Monthly Archives: April 2015
iOS Vulnerability Leads to Endless Reboots
Over this week and on the RSA conference security researchers from Skycure company discovered a new iOS vulnerability, this bug have been accidentally found during a network penetration testing. The security team have installed a router and connected the smartphone
EaseUS Partition Master- Application to Manage Partition Tasks
Are you in need of a reliable partition manager? Do you know that there’s a free partition manager that can convert mbr to gpt without data loss? Now you can with EaseUS Partition Master 10.5 ( Application to create Partition
RDPY- tool to perform MITM attack on RDP Sessions
Remote Desktop Protocol is used on almost any network, This allow user to manage windows servers remotely and to have server desktop full control. Some user feel more comfortable with it to schedule tasks or install applications. Others prefer to
Critical Microsoft HTTP.sys Remote Code Execution Vulnerability
Microsoft have released over this week several security patches that comes to fix critical security vulnerabilities. One of these vulnerabilities is an HTTP.sys security issue that do not properly handle HTTP-requests and may lead to DoS or remote code execution.
Net-creds Tool to sniff sensitive data from interface or pcap
Net-Creds is a python script that you can use during penetration testing to find sensitive information in network traffic or pcap files. information may include passwords or hash. this regardless on the service or ports used by the application. The
Kjw0rm Hacked French TV5Monde Television
French TV5Monde television network have been under a massive cyber attack with a big damage to their network and facilities. Kjw0rm Variant is a worm that have been used to compromise the TV website, social media accounts and company emails.
Is complying with local Data Protection Laws for small and medium sized businesses a “Mission impossible”?
All indications show that for the majority of small and medium sized companies (SMEs), issues that have to do with data protection, information leaks and compliance of data security laws, are almost a “Mission impossible”. According to a study by