Monday, May 18th, 2009
A highly dangerous SSH flaw discovered a few months ago could still cause your organisation headaches, according to security experts.
The vulnerability was first made public when it emerged last November that researchers at Royal Holloway's Information Security Group had found the flaw, which could allow hackers access to sensntive data.
SSH, ...
Posted in Internet, Privacy, Security | No Comments
Tuesday, May 12th, 2009
Rapidly rising cyber crime and the growing prospect of the Internet being used as a medium for terrorist attacks pose a major challenge for IT security. Cryptography is central to this challenge, since it underpins privacy, confidentiality, and identity, which together provide the fabric for e-commerce and secure communications. Cryptography ...
Posted in Coding, Internet, Privacy, Security | No Comments
Monday, May 11th, 2009
Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux.
New features in 6.2:
The I/O pipeline now uses read-ahead buffering, which improves read performance especially on solid-state drives, typically by 30-50%. (Windows)
Improvements, bug fixes, and security enhancements:
The boot loader now supports motherboards with BIOSes that reserve large amounts ...
Posted in Internet, Linux, Privacy, Security, Software, Windows | No Comments
Monday, April 27th, 2009
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords ...
Posted in Internet, Networking, Privacy, Security, Software, Windows | No Comments
Thursday, February 26th, 2009
This tool provides a demonstration of the HTTPS stripping attacks that was presented at Black Hat DC 2009. It will transparently hijack HTTP traffic on a network, watch for HTTPS links and redirects, then map those links into either look-alike HTTP links or homograph-similar HTTPS links. It also supports modes ...
Posted in Coding, Internet, Privacy, Security | 1 Comment
Page 16 of 30« First«...10...1415161718...30...»Last »