Proactive detection of security incidents II – Honeypots , ENISA
An increasing number of complex attacks demand improved early warning detection capabilities for CERTs. By having threat intelligence collected without any impact on production infrastructure, CERTs can better defend their constituencies assets.Honeypots are powerful tools that can be used to achieve this goal.
Analysis of Malware Samples
In this tutorial we’ll present the Python API that Immunity Debugger uses for writing the plugins. Ollydbg has its own language for plugin development, while Immunity Debugger uses well known Python programming language, which makes the plugin development much easier than with Ollydbg.
Top 10 Hacker Movies of All Time
Arriving to the weekend you can have time to watch some old hacker’s movies. Here you can find a Top 10 list that includes top hacker/gamer/cyberpunk movies of all time.
Anonymous Hacks Greek Finance Ministry, Finds “123456″ Is Password For 37% Of All User Accounts
Computer hacking group Anonymous launched a cyber attack on Greek Finance Ministry, 37% of 136 username accounts Anonymous hacked are using weak password such as “123456”.
Support Scams and the Surveillance Society
Here’s a slightly different approach to PC ‘support’ scamming, flagged by an anonymous reader of one of my blogs on the CLSID gambit the scammers often make use of to con you into thinking they really know something about your PC, and can therefore (for a fee) help you with a system problem that they claim you have – some sort of malware problem, mostly.