Google Releases Content Security Policy Tool To Prevent XSS Attack
Google Releases Content Security Policy Tool To Prevent From cross-site scripting (XSS), Clickjacking and other Malicious script.Cross-site scripting XSS is one of the top most popular Vulnerability...
View ArticleThe Antivirus Hacker's Handbook (a $29.99 value) Download FREE
Hack Your Antivirus Software To Stamp Out Future Vulnerabilities.The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and...
View Articletmux "Terminal Multiplexer" To Be Accessed and Controlled From A Single Terminal
tmux is a "terminal multiplexer", it enables a number of terminals (or windows) to be accessed and controlled from a single terminal. tmux is intended to be a simple, modern, BSD-licensed alternative...
View ArticleProper Web Application Security Is About More Than Just Compliance
A Compliant Web Application is Not Necessarily Secure.Compliance regulations are guidelines to help businesses build and maintain more secure web applications, though in reality it takes more than...
View ArticleMalware Attack On Indian ATM's Including SBI, HDFC, Axis, ICICI And YES Bank
Malware Attack On Indian ATM's Including SBI, HDFC, Axis, ICICI and YES Bank. State Bank of India (SBI) Blocked 600,000 cards.Biggest Data Breach due to compromised Hardware Security Module (HSM) Don't...
View ArticlePWND.SH: Post-Exploitation Framework (and an interactive shell) Developed In...
It aims to be cross-platform (Linux, Mac OS X, Solaris etc.) and with little to no external dependencies.Install:$ cd bin/$ ./compile_pwnd_sh.shThis will generate a file called pwnd.sh$ ls -la...
View ArticleHow To Secure Internet of Things (IoT) And Challenges
Some Internet of Things (IoT) secure points you need to knowAlways create a separate network.Don't connect your device to internet unless you needkeep different passwords for each device.Make sure your...
View ArticleDebunking Top 5 Security Implementation Myths
Debunking the Top 5 Security Implementation Myths.Even if they know their companies' current security solution isn't effective, many IT managers are under the false impression that it's simply too...
View ArticleVolatilityBot – An Automated Memory Analyzer For Malware Samples And Memory...
VolatilityBot – An Automated Memory Analyzer For Malware Samples And Memory DumpsVolatilityBot is an automation tool for researchers cuts all the guesswork and manual tasks out of the binary extraction...
View ArticleNathan: Android Emulator for Mobile Security Testing Tool
Nathan: Android Emulator for Mobile Security Testing ToolNathan is a 5.1.1 SDK 22 AOSP Android emulator customized to perform mobile security assessment.Supported architectures:x86arm (soon)The...
View ArticleImmigration Website of Canada Goes Down During United State President Election
Immigration Website of Canada goes Down During United State President Election.Canada immigration website down during US election counting and displayed Internal server problem while accessing the...
View ArticleHackers Exploited, Apple Safari, Adobe Flash and Google Pixel in 60 Seconds
Hackers Hacked Google Pixel in 60 Seconds On Friday, Chinese hackers successfully Exploited Apple Safari, Adobe Flash and Google Pixel at PwnFest hacking competition in Seoul, Japan.Exploit launched in...
View ArticleThe Network Security Test Lab: A Step-by-Step Guide ($40 Value) FREE For a...
The ultimate hands-on guide to IT security and proactive defense.Covering the full complement of malware, viruses, and other attack technologies, this essential eBook walks you through the security...
View ArticleHackers Can Use Your HeadPhones To Spy On You
Hackers Can Use Your HeadPhones For Spy On YouThe Security researchers of Israel found new Malware known Speake(a)r that converts headphones into microphones and to record all your personal...
View ArticleNew Bug Allowing Hackers To Bypass Apple's iCloud Activation Lock
New Bug Allowing Hackers To Bypass Apple's iCloud Activation Lock for iPhone And iPads devices.By using Find My iPhone service which allows to View your current location and your missing device on the...
View ArticleMassive Cyber Attack on Russian Central Bank $31 Million Stolen
Massive Cyber Attack on Russian Central Bank $31 Million StolenRussia’s Federal Security Service (FSB) already warned and said that the servers to be used in the alleged cyber attack were located in...
View Article1 Million Android Devices Infected With Gooligan Malware
1 Million Android Devices Infected With Gooligan Malware.Over 1 Million Android Devices are Infected.Mostly Asian users are affected.Security researchers of Checkpoint found and reported to...
View Article2017 Ultimate IT Security Kit (over $16 value!) FREE For A Limited Time
This IT Security Kit includes “Mobile Device Exploitation Cookbook” plus 3 other resources to help you understand IT security.The 2017 Ultimate IT Security Kit compiles the latest information to help...
View ArticleAndroguard- Reverse Engineering And Malware Analysis Tool For Android...
Androguard- Reverse Engineering And Malware Analysis for Android ApplicationsAndroguard is available for Linux/OSX/Windows written in Python.Features:Androguard is a full python tool to play with...
View ArticleTOR Releases Sandboxed-Tor-Browser 0.0.2 Alpha Version
TOR Released Sandboxed-Tor-Browser 0.0.2 Alpha VersionTor Sandboxed Browser 0.0.2 version is only available for Linux. Official binaries should be available sometime next week, though the version is...
View Article