Buffer Overflow Attack Tutorial - Backtrack 5 StumbleUpon Diigo Delicious
.:: Phrack Magazine ::.
BlackHole Exploit Kit 2.0 released with more latest Exploits | THN Security and Hacking News According to release announcement on Pastebin by unknown developers in a Russian-language BlackHole Exploit Kit 2.0 released with more latest Exploits.
Blackhole exploit kit The supposedly Russian creators use the names "HodLuM" and "Paunch".
This is a new format of blog post I’m trying out. Five Things To Know About DHCP Snooping
Online security must be a priority for retailers - ICO news release
I came across this gem on the Visa website: What’s a Trojan Horse virus?
Public wifi hotspots and restricted internet access How to bypass strict firewalls on public wifi hotspots and restricted networks, by tunneling blocked ports and protocols - verot.net
Yes, You can build a GSM basestation using an USRP and the OpenBTS. sniffer - Mobile numbers capture and transmit data - IT Security
Learn from my mistakes as I figure out how to gather forensics data on an ext4 filesystem. Hack and / - Forensics with Ext4
Social Engineering In Penetration Testing Registration « Social-Engineer.Com – Professional Social Engineering Training and Services Thank you for your interest in registering for one of the upcoming Social Engineering In Penetration Testing 5-day courses.
Bitcoin mining is so last year. Hack and / - Password Cracking with GPUs, Part I: the Setup
Security Assessment - Home Security-Assessment.com is a purist security company, with a strong focus on research and development.
Update (19 March 2013): This blog post advises to use RC4 to migitate the BEAST attack, but RC4 has recently been discovered to be weaker than previously known. At this point the attacks against RC4 are still not practical. The only fully safe choice at the moment is the AES-GCM suites supported only in TLS 1.2. Mitigating the BEAST attack on TLS | Qualys Security Labs | Qualys Community