background preloader

Security

Facebook Twitter

10 Steps to Secure Software. This article is featured in the DZone Guide to Application Security.

10 Steps to Secure Software

Get your free copy for more insightful articles, industry statistics, and more. OWASP’s Top 10 Risk List is an important tool for security engineers and compliance analysts. It describes the 10 worst security problems that are found in web and mobile applications today. How to find if someone hacked your computer HD. The Best Hacking Tutorial Sites - Learn Legal Hacking. How to use Google for Hacking. Google serves almost 80 percent of all the search queries on the Internet, proving itself as the most popular search engine.

How to use Google for Hacking

However, Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post, you will find the information on how to use Google for exploiting security vulnerabilities that exists within many websites. 80+ Best Free Hacking Tutorials. Learning to become hacker is not as easy as learning to become a software developer.

I realized this when I started looking for learning resources for simple hacking people do. Even to start doing the simplest hack on own, a hacker requires to have in depth knowledge of multiple topics. Some people recommend minimum knowledge of few programming languages like C, Python, HTML with Unix operating system concepts and networking knowledge is required to start learning hacking techniques. Protecting Your Passwords and Creating Strong Passwords. Data Tethering: Managing the Echo.

Distopia

Computer Forensics Tools. Category: Anti-forensics tools - ForensicsWiki. Open source digital forensics. Top 15 Open Source. Free Security. Tools. 1.

Top 15 Open Source. Free Security. Tools.

Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.

How DuckDuckGo Rode A Wave Of Post-Snowden Anxiety To Massive Growth. When it first launched, DuckDuckGo seemed like it couldn't possibly be serious.

How DuckDuckGo Rode A Wave Of Post-Snowden Anxiety To Massive Growth

A tiny, Philadelphia-based search engine going up against Google? Indeed, its early growth was glacial, despite offering itself as a less invasive search engine that doesn't track your online behavior. ToolsWatch - The Hackers Arsenal Tools. HTML5 Security Cheatsheet. What Are the Security Risks of HTML5 Apps? The combinations of HTML5 and JavaScript has become a popular solution for developers to build apps and websites.

What Are the Security Risks of HTML5 Apps?

Over the past years this combination has delivered increasing speed and reliability. Although the W3C only approved HTML5 as a standard in October 2014, its adoption started many years ago. Presently, almost 30% of the Fortune 500 companies, which include tech giants like Google, Facebook, Netflix and Microsoft are using it. A Gartner report found that over 50% of the mobile apps are likely to be based on HTML5 by 2016. One reason for its popularity is HTML5 being largely cross-platform. 5 Steps to Uncovering Your IT Security Gaps. From local businesses to Google, IT breaches can happen to anyone.

5 Steps to Uncovering Your IT Security Gaps

According to IBM, there were 1.5 million monitored cyber attacks in the United States last year. Organizations are attacked an average of 16,856 times per year, and many of these attacks result in quantifiable data breaches. A moderate attack costs an average of $38,065 per minute of downtime. With organizations facing a growing number of threats by sophisticated hackers, IT security needs to be a priority. How To Add a Second Layer of Encryption to Dropbox [Updated] I started using BoxCryptor, which is mentioned in this thread.

How To Add a Second Layer of Encryption to Dropbox [Updated]

Free for up to 2Gb. Basically, it mounts an encrypted drive on your computer, and whatever you drop there gets encrypted and sent to another folder, which can be your Dropbox folder. Four Wireless Hack Secrets Revealed. You're using a wireless access point that has encryption so you're safe, right?

Four Wireless Hack Secrets Revealed

Wrong! Cyber Security and Information Systems Information Analysis Center. About Hackers & Hacks. The Most Dangerous Malware Trends for 2014. The common thread running through the malware trends we’ve seen in recent months is the evolution, maturation and diversification of the attacks and fraud schemes they facilitate.

The Most Dangerous Malware Trends for 2014

Malware, once purpose-built, is clearly becoming a flexible platform — in many respects, it is now almost a commodity. Take, for example, the leak of Carberp’s source code in 2013. Carberp joined Zeus as the latest prominent Man-in-the-Browser malware to become “open.” With access to this source code, cyber criminals can quickly implement a wide variety of attacks and fraud schemes aimed at specific targets.

Along with the more traditional and pure in-browser attacks, SMS-stealing attacks are becoming common, researcher evasion is quickly emerging as a malware trend and new approaches to account takeover and remote device control are being encountered more and more frequently. Surveillance Self-Defense. Top 10 Web hacking techniques of 2010 revealed. Network World - A Web hack that can endanger online banking transactions is ranked the No. 1 new Web hacking technique for 2010 in a top 10 list selected by a panel of experts and open voting.

Top 10 Web hacking techniques of 2010 revealed

Called the Padding Oracle Crypto Attack, the hack takes advantage of how Microsoft's Web framework ASP.NET protects AES encryption cookies. FROM THE SECURITY WORLD: Quirky moments at Black Hat DC 2011. Open Crypto Audit Project. Info Security. Cracking WPA/WPA2 Encryption. About a month ago, to my embarrassment, I learned that my Wi-Fi password was so weak that even my 10 year old neighbour could crack it… No, not really.

A little Disclaimer – The contents of this post are solely for ethical and educational purposes. You may not use it for unethical purposes. The Author or the Website is not responsible for any damage to yourself, your network, or the computers in you network, should something go wrong. Security Training. 80+ Best Free Hacking Tutorials. Five portable security apps you should carry on your USB drive. Security Testing. Security Testing. NNDB: Tracking the entire world. PacketFence: Open Source NAC (Network Access Control) DroidSheep. What is this about? If you know Firesheep or Faceniff, you probably know what this is about – OpenSource one-click session hijacking using your android smartphone or tablet computer.

If you do not know one of these tools, I’ll try to explain what DroidSheep is. Maybe you know Bob. Bob is a wellknown person and Bob loves coffee. Every morning, he takes his laptop and visits one the famous green coffee bars, has a “grande vanilla latte” and writes messages to his facebook friends. DroidSheep demonstrates how easy an attack like this can be – Just start DroidSheep, click the START button and wait until someone uses one of the supported websites. 12 Biggest Data Breaches of the Last 12 Months. How to conduct a security audit of your Google account.

February 18, 2014, 10:04 AM — Image credit: flickr/s2art. How to conduct a security audit of your Google account.