Well this case has taken a while but the FTC won in the end and reached a settlement two years after halting the company from selling it’s “100 per cent undetectable” commercial keylogging application. It’s interesting to see court cases that venture into the grey area of ethics, I think the main problem stemmed from […]
Archives for 2010
sectool – Security Audit Tool & IDS
sectool is a security tool that can be used both as a security audit as well as a part of an intrusion detection system. It consists of set of tests, library and textual/graphical frontend. Tests are sorted into groups and security levels. Administrators can run selected tests, groups or whole security levels. Security Levels Naive […]
iPhone Security Flaw – Using a PIN Won’t Protect Your Data
[ad] Now it wasn’t long ago when the first malicious iPhone worm appeared in the wild and well generally since the boom of the device people have looking at the security measures. Huge sales are made to corporates touting the security, privacy and encryption features of the iPhone OS. The latest discovery is that using […]
Bruter v1.0 Final Released – Parallel Network Login Brute Forcing Tool
[ad] We wrote about Bruter v1.0 ALPHA version back in 2008, recently they announced the release of v1.0 Final! Bruter is a parallel network login brute-forcer on Win32. This tool is intended to demonstrate the importance of choosing strong passwords. The goal of Bruter is to support a variety of services that allow remote authentication. […]
IBM Distributes Malware Laden USB Drives at AusCERT Security Conference
[ad] Another case of ‘accidental’ malware distribution, remember a while back when Vodafone Spain was Distributing Mariposa Malware, the latest is that IBM handed out malware laden USB drives at a security conference of all places. Well on the up-side at least everyone there would be security savvy so damage should be minimal. If it […]