The Blog
HOME
Monday, September 24, 2012
Clone RFID Tags with Proxmark 3
http://www.offensive-security.com/offsec/cloning-rfid-tags-with-proxmark-3/
A Visual History of Mac OS
http://owocki.com/2012/09/21/a-visual-history-of-mac-os/
A Visual History of Microsoft Windows
http://owocki.com/2012/09/23/a-visual-history-of-microsoft-windows/
Some Cyber criminals Most wanted by FBI
http://www.fbi.gov/wanted/cyber
Backdoor:OSX/Imuler.B No Likes Wireshark
http://www.f-secure.com/weblog/archives/00002432.html
eForensics Mobile 2/2012
http://eforensicsmag.com/eforensics-mobile-22012/
Tiny Evil Maid CHKDSK Utility Can Steal Passwords
https://threatpost.com/en_us/blogs/tiny-evil-maid-chkdsk-utility-can-steal-passwords-092412
https://github.com/AlexWebr/evilmaid_chkdsk
An Interview With Eugene Kaspersky
https://threatpost.com/en_us/blogs/interview-eugene-kaspersky-092412
Drop test: iPhone 5 vs. Samsung Galaxy S III [video]
http://venturebeat.com/2012/09/24/iphone-5-v-samsung-galaxy-s-iii/
Microsoft Windows Update emails try to steal your Gmail, Yahoo, AOL passwords...
http://nakedsecurity.sophos.com/2012/09/24/microsoft-windows-update-emails-try-to-steal-your-gmail-yahoo-aol-passwords/
Microsoft warns of Flash vulnerability on IE 10 and Windows 8
http://nakedsecurity.sophos.com/2012/09/24/microsoft-flash-ie-10-windows-8/
Would you insure your Twitter or Facebook account against trolls and hackers?
http://nakedsecurity.sophos.com/2012/09/24/would-you-insure-your-twitter-or-facebook-account-against-trolls-and-hackers/
Using Android and NFC for fare dodging
http://www.h-online.com/security/news/item/Using-Android-and-NFC-for-fare-dodging-1715821.html
https://play.google.com/store/apps/details?id=com.intrepidus.ultracardtester
The 5 most popular Twitter users
http://twittercounter.com
Alexa Top 500 Global Sites
http://www.alexa.com/topsites
Real Time Satellite Tracking
http://www.n2yo.com
Trojan Written in Google Go Found in the Wild
http://paritynews.com/security/item/353-trojan-written-in-google-go-found-in-the-wild
Hackers deface old UTS system, dump user database
http://www.zdnet.com/au/hackers-deface-old-uts-system-dump-user-database-7000004694/
HAKIN9 Raspberry Pi Hacking – Exploiting Software 08/12
http://hakin9.org/raspberry-pi-hacking-exploiting-software-0812/
iPhone 5 and 4 Hacked with same Exploit
http://thehackernews.com/2012/09/iphone-5-and-4-hacked-with-same-exploit.html
The HoneyMap shows cyber attacks on the Honeynet Project's honeypots in real time.
http://map.honeycloud.net
http://www.honeynet.org
Lost+Found: Touchtone injection, hacking lessons and PIN problems
http://www.h-online.com/security/news/item/Lost-Found-Touchtone-injection-hacking-lessons-and-PIN-problems-1715503.html
Behind the Captcha or Inside Blackhole Exploit Kit 2.0 - Exploit Kit Administration Panel
http://malware.dontneedcoffee.com/2012/09/behind-captcha-or-inside-blackhole.html
Iran readies domestic Internet system, blocks Google
http://www.reuters.com/article/2012/09/23/net-us-iran-internet-national-idUSBRE88M0AO20120923
Just how hackable is your digital life?
http://www.pcworld.com/article/2010300/just-how-hackable-is-your-digital-life.html
Showdown: Parallels Desktop 8 vs. VMware Fusion 5
http://arstechnica.com/features/2012/09/parallels-desktop-8-and-vmware-fusion-5-pro-review-showdown/
Twitter DMs from your friends can lead to Facebook video malware attack
http://nakedsecurity.sophos.com/2012/09/24/twitter-facebook-video-malware/
Kim Dotcom now a "real life James Bond villain" in latest Megaupload dot bombshell
http://nakedsecurity.sophos.com/2012/09/24/kim-dotcom-megaupload-bombshell/
Apple Mountain Lion 10.8.2 - lots of bug fixes, no known vices
http://nakedsecurity.sophos.com/2012/09/24/apple-mountain-lion-10-8-2-lots-of-bug-fixes-no-known-vices/
Savviest hackers hail from Eastern Europe, researchers say
http://www.pcworld.com/article/2010491/savviest-hackers-hail-from-eastern-europe-researchers-say.html
Newer Posts
Older Posts
Home
Subscribe to:
Posts (Atom)