Monthly Archives: September 2014

Scammers promise to pay you back as soon as they get home

Skype and any instant messaging system is trusted by user, this makes any account hacked can be used by attacker to make scams and have some income. New case have been posted on Kaspersky blog where attacker compromised one contact

MITMf – Framework for Man-In-The-Middle attacks

MITMF is another framework that can be used for man-in-the-middle attack. the tool is python based and have several plugins that adds more functionality during a penetration test. some of useful plugins are: jskeylogger – this plugin injects a javascript

Shellshock DHCP client exploitation

Over this week the infosec community are busy in testing the bash shellshock vulnerability. Geoff Walton a senior security consultant for TrustedSec have posted the way to exploit the bash bug in the DHCP protocol. the DHCP is widely used in most

Smartphone Security: Android vs. iOS

When first powering up a new notebook or desktop computer, the first thing a security-savvy person does is make sure security is set up and working. Those who would steal information, use your computer as a launching pad for malicious

Twitch Chat Spreading Eskimo Malware

Online gaming are becoming popular website that can be used by attackers to promote malicious software. New case have been reported by F-secure in Twitch.tv that have more then 50 million visitors. The attack starts by adding an advertisement banner

CAPLOADER- Tool to handle large amounts of network traffic

PCAP files are important during investigation of a network based incidents, this to find out and resolve any network issue such as a malicious scan or a DoS attack against your services. CAPLOADER is a tool that will help in

Facebook accounts hijacked by malicious Chrome Extension

Google chrome extensions continue to be among the topics covered by TrenMicro, Another malicious application have been reported over this week that is targeting facebook users. cybercriminals are using the social network to share a malicious link claim to be