Hot Topics
How Operation Onymous managed by law enforcement impacted Tor network -

What is changed after the law enforcement conducted the takedown of several illegal marketplaces as part of the. 

4 days ago | 0
Compliance is Not Supposed to be Security -

by Fahmida Y. Rashid on September 17, 2014 With all the high-profile data breaches at major retailers over the. 

7 days ago | 0
Microsoft Aorato – Big Data and Machine Language Security for Active Directory -

Microsoft is planning to significantly boost Active Directory’s security with machine learning and Big Data. 

7 days ago | 0

How Operation Onymous managed by law enforcement impacted Tor network

By Aamir Lakhani | On Mon, Nov 17th, 2014 - No Comments »
deepweb-300x167

What is changed after the law enforcement conducted the takedown of several illegal marketplaces as part of the Operation Onymous? The recent shutdown of several black market places in the Tor network, including the popular SilkRoad 2.0, has captured the attention of media of the extension of illegal activities in the part of the web so called Deep Web. The Operation Onymouscoordinated. 

Compliance is Not Supposed to be Security

By Aamir Lakhani | On Fri, Nov 14th, 2014 - No Comments »
Print

by Fahmida Y. Rashid on September 17, 2014 With all the high-profile data breaches at major retailers over the past few months, it’s really tempting to write off PCI DSS as being ineffective. It’s clearly not working, since the security standard clearly didn’t protect these companies from attack. Then again, perhaps we are looking at the standard all wrong. Businesses—and often auditors—measure. 

Microsoft Aorato – Big Data and Machine Language Security for Active Directory

By Aamir Lakhani | On Fri, Nov 14th, 2014 - No Comments »
Context-Aware Security

Microsoft is planning to significantly boost Active Directory’s security with machine learning and Big Data technology from a acquisition this morning. The security technology from Aorato will give Microsoft customers “a new level of protection against threats through better visibility into their identity infrastructure,” Takeshi Numoto, corporate vice president of Cloud and Enterprise. 

Darkhotel espionage campaign targets corporate executives traveling abroad

By Blog | On Tue, Nov 11th, 2014 - No Comments »
darkhotel

Kaspersky Lab researched the Darkhotel espionage campaign, which has lurked in the shadows for at least four years while stealing sensitive data from selected corporate executives traveling abroad. Darkhotel hits its targets while they are staying in luxury hotels. The crew never goes after the same target twice; they operate with surgical precision, obtaining all the valuable data they. 

UnZip the Power of Real Spying, NSA vs Spy Apps

By Blog | On Tue, Nov 11th, 2014 - No Comments »
Uzip the Power of Real Spying Cover Pic

When talking about the difference between NSA spying and spy apps, people tend to have some common questions. A common question a number of people have is that they wish to know which of the spying is better. While NSA spying is conducted by government organizations and is claimed to be for monitoring people and crime rates, it tends to breach normal people’s privacy which does not allow. 

Masque Attack: All Your iOS Apps Belong to Us

By Aamir Lakhani | On Mon, Nov 10th, 2014 - No Comments »
data_mobile_masque_attack_info

FireEye mobile security researchers have discovered and published a blog post that describes a new vulnerability on Apple iOS. Just one week after WireLurker was discovered publically, another vulnerability can be used to potentially install third-party applications on Apple devices. Masque Attack works by tricking users into installing applications on their Apple device outside of the iOS. 

Device Monitor Application by XLAB now available for Android as well

By Blog | On Mon, Nov 10th, 2014 - No Comments »
XLAB

XLAB, the partner of ACDC has recently released its Device Monitor Application which provides additional mobile network security by monitoring as well as reporting any malicious events which may occur on Android devices. The cyber threat pertaining to botnets has become of great concern due to the manner in which it is spreading and due to the intensity with which it is happening. It makes. 

Smuggler – An interactive 802.11 wireless shell without the need for authentication or association

By Blog | On Mon, Nov 10th, 2014 - No Comments »
25qtaj7

I’ve always been fascinated by wireless communications. The ability to launch seemingly invisible packets of information up into the air without even the need to consider aerodynamics itself seems like some kind of magic. In my quest to become a wireless wizard I started looking at the 802.11 wireless protocol to find out a little more about it. I had always noticed when looking at wireless. 

How I Reversed Engineered Google Docs To Play Back Any Document’s Keystrokes

By Blog | On Sun, Nov 9th, 2014 - No Comments »
googledocs

Written by James Somers     If you’ve ever typed anything into a Google Doc, you can now play it back as if it were a movie — like traveling through time to look over your own shoulder as you write. This is possible because every document written in Google Docs since about May 2010 has a revision history that tracks every change, by every user, with timestamps accurate to. 

From 0-Day to Exploit – Buffer Overflow in Belkin N750 (CVE-2014-1635)

By Blog | On Sat, Nov 8th, 2014 - No Comments »
61UpjlCzl3L._SL1000_

Vulnerability Summary A vulnerability in the guest network web interface of the Belkin N750 DB Wi-Fi Dual-Band N+ Gigabit Router with firmware F9K1103_WW_1.10.16m, allows an unauthenticated remote attacker to gain root access to the operating system of the affected device. The guest network functionality is default functionality and is delivered over an unprotected wifi network. Successful.