by Fatal Error Crew

Oct 16, 2011
UNESCO E-platform domain got hacked by Fatal Error Crew The E-Platform domain of one of the Biggest Organisation United Nations Educational, Scientific and Cultural Organization (UNESCO) got hacked and defaced by Fatal Error Crew hackers . Mirror of hack is available here . 
Cyber Cell Mumbai Websites hacked by Pakistani Hacker

Cyber Cell Mumbai Websites hacked by Pakistani Hacker

Oct 15, 2011
Cyber Cell Mumbai  Websites hacked by Pakistani Hacker Pakistani hacker " Shadow008 " from Pakistani Cyber Army again strike back on India's Most Important website of Cyber cell located at Mumbai , India. The Websites is Defaced today Morning and Mirror of Hack also available on Legend-h .This is not 1st time when Indian law enforcement agency site become the target of Pakistani hackers. Last Year, CBI website was also defaced by same "Pakistani Cyber Army".  Hacker post the reason of Hack on deface page as " Site Has Be Hacked For Revenge after they hacked our Pakistani Sites ". Right Now, Site is Recovered back to Original One by officials.
Encipher It : Easiest Browser based Advanced Encryption Tools [Video Demonstration]

Encipher It : Easiest Browser based Advanced Encryption Tools [Video Demonstration]

Oct 15, 2011
Encipher It : Easiest Browser based Advanced Encryption Tools [Video Demonstration] " Encipher It " One of the best and easiest AES Text encryptor for Google Mail or anything else. It Provide more secure PBKDF2 (Password-Based Key Derivation Function) key generation. It use Advanced Encryption Standard to protect your data. All encoding/decoding is performed locally in your browser. Video Demonstration by Network NUTS : Subscribe " Network Nuts " You Tube Channel for More Linux Tutorials. Try " Encipher It " Now !
Artillery 0.1 alpha - New tool for Linux Protection by ReL1K

Artillery 0.1 alpha - New tool for Linux Protection by ReL1K

Oct 15, 2011
Artillery 0.1 alpha  - New tool for Linux Protection by ReL1K A new Tool " Artillery " - for Linux Protection has been Released by ReL1K (Founder DerbyCon, Creator of the Social-Engineer Toolkit). It’s written in Python and completely open-source. Artillery is a combination of a honeypot, file monitoring and integrity, alerting, and brute force prevention tool. It’s extremely light weight, has multiple different methods for detecting specific attacks and eventually will also notify you of insecure nix configurations. Features: If anyone decides to port scan or touch those ports, they are blacklisted immediately and permanently. It’s multi-threaded and can handle as many connections thrown at it. Monitor file integrity leveraging sha-512 database Keeps track of all system files and if anything changes Artillery also monitors the SSH logs, and the event of a brute force attack, blacklists the host forever Extremely Simple Configuration ( /var/artillery/config ) ...
Reality Based Cyber Crime Novella Explores Aftermath of Stuxnet Attack On Iran

Reality Based Cyber Crime Novella Explores Aftermath of Stuxnet Attack On Iran

Oct 14, 2011
Reality Based Cyber Crime Novella Explores Aftermath of Stuxnet Attack On Iran GRAND RAPIDS – Cyber Styletto is a new novella by a journalist, a writer, and a security expert who have pooled their talents to create an enthralling good read that is future forward and predictive. The facts are based on real vulnerabilities in the way the Internet is constructed. Recent cyber security attacks using sophisticated malware (think Stuxnet) and social engineering techniques have raised the bar for defenders. Cyber Styletto pivots off these cyber events to educate and entertain. It is written as fact-based fiction. The story comes from the minds of Gian DeTorre and Mike Brennan. DeTorre is the pen name of an award winning fiction writer and literary critic whose stories and reviews have been published worldwide. “ Cyber Styletto is a new genre in literature, bringing the modern, secretive world of cyber espionage together with a good, old-fashioned thriller ,” DeTorre said. I hope our a...
Expert Insights Articles Videos
Cybersecurity Resources