Tag Archives | Phishing




Phishing Frenzy – E-mail Phishing Framework

Phishing Frenzy is an Open Source Ruby on Rails e-mail phishing framework designed to help penetration testers manage multiple, complex phishing campaigns. The goal of the project is to streamline the phishing process while still providing clients the best realistic phishing campaign possible. This goal is obtainable through campaign management, template reuse, statistical generation, and […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Phishing, Social Engineering | Add a Comment

Gophish – Open-Source Phishing Framework

Gophish is a phishing framework that makes the simulation of real-world phishing attacks very straight forwards. The idea behind gophish is simple – make industry-grade phishing training available to everyone. There are various other similar tools available such as Simple Phishing Toolkit and sptoolkit Rebirth. I wonder if this is the beginning of an emergence […]

Tags: , , , , , , , ,

Posted in: Countermeasures, Phishing | Add a Comment

ICANN Hacked Including Root DNS Systems

So another hack has been exposed, this time on ICANN – which is pretty bad. They are the database of the Internet basically, including the root zone system which is the highest authority for DNS requests. “The Internet Corporation for Assigned Names and Numbers (ICANN) is a non-profit organization that is responsible for the coordination […]

Tags: , , , , , , , , ,

Posted in: Network Hacking, Phishing | Add a Comment

Hackers Break Into White House Military Network

It’s been a while, but hey I’m back! So here’s a news story that caught my eye today – it’s been a while since we’ve reported on a Spear Phishing attack, and guess what? Yes, last time it was also perpetrated by Chinese, but it was targeting Google’s Gmail. Targeted Phishing Attacks Carried Out On […]

Tags: , , , , , , , , , , , , , , ,

Posted in: General Hacking, Legal Issues, Phishing | Add a Comment

spt v0.6.0 – Simple Phishing Toolkit Available For Download

spt is a simple concept with powerful possibilities. It is what it’s name implies: a simple phishing toolkit. The basic idea the spt project had was “Wouldn’t it be cool if there were a simple, effective, easy to use and free (most importantly!) tool that information security professionals could use to evaluate and train what […]

Tags: , , , , , , , , ,

Posted in: Countermeasures, Phishing, Security Software | Add a Comment

Facebook Attachment Uploader Owned By A Space

Oh look – another vulnerability in Facebook! It wasn’t long ago we reported New Research Shows Facebook’s URL Scanner Is Vulnerable To Cloaking. Well this time the private messaging function has been compromised, you can attach an executable and send it to anyone as long as you put a space after the filename. It’s not […]

Tags: , , , , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Malware, Web Hacking | Add a Comment

Targeted Phishing Attacks Carried Out On Gmail – Likely From China

It was just about a week ago when we wrote about the technical flaw in Hotmail and the fact that the Hotmail Exploit Has Been Silently Stealing E-mail for some time. The latest news is some hackers have been targeting users of the Gmail service, specifically US government officials. This comes shortly after the news […]

Tags: , , , , , , , , , , , , , , ,

Posted in: Phishing | Add a Comment

China Facing Problems With Android Handsets & Pre-installed Trojans

It seems like the Chinese are always coming up with inventive ways to scam people, this time the people in their own country. Android is of course growing quickly globally and China is no exception with the availability of cheap hardware there the open-source Android OS is a natural choice. The latest scam is some […]

Tags: , , , , , , , , , , , , , , , ,

Posted in: Legal Issues, Malware, Privacy | Add a Comment

Tabnapping Attack On The Increase

This is an interesting new attack, I saw a live demo of it a while back here: Tabnabbing: A New Type of Phishing Attack. All you need to do is let the page load, then browse to another tab for 5 seconds or more and you’ll see the favicon change to Gmail and the page […]

Tags: , , , , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Phishing, Spammers & Scammers | Add a Comment

Australians Propose ‘No Anti-virus – No Internet Connection’ Policy

So after a year of research and debate, what did the Aussies come up with? A policy to disconnect people from the Internet if they get infected by a virus.. Rather naive isn’t it? Plus if your ISP cuts you off, how exactly are you supposed to resolve the problem without a connection to do […]

Tags: , , , , , , , , ,

Posted in: Legal Issues, Malware, Privacy | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·