Monthly Archives: July 2011

Cross Site Scripting Vulnerabilities in Elgg <= 1.7.9

New vulnerability has been discovered in Elgg an open-source application that helps to create social networking engine, delivering the building blocks that enable businesses, schools, universities and associations to create their own fully-featured social networks and applications. Well-known Organizations with

Hacking Military Chips Encryption By Side-Channel Attacks

New demonstration have been made by German researchers that allow attacking Chips encryption mechanism, Field Programmable Gate Array (FPGA) processors used in embedded systems at military and aerospace industries, are vulnerable to attacks based on an analysis of the energy

Wireshark 1.6.1 Malformed IKE Packet DoS

New vulnerability have been discovered in Wireshark 1.6.1 that affects IKEv1 protocol function proto_tree_add_item() this bug allow to conduct a denial of service attack. This is not the first vulnerability that has been discovered lately in wireshark as in the

Metasploit Pro 4.0 New Release

New version of Metasploit professional edition has been released by Rapid7, Metasploit is a complete solution for penetration testing that gives pentester a complete visibility on different threat with over 10 vulnerability scanners. Metasploit Pro 4.0 helps you improve your

CloseTheDoor- Detect Network Security Holes

Remote backdoors is ways that are used by hackers to maintain access on the compromised systems.  Types of remote backdoors generally fall into three categories: Network Socket Listener, Trojan, or covert channels. Here there is an opensource tool that is

‘ika-tako’ Virus Creator Gets Jail Sentence

The Tokyo District Court on Wednesday has sentenced malware editor with two years and six months in prison. Masato Nakatsuiji was found responsible for writing a malicious program, which last summer has spread to the locally popular peer to peer

OSForensics – Digital investigations faster

Every organization is faced by cyber-crime this makes it not surprising that utilities for investigating incidents are rapidly developing. These tools are focused on reviewing temporary file browser that can tell a lot about user activity, search hard disk for