Archive | June, 2011


08 June 2011 | 13,400 views

Burp Suite Free Edition v1.4 – Web Application Security Testing Tool

We love Burp Suite and we have since wayyyy back, the last update we posted was around 18 months ago back in January 2010 – Burp Suite v1.3 Released – Integrated Platform For Attacking Web Applications. For the two people here who don’t know what this tool does, Burp Suite is an integrated platform for [...]

Continue Reading


07 June 2011 | 11,615 views

RSA Finally Admits 40 Million SecurID Tokens Have Been Compromised

Well we did say assume SecurID was broken back in March when we wrote – RSA Silent About Compromise For 7 Days – Assume SecurID Is Broken. With the recent news Lockheed Martin Hacked – Rumoured To Be Linked to RSA SecurID Breach and another US Military sub-contractor compromised through SecurID tokens – RSA have [...]

Continue Reading


06 June 2011 | 17,915 views

FaceNiff – Taking FireSheep Mobile – Sniff & Intercept Web Sessions With Android

FaceNiff is an Android app that allows you to sniff and intercept web session profiles over the WiFi that your mobile is connected to. It is possible to hijack sessions only when WiFi is not using EAP, but it should work over any private networks (Open/WEP/WPA-PSK/WPA2-PSK). It’s kind of like Firesheep for android, but maybe [...]

Continue Reading


02 June 2011 | 6,818 views

Targeted Phishing Attacks Carried Out On Gmail – Likely From China

It was just about a week ago when we wrote about the technical flaw in Hotmail and the fact that the Hotmail Exploit Has Been Silently Stealing E-mail for some time. The latest news is some hackers have been targeting users of the Gmail service, specifically US government officials. This comes shortly after the news [...]

Continue Reading


01 June 2011 | 7,398 views

Microsoft Enhanced Mitigation Evaluation Toolkit (EMET)

The enhanced Mitigation Experience Toolkit (EMET) is designed to help prevent hackers from gaining access to your system. Software vulnerabilities and exploits have become an everyday part of life. Virtually every product has to deal with them and consequently, users are faced with a stream of security updates. For users who get attacked before the [...]

Continue Reading