Monthly Archives: May 2014
Spoofed NatWest Email spreading Banking Trojan
New spoofed email message for NatWest Bank have been spotted by security researchers. the email contains a link that download a malicious file on Dropbox a free cloud file storage service. This shows another way how cybercriminal are using innovating
EBay Ask Users to Change Their password after a Security Breach
MITMER- MITM Testing Tool
Securing the traffic in your network is important to prevent MITM attack that can be used to sniff sensitive information on your network. Some users may require to open sensitive portals of the office to make their work remotely without
TNS Connection Profiler – Oracle Tool
TNS listener is a service that allows clients application to connect to oracle database. The service running on the database allows to log and control the connection and by default it uses port 1521/1526. Database administrator needs to restrict this
iRET – iOS Reverse Engineering Toolkit
iRET is an open source tool that you can use to analyze and evaluate iOS applications. The toolkit includes the following features: Binary Analysis where you can check the binary encryption , architecture of the application and if it has
FIFA World Cup 2014 used for spreading malwares
FIFA events generate a lot of attention for all types of activities including cyber crime. many people are now following the World Cup news in Brazil and searching where it is possible to watch the 2014 FIFA World Cup. TrendMicro
Volafox Mac OS X Memory Analysis Toolkit
Volafox is an open source toolkit that you can use for Mac OS X and BSD forensics. The tool is a python based and allows investigating security incidents and finding information for malwares and any malicious program on the system.