-
Archives
- May 2018
- April 2018
- March 2018
- February 2018
- December 2017
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
-
Meta
Author Archives: webimprint
ROAMING MANTIS MALWARE EVOLVE TO PREYS ON PC, ANDROID AND IOS USERS
Recently, researchers unveiled a DNS hijacking campaign that was found to spread malware from banking Trojans to Android smartphone users mostly in Asia, which has now extended its reach to iOS and PC users. Mantis Roaming malware now targets IOS … Continue reading
Posted in Uncategorized
Leave a comment
IBM IMPROVES ITS SECURITY AND PROHIBITS THE USE OF USB DRIVES THROUGHOUT THE COMPANY
IBM recently banned all removable storage, throughout the company; this is a new policy that aims to avoid financial and reputational damage from a lost or misused USB drive. Shamla Naidoo, IBM’s chief information security officer, told staff in an internal email … Continue reading
Posted in Uncategorized
Leave a comment
TOOL TO PERFORM BRUTE FORCE ATTACKS ON SSH, SMTP, FACEBOOK AND INSTAGRAM- BRUT3K1T
As an introduction, brut3k1t is a bruteforce module on the server side that supports dictionary attacks for various protocols, information security experts say. Some of the current protocols that are complete and compatible are: ssh ftp smtp XMPP instagram Facebook There will … Continue reading
Posted in Uncategorized
Leave a comment
HOW TO MAKE A SUBDOMAIN TAKEOVER ATTACK
A team of information security experts tells us that sub-domain acquisition vulnerabilities happen whenever a subdomain points to a service (for example, GitHub pages, Heroku, etc.) that has been removed or removed. This may allow an attacker to configure a … Continue reading
Posted in Uncategorized
Leave a comment
HOW TO HACK ANY CAR WITH THIS TOOL
First we will see the topics that will be covered by the information security experts in this test / course of auto hacking: Configuration of virtual environments for tests, Sniffing CAN Traffic, Analyzing CAN Traffic, Inverse Engineering CAN IDs, Denial … Continue reading
Posted in Uncategorized
Leave a comment
HACK ANY WIRELESS NETWORK USING ALL IN ONE TOOL: HIJACKER
To begin with, the experts explain that Hijacker is a graphical user interface for the penetration test tools Aircrack-ng, Airodump-ng, MDK3 and Reaver. This application offers a simple and easy user interface to use the tools without writing commands in … Continue reading
Posted in Uncategorized
Leave a comment
TRUSTJACKING ATTACK ALLOWS HACKERS TO HACK IOS DEVICES
Symantec professionals have found a vulnerability that could allow hackers to compromise iOS devices without the owner’s knowledge. This iOS attack named as “Trustjacking” by information security researchers exploits a vulnerability in iTunes Wi-Fi Sync, a special feature that allows iOS devices … Continue reading
Posted in Uncategorized
Leave a comment
JSHIELDER AUTOMATED HARDENING SCRIPT FOR LINUX SERVERS
JSHielder is an Open Source tool developed to help SysAdmin and developers secure their Linux Servers in which they will be deploying any web application or services. According to information security experts this tool automates the process of installing all the necessary … Continue reading
Posted in Uncategorized
Leave a comment
VULNERABILITY IN OUTLOOK LET HACKERS TO STEAL PASSWORD HASHES
Most people rely on Outlook email address for work-related as well as personal tasks. Unfortunately, Outlook may not be as secure as we users would like to think. According to a report published by information security training experts at the Carnegie Mellon … Continue reading
Posted in Uncategorized
Leave a comment
NJRAT UPGRADED TO PUSH LIME RANSOMWARE AND A BITCOIN WALLET STEALER
The njRAT, also famed as Bladabindi, has been upgraded to push Lime Ransomware and a Bitcoin wallet stealer. According to a Zscaler blog post, this trojan was first spotted in 2013 and has remained one of the most prevalent malware … Continue reading
Posted in Uncategorized
Leave a comment