Monthly Archives: May 2014

Spoofed NatWest Email spreading Banking Trojan

New spoofed email message for NatWest Bank have been spotted by security researchers. the email contains a link that download a malicious file on Dropbox a free cloud file storage service. This shows another way how cybercriminal are using innovating

EBay Ask Users to Change Their password after a Security Breach

Over this week all media are covering the security breach of eBay accounts, eBay issued a warning of a security incident that may lead to customer sensitive information leakage. eBay already issued a note to all 145 million users recommending

MITMER- MITM Testing Tool

Securing the traffic in your network is important to prevent MITM attack that can be used to sniff sensitive information on your network. Some users may require to open sensitive portals of the office to make their work remotely without

TNS Connection Profiler – Oracle Tool

TNS listener is a service that allows clients application to connect to oracle database. The service running on the database allows to log and control the connection and by default it uses port 1521/1526. Database administrator needs to restrict this

iRET – iOS Reverse Engineering Toolkit

iRET is an open source tool that you can use to analyze and evaluate iOS applications. The toolkit includes the following features: Binary Analysis where you can check the binary encryption , architecture of the application and if it has

FIFA World Cup 2014 used for spreading malwares

FIFA events generate a lot of attention for all types of activities including cyber crime. many people are now following the World Cup news in Brazil and searching where it is possible to watch the 2014 FIFA World Cup. TrendMicro

Volafox Mac OS X Memory Analysis Toolkit

Volafox is an open source toolkit that you can use for Mac OS X and BSD forensics. The tool is a python based and allows investigating security incidents and finding information for malwares and any malicious program on the system.