Severe Security Hole in Apple Mac Safari Web Browser

As the German IT portal heise online conveys, a new security hole in the Safari webbrowser for Apple’s Mac OS X has been discovered. This security hole is rather severe, as it invokes the execution of shell scripts under certain circumstances. Once again the Safari option “open safe” files automatically after download bears the blame. […]

Tags: , , , , ,

Posted in: Apple, Web Hacking | Add a Comment

Google’s Defense of Privacy – Tells Feds to BACK OFF

Google has offered multiple reasons why it shouldn’t have to comply with a Justice Department subpoena. One is privacy. An excerpt: If Google is forced to compromise its privacy principles and produce to the Government on such a flimsy request, its search query and URL data, Google will, without a doubt, suffer a loss of […]

Tags: , , , , ,

Posted in: General News, Privacy | Add a Comment

Spanish ‘Super’ Hacker Jailed for 2 Years over DoS attack

A Spanish hacker who launched a denial of service attack that hobbled the net connections of an estimated three million users has been jailed for two years and fined 1.4m. Santiago Garrido, 26, (AKA Ronnie and Mike25) launched the attack using a computer worm in retaliation for been banned from the popular “Hispano” IRC chat […]

Tags: , , , , , , ,

Posted in: General Hacking | Add a Comment
NSA Nmap

NSA Tracking Nmap and Other Open Source Tools

Check it out! US President George W. Bush visited the NSA headquarters at Fort Meade in January 2006. A wall-sized status screen in the background displays the latest versions of Nmap and some of our other favorite open source tools. Pictures were printed in the February 6, 2006 edition of Newsweek (article) and the Jan […]

Tags: , , , ,

Posted in: General News, Hacking Tools | Add a Comment

Locate anyone in the UK via SMS

By using one of the many mobile phone location tracking services aimed at businesses or concerned parents, and some trickery it is possibly to get almost anyone’s mobile phone position without their agreement. All that is required is their mobile phone number, and carrier. Over the past year a number sites have popped up offering […]

Tags: , , , , , , , , , , ,

Posted in: Telecomms Hacking | Add a Comment
BackTrack

BackTrack – A merger between WHAX and Auditor

BackTrack is the result of the merging of two Innovative Penetration Testing live Linux distributions namely Whax and Auditor. Combining the best features from both distributions, and paying special attention to small details, this is probably the best version of either distributions to ever come out. Based on SLAX (Slackware), BackTrack provides user modularity. This […]

Tags: , , , , , , , ,

Posted in: General Hacking, Hacking Tools, Security Software | Add a Comment

Dumbest Thief Ever Busted by E-mail Habit

Sheriff Brian Rahn said the man made coffee, cooked and ate meals, took showers, picked out a change of clothes, watched television and checked his e-mail during the burglaries. He left behind valuables, including jewelry, firearms and electronic equipment, Rahn said. He also allegedly stole a car in the town of Wayne in the last […]

Tags: , , , ,

Posted in: General News | Add a Comment

Nmap 4.01 Released – New Features

Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Security Software | Add a Comment

Google Desktop Privacy? OR Lack Of..

With the advent of Web 2.0 and more powerful, user friendly web applications, security and privacy concerns have increased. Moreso with the new version of Google Desktop coming out, although this is not strictly a web application, they will be storing your data online. Yes, version 3 adds the ability to “access your documents from […]

Tags: , , , , ,

Posted in: General News, Windows Hacking | Add a Comment