• Most Wanted Cyber Criminal Bogachev $3M

    Feb 26, 15 • SecurityNo Comments
    Most Wanted Cyber Criminal Bogachev $3M

    Evgeniy Mikhailovich Bogachev, the most wanted hacker for having stolen more than a 100 million in USD. The FBI – Federal Bureau of Investigation United States declared on Tuesday a 3 million USD reward for any information leading to the arrest of Bogachev. This is by far the highest bounty the US authorities have offered ...

  • Lenovo.com Website Hacked for SuperFish Fix

    Feb 26, 15 • SecurityNo Comments
    Lenovo.com Website Hacked for SuperFish Fix

    Vengeance in the name of ‘SuperFish’? If you don’t already know, Superfish had a malware that came preinstalled on Lenovo computers, it was something that compromised the encryption certificates to quietly include ads on Google Searches. Less than a week ago, the news came that Lenovo removed Superfish-malware from their machines, and in the same ...

  • Cryptoware targets Police Department for $600 ransom

    Feb 25, 15 • SecurityNo Comments
    Cryptoware targets Police Department for $600 ransom

    Thanks to Bitcoins! Cybercriminals have found an easy way to rip victims off by locking their data and the data is deleted if the victim does not pay the ransom in the remaining amount of time, in bitcoins. Cryptoware is the predecessor of the famous old Ransomwares, CryptoWall CryptoLocker PrisonLocker It hit a computer at ...

  • Biggest Vulnerabilities of 2014 – Heartbleed & ShellShock

    Feb 25, 15 • Feature, SecurityNo Comments
    Biggest Vulnerabilities of 2014 – Heartbleed & ShellShock

    Two of the biggest vulnerabilities that were found last year were 1 – Heartbleed Was a security vulnerability detected in the OpenSSL encryption technique. In short, it meant anyone tapping our internet connect could easily sniff what we considered to be ‘encrypted’. Imagine all your conversation over Facebook and you online banking sessions were not ...

  • Most Vulnerable Operating System of 2014

    Feb 25, 15 • Feature, SecurityNo Comments
    Most Vulnerable Operating System of 2014

    Apple products may be expensive but they are not as secure as we might think. Windows may be cheap, but it seems far more secure when it comes to vulnerabilities. A recent analysis by GFI Security Solution Providers shows that the most vulnerable operating systems are: 1 – Apple’s MAC OSX 2 – Apple iOS ...

  • Disclaimer

    Jan 8, 15 • DisclaimersNo Comments
    Disclaimer

    Disclaimer The opinions expressed on this blog and any syndicated replication thereof are those of the authors alone, and do not reflect the opinions of employers, partners, or anyone else unless otherwise explicitly stated. Although every care has been taken to ensure the accuracy of the information published, no warranty can be given in respect ...

  • The Simplest Trojan Backdoor Rootkit Payload

    The Simplest Trojan Backdoor Rootkit Payload

    Here is how you can easily generate a trojan backdoor payload for penetration-testing practices like social engineering through user-interaction. For this practice we will require MSF (Metasploit framework). MSF comes preinstalled with KALI LINUX and that is what we will be using for this experiment. Once you have a Linux set up with MSF we ...

  • Bitcoin for Dummies

    May 17, 13 • Feature1 Comment
    Bitcoin for Dummies

    The modern world as we know today is run by a healthy economy; this economy is driven by the influx of money, in the form of trade and business. Governments all over the world operate by collecting tax returns from its citizens, and invest it back to the system. Generally any geographical region’s strength is ...

  • Penetration Testing Execution Standard – PTES

    Penetration Testing Execution Standard – PTES

    Penetration Testing Execution Standards – PTES Before, we talked about the aspects of pen-testing in brief. Now we look at the SOP involved with Pen-Testing; and ‘those’ standards are called as Penetration Testing Execution Standards or PTES. Written by several of the leading security officers in the information-security networks, the purpose is to make pen-testing ...

  • Penetration Testing and Ethical Hacking

    May 7, 13 • Ethical Hacking, SecurityNo Comments
    Penetration Testing and Ethical Hacking

    Ethical hacking, Security auditing and Penetration testing are different terms that relate to a common procedure. It is the process through which a cyber attack is simulated on a computer system in order to discover and _prevent_ security breaches, and patch exploitable vulnerabilities. The purpose of penetration testing So basically the purpose of penetration testing ...