Archive | June, 2010


30 June 2010 | 6,816 views

Google Chrome Set To Follow Firefox In Blocking Out-of-date Plug-ins

It’s good news to see that Google is taking security issues seriously when it comes to its Chrome browser. This has been shown before when Google was Willing To Pay Bounty For Chrome Browser Bugs. And well honestly, we haven’t had a lot of news of exploits in Chrome. Perhaps it’s because the user-base just […]

Continue Reading


29 June 2010 | 9,898 views

PwnageTool 4.01 Released – Jailbreak For iPhone & iPod Firmware 4.0 (iOS4)

The big news in the Apple-sphere recently was the released of iOS 4, which *shock&awe* has folders and multi-tasking – w00t. You can of course jailbreak it with the newly updated PwnageTool 4.01. On Monday, Apple released firmware 4.0 for the iPhone and iPod touch devices. This of course was a major upgrade. As advised, […]

Continue Reading


28 June 2010 | 6,586 views

UK Metropolitan Police To Investigate Google Wifi Data Collection

Well Google has been getting quite a lot of flack lately over the fact that it had been scanning open Wi-fi access points whilst compiling data for street view. At first people just thought it’s fair enough, they are just scanning for the SSID and recording if it’s publicly accessible or not – which in […]

Continue Reading


25 June 2010 | 10,246 views

w3af 1.0-rc3 Available For Download – Web Application Attack & Audit Framework

Our last mention of w3af was back in 2008 when the fifth BETA was released, the team have recently released a new version 1.0 – Release Candidate 3. w3af is a Web Application Attack and Audit Framework. The project’s goal is to create a framework to find and exploit web application vulnerabilities that is easy […]

Continue Reading


24 June 2010 | 13,656 views

Scotland Yard Arrests Teenages For Involvement In Largest English Language Cybercrime Forum

It seems both the US and UK governments have been cracking down pretty harshly on cybercrime operations over the past two years. A number of ‘underground’ forums and cybercrime operations have been shut down including those involving botnets, carding and phishing. One of the big stories earlier this year was the Former DarkMarket Admin Facing […]

Continue Reading


23 June 2010 | 9,450 views

nwmap v0.1 Released – Map Network From PCAP File

This is a neat little tool especially for people doing penetration testing assignments, especially if you’ve done some packet dumps and have PCAP files you can use nwmap to map out live IP addresses. I’d guess it’d be used in the information gathering stage before you fire up your port scanners etc. nwmap is basically […]

Continue Reading


22 June 2010 | 7,103 views

Australians Propose ‘No Anti-virus – No Internet Connection’ Policy

So after a year of research and debate, what did the Aussies come up with? A policy to disconnect people from the Internet if they get infected by a virus.. Rather naive isn’t it? Plus if your ISP cuts you off, how exactly are you supposed to resolve the problem without a connection to do […]

Continue Reading


21 June 2010 | 6,108 views

OpenSCAP – Framework For Implementing SCAP (Security Content Automation Protocol)

The OpenSCAP Project was created to provide an open-source framework to the community which enables integration with the Security Content Automation Protocol (SCAP) suite of standards and capabilities. It is the goal of OpenSCAP to provide a simple, easy to use set of interfaces to serve as the framework for community use of SCAP SCAP […]

Continue Reading


18 June 2010 | 10,565 views

Windows Help Vulnerability Exploited In The Wild

So the other big news this week apart from the AT&T iPad/iPhone 4 screw-up is that a recently announced critical vulnerability in Windows XP is being exploited in the wild. It was disclosed fairly recently and is a vulnerability in the Windows XP help system disclosed by Tavis Ormandy, a Google researcher who has appeared […]

Continue Reading


17 June 2010 | 30,245 views

raw2vmdk – Mount Raw Hard Disk (dd) Images As VMDK Virtual Disks

raw2vmdk is an OS independent Java utility that allows you to mount raw disk images, like images created by “dd”, using VMware, VirtualBox or any other virtualization platform supporting the VMDK disk format. It could be an interesting tool for doing forensics examinations on compromised boxes when all you have is a dd dump of […]

Continue Reading