Monday, September 24, 2012

Clone RFID Tags with Proxmark 3

http://www.offensive-security.com/offsec/cloning-rfid-tags-with-proxmark-3/

A Visual History of Mac OS

http://owocki.com/2012/09/21/a-visual-history-of-mac-os/

A Visual History of Microsoft Windows

http://owocki.com/2012/09/23/a-visual-history-of-microsoft-windows/

Some Cyber criminals Most wanted by FBI

http://www.fbi.gov/wanted/cyber

Backdoor:OSX/Imuler.B No Likes Wireshark

http://www.f-secure.com/weblog/archives/00002432.html

eForensics Mobile 2/2012

http://eforensicsmag.com/eforensics-mobile-22012/

Tiny Evil Maid CHKDSK Utility Can Steal Passwords


https://threatpost.com/en_us/blogs/tiny-evil-maid-chkdsk-utility-can-steal-passwords-092412

https://github.com/AlexWebr/evilmaid_chkdsk

An Interview With Eugene Kaspersky

https://threatpost.com/en_us/blogs/interview-eugene-kaspersky-092412

Drop test: iPhone 5 vs. Samsung Galaxy S III [video]


http://venturebeat.com/2012/09/24/iphone-5-v-samsung-galaxy-s-iii/

Microsoft Windows Update emails try to steal your Gmail, Yahoo, AOL passwords...

http://nakedsecurity.sophos.com/2012/09/24/microsoft-windows-update-emails-try-to-steal-your-gmail-yahoo-aol-passwords/

Microsoft warns of Flash vulnerability on IE 10 and Windows 8

http://nakedsecurity.sophos.com/2012/09/24/microsoft-flash-ie-10-windows-8/

Would you insure your Twitter or Facebook account against trolls and hackers?

http://nakedsecurity.sophos.com/2012/09/24/would-you-insure-your-twitter-or-facebook-account-against-trolls-and-hackers/

Using Android and NFC for fare dodging

http://www.h-online.com/security/news/item/Using-Android-and-NFC-for-fare-dodging-1715821.html

https://play.google.com/store/apps/details?id=com.intrepidus.ultracardtester

The 5 most popular Twitter users

http://twittercounter.com

Alexa Top 500 Global Sites

http://www.alexa.com/topsites

Real Time Satellite Tracking

http://www.n2yo.com

Trojan Written in Google Go Found in the Wild

http://paritynews.com/security/item/353-trojan-written-in-google-go-found-in-the-wild

Hackers deface old UTS system, dump user database

http://www.zdnet.com/au/hackers-deface-old-uts-system-dump-user-database-7000004694/

HAKIN9 Raspberry Pi Hacking – Exploiting Software 08/12

http://hakin9.org/raspberry-pi-hacking-exploiting-software-0812/

iPhone 5 and 4 Hacked with same Exploit

http://thehackernews.com/2012/09/iphone-5-and-4-hacked-with-same-exploit.html

The HoneyMap shows cyber attacks on the Honeynet Project's honeypots in real time.

http://map.honeycloud.net

http://www.honeynet.org

Lost+Found: Touchtone injection, hacking lessons and PIN problems

http://www.h-online.com/security/news/item/Lost-Found-Touchtone-injection-hacking-lessons-and-PIN-problems-1715503.html

Behind the Captcha or Inside Blackhole Exploit Kit 2.0 - Exploit Kit Administration Panel

 http://malware.dontneedcoffee.com/2012/09/behind-captcha-or-inside-blackhole.html

Iran readies domestic Internet system, blocks Google

http://www.reuters.com/article/2012/09/23/net-us-iran-internet-national-idUSBRE88M0AO20120923

Just how hackable is your digital life?

http://www.pcworld.com/article/2010300/just-how-hackable-is-your-digital-life.html

Showdown: Parallels Desktop 8 vs. VMware Fusion 5

http://arstechnica.com/features/2012/09/parallels-desktop-8-and-vmware-fusion-5-pro-review-showdown/

Twitter DMs from your friends can lead to Facebook video malware attack

http://nakedsecurity.sophos.com/2012/09/24/twitter-facebook-video-malware/

Kim Dotcom now a "real life James Bond villain" in latest Megaupload dot bombshell

http://nakedsecurity.sophos.com/2012/09/24/kim-dotcom-megaupload-bombshell/

Apple Mountain Lion 10.8.2 - lots of bug fixes, no known vices

http://nakedsecurity.sophos.com/2012/09/24/apple-mountain-lion-10-8-2-lots-of-bug-fixes-no-known-vices/

Savviest hackers hail from Eastern Europe, researchers say

http://www.pcworld.com/article/2010491/savviest-hackers-hail-from-eastern-europe-researchers-say.html