Monthly Archives: April 2014

APKinspector- Tool to Analyze Android applications

APKinspector is another open source project that comes to reverse and analyze Android applications. project owners have created a graphical interface to allow visualizing the structure of the application modules this will make security analysts select the good Android application

Heartbleed used for Spam message

Heartbleed vulnerability is one of the latest hot topics that are constantly updated on the infosec media. TrendMicro is alerting about a spam message that is using heartbled with a suspicious link claiming to be a CNN report related to the

Bypassing Lockscreen Vulnerability on Ubuntu 14.04 Patched

On the 16th of April a vulnerability report has been issued for Ubuntu operating system that allow user to bypass lock screen interface password protection. The system can be accessed without authorization, payload or any code while all what you

Scam Facebook Chat Verification Hijacking users account

Security researchers from Trend Micro are alerting of a new spam messages that are spoofing official Facebook Chat Team notification. The spam message is a fake Facebook Chat verification that asks user to verify and approve their accounts otherwise the

WPScan WordPress Vulnerability Scanner

New version of the wordpress security assessment tool – WPScan, the tool already included in many popular pentest distributions such as BackBox Linux, Kali Linux ,Pentoo and SamuraiWTF. The new release is 2.4 include new fingerprints for WP 3.8.3 &

DSploit Android Toolkit for Security Testing

dSploit is a very comfortable tool that you can install on Android to run a pentest or network security assessment. The toolkit allows fingerprinting the remote operating systems and identifying different hosts, scans the network for system vulnerabilities and performing

End User Considerations For OpenSSL Vulnerabilities

OpenSSL vulnerabilities could enable a remote hacker to gain access to sensitive data, including secret keys and authentication credentials, via incorrect memory handling. Some of these vulnerabilities could also cause potential leak of non-encrypted information and DTLS (Datagram Transport Layer