Today we are pleased to announce the immediate availability of Kali Linux 1.0.5 with a rollup of various tool additions, fixes, and upgrades, including our fix for the encrypted encrypted LVM installation issue that we documented last week. As usual, u…
Samsung Bundles Anti-virus into Android KNOX
Samsung is looking to thicken the walls, as it were, in its Android KNOX security-hardened mobile devices, by bundling in enterprise anti-virus from Lookout Software.
Vaz Tells SOCA to Publish the Blue Chip Hacking List
Eighteen months after Operation Millipede closed with the successful prosecution of four rogue private investigators for illegally obtaining personal information, the UK’s Serious Organized Crime Agency (SOCA) finally delivered a list of almost one hun…
Citi Ordered to Pay $55K to Connecticut over 2011 Data Breach
The state of Connecticut has slapped Citi with a $55,000 settlement over a 2011 data breach that resulted in hackers gaining access to names, account numbers and e-mail addresses belonging to around 360,000 Citi North American credit card customers.
Syrian Electronic Army defaces US Marine Website
The Syrian Electronic Army’s latest exploit has been to hack and deface a US Marines recruitment website. The defacement showed a series of photos with military-dressed personnel, faces obscured, holding handwritten messages.
FinFisher Spyware Presentation Details Leaked
FinFisher is a trojan spyware kit developed and marketed by the UK/German company Gamma Group. It is used by many governments around the world for surveillance purposes – and was notoriously found to be targeting Bahraini activists.
A Q&A with MafiaBoy
MafiaBoy was the internet alias of Michael Demon Calce, a high school student from Quebec, who launched a series of highly publicized denial-of-service attacks in February 2000 against large commercial websites including Yahoo!, Amazon.com, Dell, Inc.,…
Kali Linux on Android using Linux Deploy
Kali Linux on any Android Phone or Tablet
Getting Kali Linux to run on ARM hardware has been a major goal for us since day one. So far, we’ve built native images for the Samsung Chromebook, Odroid U2, Raspberry Pi, RK3306, Galaxy Note 10.1,…
Infosecurity Weekly News Update: 26 August – 2 September 2013
Dan Raywood summarizes all of the top news headlines from the information security industry from the week commencing 26 August 2013.
Tor is Not as Safe as You May Think
A new research paper, due to be presented at the 20th ACM Computer and Communications Security Conference (CCS 2013) at Berlin in November, has demonstrated that over time Tor users can be discovered with a high degree of accuracy.