Archive | General Hacking

Advertisements


29 July 2011 | 12,795 views

Facebook To Start Paying Bug Bounties

We’ve covered various stories about companies offering hackers and security researchers bounties for giving them working exploits for their software/website etc. Early runners in the game were – Google Willing To Pay Bounty For Chrome Browser Bugs Now, 2 years down the road, Facebook has decided it’s a good idea to offer up a $500 […]

Continue Reading


27 June 2011 | 6,127 views

Last Chance To Get 10% Off Penetration Testing – Student Course

A couple of weeks back we posted about the new course suited to beginners by eLearnSecurity – we also offered an exclusive 10% Discount for Darknet readers – Penetration Testing – Student Course/Training by eLearnSecurity (Get 10% Off Until June 30th!). This is just a reminder that this offer expires in THREE days on June […]

Continue Reading


13 June 2011 | 7,284 views

IMF (International Monetary Fund) Suffer Major Breach In Sophisticated Cyberattack

Oh dear, another big organization has fallen foul to the whole RSA SecurID hack – it seems that way anyway. In combination with a Spear Phishing attack (similar to the one carried out on high level US officials via Gmail recently) hackers have busted the IMF wide open. It seems to be a very targeted […]

Continue Reading


09 June 2011 | 10,480 views

Penetration Testing – Student Course/Training by eLearnSecurity

Introduction You may remember a while back we reviewed the Penetration Testing – Pro course by eLearnSecurity here – eLearnSecurity – Online Penetration Testing Training and we posted about the course update here – Penetration Testing Course Pro 1.1 – New Version & New Module. The latest news is they’ve come out with a truly […]

Continue Reading


10 May 2011 | 5,942 views

VUPEN Whitehats Claim To Have Broken Chrome Sandbox

The big news recently is that someone has finally managed to pop the formidable Chrome browser, as we know from following Pwn2Own – it’s been safe for 3 years in a row. It has a sandbox, ASLR and DEP and that’s a pretty heavy combination to keep users safe from malicious software coming in via […]

Continue Reading


18 April 2011 | 7,786 views

Adobe Patches Latest Flash Zero Day Vulnerability

There’s been a lot of news about this Adobe Flash Player vulnerability as apparently it has been exploited in the wild and Adobe were willing to push out an out-of-band patch for it – which means in their eyes it is really serious. They don’t have a great reputation for testing their software before releasing […]

Continue Reading


11 April 2011 | 6,714 views

TJX Hacker Albert Gonzalez Claims Government Made Him Do It

The latest news from the tinfoil hat wearing conspiracy camp is that Albert Gonzalez the TJX hacker who was convicted in 2009 was authorized to hack by the US Government. Back in 2009 we posted about that too – TJX Hacker Albert “Segvec” Gonzalez Indicted By Federal Grand Jury. And now he’s saying his actions […]

Continue Reading


16 February 2011 | 17,043 views

Apple Adds greenpois0n Jailbreak Detection to iBooks Software

Apple has pulled out some new tricks in it’s war against the unstoppable jailbreak machine, this time leveraging on the iBooks application. It’s quite a neat implementation, it appears the new iOS update with iBooks dropped an un-signed application on the phone and tries to run it – if it executes it assumes the device […]

Continue Reading


09 February 2011 | 11,818 views

Penetration Testing Course Pro 1.1 – New Version & New Module

Penetration Testing Course Pro 1.1 release aims at addressing all of the suggestions collected in the first 6 months of activity and adds 1 new module and 50 minutes of video training on Social Engineering Toolkit. As reviewed by us before (eLearnSecurity – Online Penetration Testing Training) this course is becoming a very popular choice […]

Continue Reading


12 January 2011 | 15,683 views

MagicTree – Penetration Tester Productivity Tool

MagicTree is a penetration tester productivity tool, it allows easy and straightforward data consolidation, querying, external command execution, and report generation. In case you wonder, “Tree” is because its stores all the data in a tree, and “Magic” because it is designed to magically do the most cumbersome and boring part of penetration testing – […]

Continue Reading


Advertisements