Search
Monday 23 October 2017
  • :
  • :

Archives post

Buggy Microsoft Outlook Sending Encrypted S/MIME Emails With Plaintext Copy For Months

Beware, If you are using S/MIME protocol over Microsoft Outlook to encrypt your email communication, you need to watch out. From at least...

Wireshark 2.4.2: ο καλύτερος αναλυτής πρωτοκόλλων δικτύου

Νέο Wireshark 2.4.2! Το Wireshark είναι ένα freeware εργαλείο για την παρακολούθηση δικτύων....

Η Αθήνα υποδέχεται το Dell EMC Forum 17 Οκτωβρίου

Η Dell EMC διοργανώνει το Dell EMC Forum στις 17 Οκτωβρίου στην Αθήνα, με στόχο να...

SailPoint survey reveals cyber risks are leaving IT in the dark

According to SailPoint’s 9th annual Market Pulse Survey, senior IT decision makers say that more cyber risks are being created outside of...

Building better defences by establishing a deeper understanding of cyber security threats

The SWIFT Institute has published three new working papers, each aiming to contribute towards the establishment of better cyber defences...

Differing attitudes in Europe to app security

Many of us Brits like to think we are different to our continental neighbours. There are plenty of things that point to us being unique and...

Flaws in SmartVista Payment Platform Expose Sensitive Data

Unpatched SQL injection vulnerabilities found by Rapid7 researchers in the SmartVista e-payments suite from Switzerland-based BPC Banking...

Akamai to Acquire DNS Security Firm Nominum

Akamai Technologies announced on Wednesday that it has agreed to acquire Nominum, a privately-held provider of DNS security solutions for...

Micetrap – Catch evil hackers on the fly by placing open-port traps

#micetrap ___ .-| | |_/,| (\ { | | |o o |__ _) ) "-.|___| _.( T ) / .–‘--. _((_^–‘ /< .+|_|.-||)`-‘(((/ (((/Catch hackers on...

GSM Assessment Toolkit – A security evaluation framework for GSM networks

GSM Assessment Toolkit – GAT GAT is an evaluation framework for assessing security-related aspects of mobile networks based on the GSM...

MS-SQL Penetration Testing lab Setup

Hello friends!! Today you will learn how to install and configure MS SQL server in windows 10 operating system. Requirement: Download setup...

OSXAuditor – Free Mac OS X Computer Forensics Tool

OS X Auditor is a free Mac OS X computer forensics tool. OS X Auditor parses and hashes the following artifacts on the running system or a...

psad – Intrusion Detection and Log Analysis with iptables

The Port Scan Attack Detector psad is a lightweight system daemon written in is designed to work with Linux iptables/ip6tables/firewalld...

Breacher – Tool To Find Admin Login Pages And EAR Vulnerabilites

A script to find admin login pages and EAR vulnerabilites. Features Multi-threading on demand Big path list (798 paths) Supports php, asp...

Big Time Deep Web Firearms Dealer Arrested in Spain

A huge win for authorities in Spain came recently when a 24 year old unnamed man was arrested for buying and selling large quantities of...

Israel hackers caught Russian cyber spies abusing Kaspersky AV to steal NSA secrets

Israeli hackers compromised the Kaspersky infrastructure and caught Russian spies using AV tool to harvest NSA exploits. Kaspersky was not...

ASD revealed hacker stole 30GB of sensitive data on Australia’s military capabilities

The Australia’s foreign intelligence  Agency ASD has revealed military sensitive information has been stolen by hackers who breached a...

Results and forecasts: Group-IB presented Hi-Tech Crime Trends 2017 report

Hi-Tech Crime Trends 2017 – Banks, powerstations and cryptocyrrency exchanges are forecast to be the most likely targets for hacking in...

Kaspersky spotted ATMii, a new strain of ATM malware

Security researchers from Kaspersky Lab have discovered a new strain of ATM malware dubbed ATMii that could be used to empty an ATM....

Νέα τεχνική phishing βάζει στο στόχαστρο το iOS

                  Σύμφωνα με τον ερευνητή Felix Krause, είναι...