Blog

Cybercrime costs companies an average of $214,000 per attack

Successful cybercrime attacks cost businesses an average of $214,000 per incident, according to a survey conducted by the Ponemon Institute on behalf of Check Point Software Technology. The survey of 2,618 C-level executives and IT security administrators in the US, UK, Germany, Hong Kong, and Brazil revealed that 65% of respondents who experienced targeted attacks […]

Cybercrime costs companies an average of $214,000 per attack Read More »

t’s It’s Not Paranoia if Your Phone is Really Watching You

Malware exists that lets Bad Guys hijack webcams and microphones. The U.S. government can’t even do that yet, at least not legally, but it is working on it. Remember: It’s not paranoia if they’re actually after you. James Jesus Angleton, former chief of the CIA’s counterintelligence staff, and science-fiction writer Philip K. Dick might at first seem

t’s It’s Not Paranoia if Your Phone is Really Watching You Read More »

iPhones On Almost 50 Carriers Are Vulnerable To Hackers Read more: http://www.itproportal.com/2012/05/24/iphones-almost-50-carriers-are-vulnerable-hackers/#ixzz1vrCSUzAq

Written by Radu Tyrsina Experts warn about security holes that might give unwanted access to your iPhone Security experts have warned that smartphones running on AT&T and at least 47 other carriers are vulnerable to hijacking. iPhones and Android devices are particular targets for malicious hackers, who can intercept information and phone calls as well

iPhones On Almost 50 Carriers Are Vulnerable To Hackers Read more: http://www.itproportal.com/2012/05/24/iphones-almost-50-carriers-are-vulnerable-hackers/#ixzz1vrCSUzAq Read More »

New ways to track you via your mobile devices: Big Brother or good business?

A new technology called IPS can track your every move — or help you find a departure gate at the airport. Should we fear it or embrace it? By Christina DesMarais | PC World Privacy fans, take note: A new technology, called Indoor Positioning System, could push your worry meter to the max. IPS allows pinpoint tracking

New ways to track you via your mobile devices: Big Brother or good business? Read More »

Flaw Found in Common Network Security Technology

  Network firewall “middlebox” technology could unwittingly help hackers hijack an Internet connection. Middleboxes monitor the “sequence numbers” of data packets being sent to mobile devices. Middleboxes could help hackers use the process of elimination to home in on a number in the right range, then gain access to passwords.  A popular technology used to

Flaw Found in Common Network Security Technology Read More »

Burp Suite 1: Introduction

Burp Suite is an integrated platform for attacking web applications. It contains all of the Burp tools with numerous interfaces between them designed to facilitate and speed up the process of attacking an application. All tools share the same robust framework for handling HTTP requests, persistence, authentication, upstream proxies, logging, alerting and extensibility. Burp Suite

Burp Suite 1: Introduction Read More »

Gmail Password Retrieval Vulnerability May Lead to Mass Hacking Attempts

By Sanjeev Ramachandran If you think Google always tops in securing your data and personal information on web, that need not be always true. Now web security analysts feel that the password recovery options given in Gmail can be an easy way for hackers to get access to hundreds of Gmail accounts. Presently, one of the

Gmail Password Retrieval Vulnerability May Lead to Mass Hacking Attempts Read More »

Uncover your Google search records with Google Takeout

This little known tool, which turns one this June, lets you download a copy of your Google presence.By: Chris Null If you listen to the growing chorus of online chatter about the company, Google’s now-infamous “Don’t be evil” slogan is becoming increasingly inaccurate by the day. The company’s most recent move–a sweeping change that consolidated

Uncover your Google search records with Google Takeout Read More »