Monthly Archives: June 2014
Cybercriminals create a network sniffing malware to reach bank customers
Online banking have made all systems connected and allowed users to easily purchase their product without any issue. while this is an advantage there are still some disadvantages for such solution with human vulnerabilities. In the last few years cyber
drozer- security and attack framework for Android
Android becomes a popular platform for developers and we see an increasing number of applications running on mobile devices that support this system. Technology have rapidly changed and security tools for making the assessment are also increasing. drozer is a
Compromised banner on Nico Nico Spreading Fake Flash Player
Popup and advertising banner is one of the way that cyber criminals use to promote their malwares. some of the similar incident were found in the past include popular website such as yahoo, New york Time where attacker managed to
‘Your files have been damaged’ Fake Email Lead to Canadian Pharmacy Stores
Several spoofed emails were spotted by Malwarebytes security researchers that are targeting cloud based system users. the first is a spam that notify victim that their image have been successfully uploaded to Box cloud servers but they are damaged. this
How Safe is the Incognito Mode in Google Chrome
Google Chrome can be called one of the most popular browsers used by people all across the world. The main reason for using Chrome is the ‘Incognito’ mode that allows private browsing to the users. Through this mode, the users
SpiderFoot Remote Footprinting and Reconnaissance Tool
Footprinting your target is one of the first steps you run during a penetration testing. This will help to identify system configuration and applications used. One of the tools that you can use is spiderfoot. spiderfoot is a python based open