Phishing Fraud Cases Growing in the UK

Now this is a massive growth, 8000% percent..woah! Thankfully losses are still ‘modest’ whatever that means, I guess although the attacks grow in number, awareness an education also increases (in places like UK anyway) so the risk is fairly well mitigated. UK incidents of phishing scams have grown 8,000 per cent over the last two […]

Tags: , , , , , , , , , ,

Posted in: Phishing, Spammers & Scammers | Add a Comment

SIP Proxy – VoIP Security Testing Tool

SIP Proxy is an Open Source VoIP security test tool which has been developed by the students Philipp Haupt and Matthias Halimann during their diploma thesis and second student research project at the University of Applied Sciences Rapperswil. With SIP Proxy you will have the opportunity to eavesdrop and manipulate SIP traffic. Furthermore, predefined security […]

Tags: , , , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Logic Bomb Backfires on Hacker Employee

Ah the logic bomb, a source of humour for many due to it’s frequent showing up in ‘hacking’ movies, and it’s complete mis-use. ZOMG THE LOGIC BOMB IT’S GONNA PWN US ALL! A former UBS PaineWebber employee was sentenced to eight years in prison on Wednesday for planting a computer “logic bomb” on company networks […]

Tags: , , , , , , , ,

Posted in: Legal Issues, Malware | Add a Comment

Class President Hacks School Grades

Ah the old mythical tale of hacking your school to change your grades to straight A’s, well I know people do it, I’ve seen it in the past…but now someone has actually gotten caught for it. And what’s more..he’s the senior class president! Cooper City High School’s senior class president was arrested Tuesday and charged […]

Tags: , , , , ,

Posted in: General Hacking, Legal Issues | Add a Comment

Wep0ff – Wireless WEP Key Cracker Tool

Wep0ff is new tool to crack WEP-key without access to AP by mount fake access point attack against WEP-based wireless clients. It uses combination of fragmentation and evil twin attacks to generate traffic which can be used for KoreK-style WEP-key recovery. This tool can be used to mount fake access point attack against WEP-based wireless […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Wireless Hacking | Add a Comment

PHP Security Specialist (Stefan Esser) Resigns

This is sad news as PHP hasn’t particularly had a good security record in the past. He has voiced his frustrations with the internal workings of the PHP team and the development process, he has been working hard to make PHP inherently more secure…But from the look of things it seems like he was having […]

Tags: , , , , , ,

Posted in: Exploits/Vulnerabilities, General News, Web Hacking | Add a Comment

Data Recovery – A Decent Article

Data recovery is an important subject and it’s definitely a good thing to have a positive understanding of data recovery and how it could effort you personally or your business. So someone told me about this Data recovery article which is a decent original reference to data recovery which contains some good original information, links […]

Tags: , , , , ,

Posted in: Forensics, General Hacking | Add a Comment

WordPress 2.0.7 Follows Hot on the Tail of WordPress 2.0.6

Recently a bug in certain versions of PHP came to the attention of the WordPress developers, this bug could cause a security vulnerability in your any blogs running version 2.0.6 or below blog. It was fairly easy to work around, so they decided to release 2.0.7, just 10 days after the release of 2.0.6, to […]

Tags: , , , , ,

Posted in: Exploits/Vulnerabilities, Web Hacking | Add a Comment

Pentagon Hacker Gary McKinnon Appeals against US Extradition

It seems like it’s getting really serious in the Gary McKinnon case, he’s facing what looks like his last appeal against the US anti-terror law case against him for hacking some NASA systems by guessing the weak passwords. Not like he’s really a terrorist, or did any damage…he did something very stupid though, bruised the […]

Tags: , , , , , , , , , , ,

Posted in: General News, Legal Issues | Add a Comment

SPIKE Proxy – Application Level Security Assessment

SPIKE Proxy is part of the SPIKE Application Testing Suite, It functions as an HTTP and HTTPS proxy, and allows the web developer or web application auditor low level access to the entire web application interface, while also providing a bevy of automated tools and techniques for discovering common problems. These automated tools include: Automated […]

Tags: , , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Web Hacking | Add a Comment