Tag Archives | Security




Darknet Moving Servers & Upgrades Etc

So way back, this was the site 10 years ago when it launched in 2006 – not ALL that much different from today to be honest. The current theme you see here has been in use since April 2010, so almost 6 years as of February 2016 – and it’s come time to change. Which […]

Tags: , , , , , ,

Posted in: Site News | Add a Comment

Sony PlayStation Network Hack Resulted In Stolen User Data & Lawsuit

So after our report on Monday – Sony Rebuilding PlayStation Network (PSN) – Down 4 Days So Far – news had been spilling out about this whole thing pretty much non-stop. It appears the network is still down and there was some serious data loss including user data for millions of users being stolen. All […]

Tags: , , , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Legal Issues, Privacy | Add a Comment

Sony Rebuilding PlayStation Network (PSN) – Down 4 Days So Far

There’s been a few big stories in the past few days, one is of course the whole iPhone geo-location data tracking thing – but everyone was too busy checking into Foursquare to complain about that. The other is that the Sony PlayStation Network (PSN) basically got hacked, owned and raped. It’s still currently down and […]

Tags: , , , , , , , , , , , , ,

Posted in: General News | Add a Comment

Samhain v.2.5.9c – Open Source Host-Based Intrusion Detection System (HIDS)

We’ve only mentioned one HIDS before, that was OSSEC HIDS, so I thought I’d do some updates on the others. Samhain has always been one of my favourites, before that of course I was using Tripwire like everyone else. The Samhain open source host-based intrusion detection system (HIDS) provides file integrity checking and logfile monitoring/analysis, […]

Tags: , , , , , , , , , ,

Posted in: Countermeasures, Security Software | Add a Comment

MI6 Sells Digital Camera on Ebay Containing Terrorist Images

Another classic data leakage….and once again it happened on Ebay! This time it’s a British agency known as MI6 (Secret Intelligence Service) demonstrating a distinct lack of intelligence. How on earth does something like even happen? Even smaller agencies and companies I’ve worked with have rigorous data destruction policies when old equipment is recycled or […]

Tags: , , , , , , ,

Posted in: Legal Issues, Privacy | Add a Comment

fwknop – Port Knocking Tool with Single Packet Authorization

Port Knocking came about in around 2003, but it has various weaknesses. There are plenty of implentations though (some quite advanced). Most of the problems are fixed however by fwknop! fwknop stands for the “FireWall KNock OPerator”, and implements an authorization scheme called Single Packet Authorization (SPA). This method of authorization is based around a […]

Tags: , , , , , , , , , ,

Posted in: Countermeasures, Network Hacking, Security Software | Add a Comment

International Space Station Infected by Virus!

Now you think they’d know better than having Autorun enabled in the International Space Station? But no, they obviously didn’t and they got owned by some fairly innocuous thumb drive auto-spreader. It wouldn’t really be news if anyone else got infected, but come on this is supposed to the pinnacle of security or something? NASA […]

Tags: , , , , , ,

Posted in: Malware | Add a Comment

Password Hasher Firefox Extension

Well seen as though we were talking about breaking passwords, here’s a tool for Firefox to help you manage your more secure passwords. Better security without bursting your brain Password Hasher is a Firefox security extension for generating site-specific strong passwords from one (or a few) master key(s). What good security practice demands: Strong passwords […]

Tags: , , , , , , , , ,

Posted in: Countermeasures, Security Software | Add a Comment

GFI Survey – 4 in 10 US Companies are NOT Secure!

GFI has recently conducted a survey concering corporate security in the US for small and medium sized enterprizes (SMEs). Despite the best efforts of many small and medium sized companies, a recent US survey shows that four in 10 companies believe that their networks are not secure. Thirty-two percent of the companies also reported that […]

Tags: , , , , ,

Posted in: Advertorial, General News | Add a Comment

Apple Fixes ‘Misleading’ Leopard Firewall Settings

Apple has admitted that is has at LEAST three serious design weaknesses in it’s new application based firewall being rolled out with Mac OS X ‘Leopard’. It comes (somewhat oddly) only 24 hours after a Mac OS X security update that fixed 41 OS X and Safari security vulnerabilities. Previously independent researchers proved that Apple’s […]

Tags: , , , , , , , , , , , , ,

Posted in: Apple, General Hacking | Add a Comment

Popular Tags

computer-security · darknet · Database Hacking · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · XSS ·