Posts Tagged ‘Security’

Twitter Takes on Security

Nearly every Twitter user out there– whether you’re an individual using it to connect with friends or a business trying to network with colleagues or market your company – has probably encountered some form of the prolific Twitter spam that has infiltrated followers, tweets, and direct messages every day. The website has been exposed time [...]

Share

tunCERT Raise the Cyber Threat Level

Following latest conditions that exist on the cyber space with expectation of new attacks and threats the Tunisian CERT raised the Alert indicator to the second level. Which mean that there is a moderate risk rating for all cyber users and they need to be more vigilant while using their system. A list of best [...]

Share

MBSA to Keep your Windows System up-to-date

Keeping your system updated is very important to avoid new malwares and to fix vulnerabilities that allow a malicious user have a full control on your system, well I used to enable the automatic update on all Microsoft based systems as we have monthly the patch Tuesday tradition. Now this seems to be not enough [...]

Share
password

Patator Password Brute Forcing Utility

Brute forcing passwords is a simple way to hack any system, if there is no vulnerability at the remote system hackers will try this attack to get users password, one of major brute force tools issue that you face is different protocols, so you need to have for each one a new utility which can [...]

Share

iScanner Utility for Cleaning Infected Websites

One of the major problems that we face on Internet is infected website, some website owner they are not aware that they are hosting viruses. Usually criminals inject malicious code on to innocent web pages by using Google search engine for locating vulnerable website, and they mainly focus on those parts of the website not [...]

Share

Evading Disk Investigation and Forensics

Encrypting files and data is a good way to assure their confidentiality, but this will not prevent a third party person from detecting the encrypted storage.  Researcher at University of Southern California and Computer Sciences from NUST in Pakistan discovered an interesting way to secure data based on steganography techniques. Presented technique allow a person [...]

Share

VoIP service and the security issues

Security concerns have always haunted the new-to phone users that have adopted internet phone as an alternate to landline phone. Like all other technologies running on internet prone to hacking, VoIP phone can also get hacked by a maliciously intended hacker who wants to eavesdrop or achieve other illegal purposes. Internet phone service is not [...]

Share