Monthly Archives: November 2013

Process Hacker 2.32 – Utility to manage Windows process and services

Process hacker is one of the leading tool for manipulating processes and services, this is important for monitoring the changes when you are investigating a malicious code. you will need this tool in your sandbox to identify any new process

Linkedin Klepto – Social Engineering Tool for LinkedIn

During a penetration testing it is important to conduct a company profiling, search online for information available on social networks like Facebook, Twitter, Google+, and LinkedIn that will help to find the system used by the company. On internet there

AutoCAD Malware Open Security Gaps on Infected Systems

Security researchers at TrendMicro alerting AutoCAD users about new malware that takes .FAS form and open victim computers to attack. The malware is known as ACM_SHENZ.A and creates administrator privilege account that allows attacker to have a full control on

EncryptOnClick – Encrypt and protect your sensitive files

We store and share a lot of information and data that may contain sensitive content, using a solid encryption tool is very important to protect all your activity. EncryptOnClick  is a free application that allows to quickly encrypt files with

Voice E-mail Spam Leads to Blackhole and Zbot Malware

Security researchers at TrendMicro reported a new spamming campaign that is spreading the Blackhole Exploit Kit. The emails are attaching a zipped file that contains a downloader to install Zbot and take control of victim machines. Cyber criminal are combining

Moms: Protect Yourselves on Cyber Monday

Shopping with your kids on a normal day is a hassle. That hassle becomes a lot worse on Black Friday, when there’s a risk of losing your kids in the crowd, or worse, having them kidnapped, as Forbes cautions. Luckily

Adobe SWF Investigator – Tool to Debug SWF Applications

Flash programs are widely used on web applications some time they allow web developers to add special animation on the web page or adding banners. Cybercriminals may use the flash to obfuscate malicious files and host on the web malwares.