Monthly Archives: January 2012
Activity Monitor: Strong Tool to Tracks Users Activity
Tracking and monitoring network and computer activity is very important from the security prospective, Today we can find many tools that help to perform these tasks including Activity monitor, Activity monitor is one of these programs that helps to do
Windows 8 The Art of Bootkit
At MalCon security conference in Mumbai, Peter Kleissner demonstrated how to install bootkit on the next Microsoft operating system Windows 8. The exploit can bypass the new security measures implemented on Windows 8 to load directly in the memory to
Infosec Weekly Radar, January 23 -29 , 2012
Anonymous Attacks Irish Government Websites While we have been following #opmegaupload this week Anonymous group launched a parallel DDoS attack targeting Ireland facilities, here Brian Honan released a blog post about the attack and some very important proactive measures to
Twitter Takes on Security
Nearly every Twitter user out there– whether you’re an individual using it to connect with friends or a business trying to network with colleagues or market your company – has probably encountered some form of the prolific Twitter spam that
Several Zero-Days on Latest WordPress CMS
WordPress CMS is now open to several vulnerabilities that allow an attacker to conduct SQL injection and run a malicious javascript on visitor’s machine over a cross site scripting bug. Actually the bug exist during the installation process so in