Archive | Privacy




VideoJak – IP Video Security Assessment Tool

What is VideoJak? VideoJak is an IP Video security assessment tool that can simulate a proof of concept DoS against a targeted, user-selected video session and IP video phone. VideoJak is the first of its kind security tool that analyzes video codec standards such as H.264. VideoJak works by first capturing the RTP port used […]

Tags: , , , , , , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Privacy | Add a Comment

Satellite Feed Hacking – Your Data Isn’t Private!

Hardware hacking is an interesting area and something not too many people get into as the soldering irons, capacitors and chipsets seem daunting. I did have a play around with cable boxes and satellite feeds in my earlier years and was surprised to find how insecure they were. Most traffic is transmitted unencrypted, the stuff […]

Tags: , , , , , , , , , , , ,

Posted in: Hardware Hacking, Legal Issues, Privacy | Add a Comment

Using Twitter for Data Mining and Information Gathering

We’ve mentioned Twitter a few times lately as it has become a larger and larger part of the social web and the premier ‘micro-blogging’ platform. There was a recent Phishing issue on Twitter and before that Twitter Jacking and a CSRF bug that allowed auto-following. Due to the large update of Twitter, the amount of […]

Tags: , , , , , , , , , , , , ,

Posted in: General Hacking, Privacy, Social Engineering | Add a Comment

Express Scripts Offers $1million Reward for Cyber Extortionists

This is an interesting story, I’ll be watching how it develops – it’s not often you see a bounty for online crimes and especially one as enticing as 1 million dollars! That’s a hell of a sum for nailing down some dodgy hackers who are running an extortion scam after a data leak. I really […]

Tags: , , , , , , ,

Posted in: General Hacking, Legal Issues, Privacy | Add a Comment

Google Hacking Back in The News – Google Takes Action

Google hacking was the big thing back in 2004, I actually did a talk on it in Hack in the Box 2004, it’s resurfaced again as a serious threat with Google noticing more queries relating to things like social security numbers. The Google Hacking Database has been active for years now and there are hundreds […]

Tags: , , , , , , , ,

Posted in: Database Hacking, Exploits/Vulnerabilities, Privacy, Web Hacking | Add a Comment

DarkMarket Carding (Credit Card Fraud) Site Part of FBI Sting

You may remember the story about the Pro ATM Hacker ‘Chao’ and his Tips a while back, apparently that was the start of a big global sting operation on credit card fraud. Chao was admin/moderator on a community of carders (where they bought/sold stolen credit card info) called DarkMarket and the first to be busted, […]

Tags: , , , , , ,

Posted in: Legal Issues, Privacy, Spammers & Scammers | Add a Comment

MI6 Sells Digital Camera on Ebay Containing Terrorist Images

Another classic data leakage….and once again it happened on Ebay! This time it’s a British agency known as MI6 (Secret Intelligence Service) demonstrating a distinct lack of intelligence. How on earth does something like even happen? Even smaller agencies and companies I’ve worked with have rigorous data destruction policies when old equipment is recycled or […]

Tags: , , , , , , ,

Posted in: Legal Issues, Privacy | Add a Comment

THC-ePassports – THC Clones Biometric ePassport – Elvis Presley Passport

I guess most people have been led to believe this new generation of ePassports or biometric passports are more secure, will help us keep our privacy intact and help us mitigate against identity theft. Well how wrong the propaganda is! THC (famous for their tools and research in security) has just released some technical information, […]

Tags: , , , , , , , , ,

Posted in: Cryptography, Hardware Hacking, Privacy | Add a Comment

New MySpace and Facebook Worm Target Social Networks

Well another reason for you guys (and gals) to avoid social networks, a new worm is spreading. Again they are using the same ploys that have been leveraged for years on e-mail and instant messaging. Trust is gained as the message or link/video/etc comes from a known source so people are more likely to click/open/play […]

Tags: , , , , , , , , , ,

Posted in: Malware, Privacy, Web Hacking | Add a Comment

Popular Tags

computer-security · darknet · Database Hacking · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · XSS ·