Archive | General Hacking




Downgrade PSP v2.6 to v1.5 to play homebrew & ISO games

Dark_AleX has now shared Downgrader Test v0.5 For PSP 2.50/2.60 Firmware which, according to MANY users (including TGMG, LalaMan, Firey, and LAXitives), works 100% with PSP consoles that were upgraded to v2.50 or v2.60 Firmware. However, it will NOT work with TA-082 versions and it’s NOT recommended for users whose FACTORY/STOCK Firmware was 2.50 or […]

Tags: ,

Posted in: General Hacking | Add a Comment

UFO ‘Hacker’ Gary McKinnon Reveals What He Found

An interesting interview had been posted on Wired with Gary McKinnon about what he actually found whilst penetrating the US government networks. After allegedly hacking into NASA websites — where he says he found images of what looked like extraterrestrial spaceships — the 40-year-old Briton faces extradition to the United States from his North London […]

Tags: , , , , , , , , ,

Posted in: General Hacking, Legal Issues | Add a Comment

Cross Site Scripting (XSS)

Cross Site Scripting, or know as XSS, is the most common basic web hacking technique… and harmless, as many would say… but on this matter I don’t really agree, that’s why I wrote this article. About XSS as I knew it is a very abstract definition for JavaScript injection, or at least this is what […]

Tags: , , , , , , , ,

Posted in: General Hacking, Web Hacking | Add a Comment

Money Lost Due to Cybercrime Down Again This Year!

It seems even though vendors are pushing their snakeoil harder than ever, the actual figures show that the money lost due to cybercrime has decreased every year for the last four years! Perhaps people are finally getting more secure, it’s not suprising with the advent of cheaper and easier to use intrusion detection and intrusion […]

Tags: , , , , ,

Posted in: General Hacking, Legal Issues | Add a Comment

Graph Analysis of Credit Card Loss

I saw some interesting information recently on a mailing list. We took one sample of one carding/phishing forum that our Global Surveillance Center was monitoring and sampled the set into a graph that lists the top 10 banks and the losses over the last month. As you can see, it’s obvious who the top credit […]

Tags: , , , ,

Posted in: General Hacking, Phishing | Add a Comment

RFID & Biometrics Used At World Cup in Germany

RFID, biometrics, hi-tech police officers, yes it’s all going to be happening in Germany for the close approaching World Cup 2006. Not surprisingly, security is a top priority for the German government, even higher than its desire to see the national team walk off the pitch with the World Cup 2006 trophy. The list of […]

Tags: , , , , , ,

Posted in: General Hacking, Privacy, Wireless Hacking | Add a Comment

The Top 10 Most Common Passwords

A pretty interesting article that statistically measured the frequency of passwords by taking an aggregate sample of passwords (primarily from the UK). Here are listed the most commonly occurring from the sample. 10. ‘thomas’ (0.99%) First off, at number 10, is the most common format of passwords – the name. Thomas is a perennially popular […]

Tags: , , , , , , , , , , ,

Posted in: General Hacking | Add a Comment

SyScan’06 – The Asian Hackers’ Conference

The Symposium on Security for Asia Network aims to be a very different security conference from the rest of the security conferences that the information security community in Asia has come to be so familiar and frustrated with. SyScan’06 intends to be a non-product, non-vendor biased security conference. It is the aspiration of SyScan’06 to […]

Tags: , , , , , , ,

Posted in: Events/Cons, General Hacking | Add a Comment

Penetration Testing vs Vulnerability Assessment

There seems to be a certain amount of confusion within the security industry about the difference between Penetration Testing and Vulnerability Assessment, they are often classified as the same thing when in fact they are not. I know Penetration Testing sounds a lot more exciting, but most people actually want a VA not a pentest, […]

Tags: , , , , , , , , , ,

Posted in: General Hacking | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·