Monthly Archives: August 2013

jsql-injection – Java based Automatic SQL Injection Tool

Today about all programing languages support the working with databses, This makes in penetration test you will need to have several tool to pentest targeted platform. If you want to pentest Java based platform you can consider jSQL. jSQL Injection

Twitter Hacked Accounts Posting links to Android Opfake Trojan

Symantec are tracking a new malicious link that is posted on compromised Twitter accounts. The posted links are redirecting victims to a website that are hosting malicious applications. By visiting the malicious website victims start to download a fake Asphalt

Google Code repository Hosting Trojans

New malware have been discovered by Trendmicro that is hosted on Google Code website. This is a very popular web resource that aims to host open source projects developed by the community. The malware is a java Trojan that downloads

API Monitor 2 – Hook API Calls

Monitoring API calls on operating system is important to verify what the application is changing on the system. API monitor is a program that can be used to monitor and display API-calls made by various applications and services. It is

RFS: Request For Security!

Rick Lawhorn, CISA, CISSP, CHP, CHSS As the industry prepares for increased regulations and compliance requirements from state and federal governments, businesses are taking a harder look at endpoint security. This emerging trend is starting to require businesses to re-evaluate

Cars may need Anti-Malware protection as well…

The Center for Automotive Embedded Systems Security (CAESS) conducted a study showing what could happen if a determined hacker went after the computer systems embedded in cars  (http://www.autosec.org/pubs/cars-usenixsec2011.pdf). The researchers found that, among other things, an attacker could disable the