Monthly Archives: June 2011

The #OpNewblood Super Secret Security Handbook By Anonymous

Anonymous movement have released a new online document  “OpNewBlood Super Secret Security Handbook” this online pdf file contains 8 section to help setup different operating systems for the hacking group, the table of content includes: Preface Setting up Tor Firefox

MS Warns of Malware Requires System Reinstall

Microsoft informed of a new kind of rootkit that hides in the boot sector MBR. This new malware makes any windows user have to reinstall the whole system to remove it. The new Trojan that Microsoft calls Popureb displays advertisements,

Keep an eye out for security threats with web filtering software

New technologies and upgrades are constantly being introduced to the Internet. As a result, the number of security threats has grown at an astonishing rate – which is why web filtering software has become such a necessity for businesses worldwide.

Blind SQL Injection in Joomla! com_virtuemart <= v1.1.7

One more time Joomla provide us a new vulnerability in one of thier component. This time the vulnerability exists in VirtueMart which is an Open Source E-Commerce solution that can be used together with a Joomla Content Management System (CMS).

YARA Adds Win32 Version

I have previously posted on Infosec Institute an article about Classifying Malware with ClamAV and YARA, the article is focused on using open source tools under Linux system to create descriptions of malware families based on textual or binary patterns

Improving Web Surfing with Acrylic DNS Proxy

Any web page nowadays contains images, frames and ads belonging to different domains which force our browsers to do a series of DNS queries before being able to render the page completely. Since every single query involves packets traveling on

New Book: Cyber Warfare

“Cyber Warfare” a new book by Jason Andress and Steve Winterfeld, this book is designed to cover the strategic, operational, and tactical aspects of today’s cyberspace conflicts. This is not a typical book about cyber warfare as it brings information