Quantcast
Channel: IT Info Magazine
Browsing latest articles
Browse All 36 View Live

Amazon EC2 Concepts

Whether you’re an existing customer of Amazon’s cloud computing platform or contemplating of becoming one, I suggest that you get acquainted with Amazon’s EC2 concepts and set of services. All major...

View Article



Are website stress testing services equivalent to DDoS attacks?

I don’t think so, however, many argue that a website which accepts payment to place a target website under stress while the service uses weaknesses of third-party assets such as, DNS reflection attacks...

View Article

Privacy concerns on IP addresses

Every user on the Internet is assigned an IP address by the Internet service provider he or she is subscribed to and this is essentially needed to access the Internet itself. An IP address is a...

View Article

QR Code based authentication system

A cryptographic login system based on mobile phones QR Codes eliminates the use of passwords. This authentication system is called Rublon, and uses 2048-bit RSA keys and the AES 256-bit encryption...

View Article

Anonymizing IP addresses

Crypto-PAn is a cryptography-based sanitization tool for network trace owners to anonymize the IP addresses in their traces in a prefix-preserving manner. Crypto-PAn has the following properties:...

View Article


Reacting Faster and Better – The Holy Grail of Cyber Security

The ultimate test of Cyber Security for an organization remains how well and fast that organization can react to a Cyber incident! However, to achieve the desired levels of preparedness an organization...

View Article

Visualize Malware Activities – ProcDOT

A tool with the name of ProcDot developed by Christian Wojner from the national Computer Emergency Response Team in Austria (CERT), allows security experts to analyse malware activities in a...

View Article

The controversial US intelligence program

According to the Dutch newspaper De Telegraaf , even the Dutch intelligence services tap into the US PRISM program to access personal data of civilians and organizations. The controversial US...

View Article


Stay Private on your Android phone

In a way or another state surveillance programs will never cease to exist and the best to way guarantee your privacy online is to deploy tools that help you achieve anonymity as much as possible. For...

View Article


Free android application analysis tool

The free tool Dexter from Bluebox labs assists security researchers in their malware analyzes on the Android platform. Its UI allows for graph views that help you getting a better overview of relations...

View Article

Security Risks of Out-of-band management tools

Dan Farmer uncovers some serious security issues with the Intelligent Platform Management Interface (IPMI) protocol and the Baseboard Management Controllers (BMCs). In his blog post, Dan goes into...

View Article

The importance of situational awareness in security operations

When credible threats are identified, defence plans can be put in place or altered to best protect against the identified threats. Understanding your adversary and their motivations can often prove as...

View Article

HP Fortify solutions and competing products

Applications—especially mobile applications—are the new favourite target for hackers, data thieves, and other bad actors in the IT world. That makes application testing tools critical components in...

View Article


Jailbreak Detection Code

NESO Security Labs AppMinder is a free service that provides defensive protections to be integrated into Enterprise iOS Apps. Enterprise Apps commonly use encryption to protect data in transit and data...

View Article

Minion – automated security testing

Minion is a platform developed by the Security Automation team at Mozilla to enable integration and adoption of automated security testing that has been under development for the past year. The...

View Article


Kvasir: Penetration Test Data Management

Penetration tests can be data management nightmares because of the large amounts of information that is generally obtained. Vulnerability scanners return lots of actual and potential vulnerabilities to...

View Article

iPhone Tracker

This open-source application maps the information that your iPhone is recording about your movements. It doesn’t record anything itself, it only displays files that are already hidden on your computer...

View Article


Design and Operational Guide to Protect against “Advanced Persistent Threats”

An Approach to improve security measures against new cyber security threats. This document explains what “Advanced Persistent Threats” really is and how to design and operate networks and systems to...

View Article

Free Penetration Test Environment

Faraday by Infobyte introduces a new concept (IPE) Integrated Penetration-Test Environment a multiuser Penetration test IDE. Designed for distribution, indexation and analysis of the generated data...

View Article

Feodo Tracker

Abuse.ch publishes a list of Feodo botnet C&C servers tracked by its Feodo Tracker. You can sort the list by clicking on any column title (please note that JavaScript must be enabled in order to...

View Article
Browsing latest articles
Browse All 36 View Live




Latest Images