Will 2015 Data Security Be Different Than 2014?

Depositphotos_46324909_s

The year 2014 will be remembered for sensitive security breaches with hacks against Sony Pictures and leaked photos of high-profile entertainers from Apple’s iCloud. These data breaches have caused many people to question online security and if it can be

BEST Practices for a Secure Android Phone

What does smartphone security even mean? It could mean that deleted data remains unrecoverable. If that is your definition of security, the Blackberry 10 phones might be a good choice. But perhaps security refers to the fact that no unauthorized

Google Play Store Host Application That Steal Users Account

Google Play is the source for installing application on Android smartphone devices. Malwarebytes security researchers uncovered over this week a malicious application that require  GET_ACCOUNTS permission which allow access to list of accounts. The application claims to be a wallpaper app

Cartero- E-Mail phishing framework

phishing tool

Cartero is a tool that you can use to create and send phishing emails with the command line interface, the framework include several modules and allow user to create their own module as well. the framework include the following features:

malwaRE- Malware repository framework

Malware exist with different behavior and many security research teams install distributed honeypots to detect new malwares. the honeypots will emulate vulnerable services that attract malwares and  they help to catch new binaries. if you are in the malware research

WiFiPhisher- Fast automated phishing attacks against WiFi networks

phishing

Usual scenario for compromising a system starts with a phishing attack. this allows to run a targeted attack against the user and it is always adapted to specific user. If you need to implement a phishing attack in wifi network

3 Ways to Protect Your Identity

protect your id

There are so many ways to protect your identity, but no protection is perfect. However, there are some essential steps you can take in order to minimize the risk of identity theft to a bare minimum. Here are some useful