[ad] Seems like a social engineering type attack again relying on human ignorance and stupidity. Based around some kind of malware reporting back to a central repository. Remember kids if a deal is too good to be true…it isn’t. Hackers stole information from the U.S. Department of Transportation and several U.S. companies by seducing employees […]
Information-Security
The Soft Underbelly? – Database Security
[ad] It not surprising SQL Injection and database hacking are getting more frequent as people ramp up perimeter security more often than not they forget about interior security, software application security and most of all database security. Of the 2007 total corporate IT budget, respondents said they have allocated 34 percent for database infrastructure and […]
The Black & White Ball UK – Whitehat vs Blackhat
[ad] Black hat hackers vs White hat professionals – This is the Black & White Ball The Black & White Ball will be held at the stylish Ministry of Sound venue in London, the date is to be confirmed (but it will be in September). In security parlance, the terms Black Hat and White Hat […]
Massive Security Breach Leaks Credit Card Info
[ad] Recently a fairly huge credit card breach occurred involving a large retail company called TJX, with more than 2,000 retail stores. Some pretty well known brands there, I know I’ve used some of them…the sad part is they themselves still haven’t worked out the extent of the damage done to their information. For me […]
Wyd – Automated Password Profiling Tool
Wyd is a neat tool I found recently for Password Profiling. In current IT security environments, files and services are often password protected. In certain situation it is required to get access to files and/or data even when they are protected and the password is unknown. wyd.pl was born out of those two of situations: […]