Amazon EC2 Concepts
Whether you’re an existing customer of Amazon’s cloud computing platform or contemplating of becoming one, I suggest that you get acquainted with Amazon’s EC2 concepts and set of services. All major...
View ArticleAre website stress testing services equivalent to DDoS attacks?
I don’t think so, however, many argue that a website which accepts payment to place a target website under stress while the service uses weaknesses of third-party assets such as, DNS reflection attacks...
View ArticlePrivacy concerns on IP addresses
Every user on the Internet is assigned an IP address by the Internet service provider he or she is subscribed to and this is essentially needed to access the Internet itself. An IP address is a...
View ArticleQR Code based authentication system
A cryptographic login system based on mobile phones QR Codes eliminates the use of passwords. This authentication system is called Rublon, and uses 2048-bit RSA keys and the AES 256-bit encryption...
View ArticleAnonymizing IP addresses
Crypto-PAn is a cryptography-based sanitization tool for network trace owners to anonymize the IP addresses in their traces in a prefix-preserving manner. Crypto-PAn has the following properties:...
View ArticleReacting Faster and Better – The Holy Grail of Cyber Security
The ultimate test of Cyber Security for an organization remains how well and fast that organization can react to a Cyber incident! However, to achieve the desired levels of preparedness an organization...
View ArticleVisualize Malware Activities – ProcDOT
A tool with the name of ProcDot developed by Christian Wojner from the national Computer Emergency Response Team in Austria (CERT), allows security experts to analyse malware activities in a...
View ArticleThe controversial US intelligence program
According to the Dutch newspaper De Telegraaf , even the Dutch intelligence services tap into the US PRISM program to access personal data of civilians and organizations. The controversial US...
View ArticleStay Private on your Android phone
In a way or another state surveillance programs will never cease to exist and the best to way guarantee your privacy online is to deploy tools that help you achieve anonymity as much as possible. For...
View ArticleFree android application analysis tool
The free tool Dexter from Bluebox labs assists security researchers in their malware analyzes on the Android platform. Its UI allows for graph views that help you getting a better overview of relations...
View ArticleSecurity Risks of Out-of-band management tools
Dan Farmer uncovers some serious security issues with the Intelligent Platform Management Interface (IPMI) protocol and the Baseboard Management Controllers (BMCs). In his blog post, Dan goes into...
View ArticleThe importance of situational awareness in security operations
When credible threats are identified, defence plans can be put in place or altered to best protect against the identified threats. Understanding your adversary and their motivations can often prove as...
View ArticleHP Fortify solutions and competing products
Applications—especially mobile applications—are the new favourite target for hackers, data thieves, and other bad actors in the IT world. That makes application testing tools critical components in...
View ArticleJailbreak Detection Code
NESO Security Labs AppMinder is a free service that provides defensive protections to be integrated into Enterprise iOS Apps. Enterprise Apps commonly use encryption to protect data in transit and data...
View ArticleMinion – automated security testing
Minion is a platform developed by the Security Automation team at Mozilla to enable integration and adoption of automated security testing that has been under development for the past year. The...
View ArticleKvasir: Penetration Test Data Management
Penetration tests can be data management nightmares because of the large amounts of information that is generally obtained. Vulnerability scanners return lots of actual and potential vulnerabilities to...
View ArticleiPhone Tracker
This open-source application maps the information that your iPhone is recording about your movements. It doesn’t record anything itself, it only displays files that are already hidden on your computer...
View ArticleDesign and Operational Guide to Protect against “Advanced Persistent Threats”
An Approach to improve security measures against new cyber security threats. This document explains what “Advanced Persistent Threats” really is and how to design and operate networks and systems to...
View ArticleFree Penetration Test Environment
Faraday by Infobyte introduces a new concept (IPE) Integrated Penetration-Test Environment a multiuser Penetration test IDE. Designed for distribution, indexation and analysis of the generated data...
View ArticleFeodo Tracker
Abuse.ch publishes a list of Feodo botnet C&C servers tracked by its Feodo Tracker. You can sort the list by clicking on any column title (please note that JavaScript must be enabled in order to...
View Article
More Pages to Explore .....