Tag Archive | "Information-Security"


06 November 2009 | 14,229 views

Binging (BETA) – Footprinting & Discovery Tool (Google Hacking)

It’s been a while since I’ve seen a tool of this type, back in the heydays of Google Hacking (which became the generic term for information gathering via search engines) there were multiple tools such as Gooscan and Goolag. Binging is a simple tool to query Bing search engine. It will use your Bing API [...]

Continue Reading


22 June 2009 | 6,225 views

IT Managers Under-Estimate Impact Of Data Loss

I find it a little surprising in this day and age that such a low percentage of IT managers believe data loss is a low impact issue. Don’t they read the news? Don’t they understand how losing customer trust can really effect your bottom-line? I would have thought 30% of respondents thinking data loss was [...]

Continue Reading


29 October 2008 | 7,926 views

Google Hacking Back in The News – Google Takes Action

Google hacking was the big thing back in 2004, I actually did a talk on it in Hack in the Box 2004, it’s resurfaced again as a serious threat with Google noticing more queries relating to things like social security numbers. The Google Hacking Database has been active for years now and there are hundreds [...]

Continue Reading


29 May 2008 | 7,320 views

TJX Employee Fired for Trying to Fix Things

Ah TJX in the news again….after previously having the Largest Breach of Customer Data in U.S. History, now they are screwing people over that try to help them and their seemingly ridiculous information security policies. Hello blank passwords? Sounds crazy but I believe it happens, at more places than just TJX. It’s sad that someone [...]

Continue Reading


25 January 2008 | 18,818 views

argus – Auditing Network Activity – Performance & Status Monitoring

Another tool for the security side, good for forensics, monitoring and auditing. Argus is a fixed-model Real Time Flow Monitor designed to track and report on the status and performance of all network transactions seen in a data network traffic stream. Argus provides a common data format for reporting flow metrics such as connectivity, capacity, [...]

Continue Reading


09 January 2008 | 3,516 views

GFI Survey – 4 in 10 US Companies are NOT Secure!

GFI has recently conducted a survey concering corporate security in the US for small and medium sized enterprizes (SMEs). Despite the best efforts of many small and medium sized companies, a recent US survey shows that four in 10 companies believe that their networks are not secure. Thirty-two percent of the companies also reported that [...]

Continue Reading


05 November 2007 | 3,351 views

GFI End of Year Offer – Up to 50% Off

Just a quick note as I know many of you guys are in corporate security positions and might be looking for some of the solutions GFI offers. They are having a Q4 promotion with up to 50% off on some of their products/services. GFI MailEssentials – 25% GFI MailEssentials & GFI MailSecurity Suite – 25% [...]

Continue Reading


02 October 2007 | 20,812 views

Common Criteria Web Application Security Scoring (CCWAPSS) Released

The purpose of the scoring scale CCWAPSS is to share a common evaluation method for web application security assessments/pentests between security auditors and final customers. This scale does not aim at replacing other evaluation standards but suggests a simple way of evaluating the security level of a web application. CCWAPSS is focused on rating the [...]

Continue Reading


28 September 2007 | 6,431 views

TJX (T.J. Maxx and Marshall’s) Largest Breach of Customer Data in U.S. History

This case has been going on for a while but obviously hush hush, being that it is the largest breach of customer data in U.S. History. The details of the case have only started emerging in the last couple of months. Information Week published a good article covering what has been going on recently. Amazing [...]

Continue Reading


03 August 2007 | 6,481 views

Vista more secure than Mac OSX and Linux?

Judging by figures alone, Vista is more secure than Mac OSX and Linux? I somehow find this a rather strange claim, I guess these things are always subjective. Most numbers can be moulded into any shape you want, and can show any result you like. According to the numbers given in a new report from [...]

Continue Reading


Popular Tags

computer-security · darknet · exploits · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · Information-Security · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·