blogs.hackerscenter.com
Hackers Center Blogs: June 2009
http://blogs.hackerscenter.com/2009_06_01_archive.html
Tuesday, June 30, 2009. Cybercrime spreads on Facebook. Brett D. Arion. BOSTON (Reuters) - Cybercrime is rapidly spreading on Facebook as fraudsters prey on users who think the world's top social networking site is a safe haven on the Internet. Lisa Severens, a clinical trials manager from Worcester, Massachusetts, learned the hard way. A virus took control of her laptop and started sending pornographic photos to colleagues. Scammers break into accounts posing as friends of users, sending spam that direc...
blogs.hackerscenter.com
Hackers Center Blogs: November 2008
http://blogs.hackerscenter.com/2008_11_01_archive.html
Sunday, November 30, 2008. FEDs can lojack mobiles without telco help. States that government can determine location of mobile phones without the help of Telco. They can do this by cell-site simulators or digital analyzers called Trigger-Fish. Well nothing new about this technology. It had been well known from Mitnick's time when Tsutomu Shimomura used to track him. But recently there had been many issues as. ACLU and Electronic Frontier Foundation. Have received several batches. One of the documents.
blogs.hackerscenter.com
Hackers Center Blogs: October 2009
http://blogs.hackerscenter.com/2009_10_01_archive.html
Friday, October 23, 2009. Use Data Masking to Secure Sensitive Data in Non-Production Environments. Brett D. Arion. Wal-Mart's situation may not be unique. According to Gartner, more than 80%t of companies are using production sensitive data for non-production activities such as in-house development, outsourced or off-shored development, testing, quality assurance and pilot programs. Is one of the leading vendors in the nascent market of data masking. Symbian Microkernel released as Open Source. It was w...
blogs.hackerscenter.com
Hackers Center Blogs: December 2009
http://blogs.hackerscenter.com/2009_12_01_archive.html
Monday, December 28, 2009. ELearnSecurity : Breaking into system is no more enough. Hello everyone. We have been out for awhile working on the upcoming and long awaited eLearnSecurity Penetration Testing Professional Course. The work has been hard as you can see here. But the feedbacks from the first test run have been great: the 5 CISSP's who have evaluated one of our modules have been amazed of how simple and interactive it is to learn the most advanced pentesting techniques. 5 hours of videos. At the ...
blogs.hackerscenter.com
Hackers Center Blogs: December 2008
http://blogs.hackerscenter.com/2008_12_01_archive.html
Tuesday, December 30, 2008. Rogue CA certificates through MD5 collisions. Researchers Sotirov and others, provided practical proof of concept of a well known but till now theoretical threat: MD5 collisions. Today, At the 25c3 conference in Berlin. It's the first time that this is put in place and according to authors of research over 100 Play stations 3 have been using to match the collisions. More on the research can be found here. Monday, December 29, 2008. Winner of the Survey contest is. The survey c...
blogs.hackerscenter.com
Data Related to Kneber Botnet breach recovered by Netwitness | Hackers Center Blogs
http://blogs.hackerscenter.com/2010/02/data-related-to-kneber-botnet-breach.html
Thursday, February 18, 2010. Data Related to Kneber Botnet breach recovered by Netwitness. Brett D. Arion. Security researchers at Herndon, Va.-based NetWitness Corp. have unearthed a massive botnet affecting at least 75,000 computers at 2,500 companies and government agencies worldwide. Disturbingly, the data was only a one-month snapshot of data from a campaign that has been in operation for more than a year," NetWitness said in a statement announcing the discovery of the botnet late yesterday. NetWitn...
blogs.hackerscenter.com
Hackers Center Blogs: August 2009
http://blogs.hackerscenter.com/2009_08_01_archive.html
Thursday, August 6, 2009. Researchers find large-scale XML library flaw - Sun, Apache and Python vulnerable. Brett D. Arion. Labels: Web Application Security. Working with CERT-FI in Finland, have uncovered a series of flaws in the eXtensible Markup Language. XML) libraries that could pose a serious security risk. The flaws uncovered deal with the way open-source programs process XML functions. Application makers such as Sun Microsystems. Subscribe to: Posts (Atom). Subscribe To HSC Blogs.
blogs.hackerscenter.com
Hackers Center Blogs: January 2010
http://blogs.hackerscenter.com/2010_01_01_archive.html
Tuesday, January 12, 2010. China steals Google's data. In an astonishing post. Today Google admitted that Chinese hackers have successfully stolen intellectual property from the big G corporate network and from other 20 large companies in the U.S. Gmail accounts of Chinese activists were the hackers primary goal according to Google, adding that these accounts have been accessed by third-parties through the use of malwares and phishing attacks. Read the full post here. Friday, January 8, 2010. Burp Suite ...
blogs.hackerscenter.com
Building security into business processes | Hackers Center Blogs
http://blogs.hackerscenter.com/2010/02/building-security-into-business.html
Tuesday, February 16, 2010. Building security into business processes. Earlier today after months of avoiding it, I finally decided to go a few days without my faithful Blackberry and get the camera repaired. As I handed over my Blackberry, the technician returned a zip-lock bag with the battery, back cover and sim card. Formatting a phone or implementing encryption on PDAs takes nothing more than a few minutes these days. Some may argue that not all users maintain regular backups of their phone data...
blogs.hackerscenter.com
Spy Eye tool kit goes after Zeus botnet | Hackers Center Blogs
http://blogs.hackerscenter.com/2010/02/spy-eye-tool-kit-goes-after-zeus-botnet.html
Thursday, February 11, 2010. Spy Eye tool kit goes after Zeus botnet. Brett D. Arion. Spy Eye tool kit goes after Zeus botnet: "Peter Coogan at Symantec put up a very interesting blog post yesterday about a crimeware kit called SpyEye v1.0.7 (on sale now on Russian sites - $500) that has a module that will kill a Zeus bot infection on a victim’s computer so the bot created by SpyEye can take it over. In September, Computer Weekly reported. Coogan said the SpyEye kit can also create crimeware with:. 8220;...
SOCIAL ENGAGEMENT