This week, economic and political movers and shakers are set to descend upon Davos, the Swiss ski resort that annually hosts what is arguably one of the most important international confabs in existence: the World Economic Forum. Unfortunately, virtual…
Tutorial On DNS Cache Poisoning (Redirect abc.com By Entering xyz.com In Address Bar)
Hello guys! Today I’m going to post about a hacking technique named “DNS Spoofing or DNS Cache Poisoning”. DNS cache poisoning is a computer hacking attack, whereby data is introduced into a Domain Name System (DNS) name server’s cache database, c…
Credit Card Details of 20 Million South Koreans Stolen
In a classic ‘insider’ breach, an employee of the Korea Credit Bureau (KCB) has been arrested for stealing and later selling the personal details of millions of South Koreans to phone marketing companies. The Financial Supervisory Service (FSS) has sai…
Kali Linux Amazon EC2 AMI
Kali Linux in the Amazon EC2 Marketplace
EDIT: For updated Kali Rolling images in the Amazon AWS, check this post.
After several weeks of “back and forth” with the Amazon EC2 team, Kali Linux has finally been approved into the Amazon EC2 ma…
Judge Rules That Google Can Be Sued By Brits In British Courts
In an important ruling, Mr Justice Tugendhat has cleared the way for the group of Brits known as Safari Users Against Google’s Secret Tracking to sue Google in the the British courts. Google had argued that the case should be heard in the US. Mr Justic…
Cisco Small Biz Wi-Fi Products Remotely Vulnerable
Popular Cisco Wi-Fi routers for small and medium-sized businesses are in the cross-hairs thanks to a vulnerability that could allow an unauthenticated, remote attacker to gain root-level access to an affected device – and from there intercept informati…
Trojan Minecraft App Version Uses Smalihook to Defeat Certificate Signing
A false version of the popular Android Minecraft PE app is being sold via Russian app stores for around half the price of the official app. Since third party app stores are not generally as thorough as Google’s Play Store at finding and removing bad ap…
US-CERT Warns of NTP Amplification Attack Surge
Network Time Protocol (NTP) amplification attacks, an emerging form of distributed denial-of-service (DDoS) that relies on the use of publicly accessible servers, is starting to make the rounds, US-CERT is warning.
Passing the Hash with Remote Desktop
Kali Linux contains a large number of very useful tools that are beneficial to information security professionals. One set of such tools belongs to the Pass-the-Hash toolkit, which includes favorites such as pth-winexe among others, already packaged in…
Stroz Friedberg Snaps Up Financial Investigations Firm
The recent acquisition of Tyrian Partners by Stroz Friedberg aims to strengthen international forensic accounting services offered by the multinational forensic investigations specialist.