Social Engineering is no science, it is pure trickery!

February 1, 2009 0 Comments 0 tags

The term “Social Engineering” sounds like a serious academic subject on reforming a wayward society! Alas, far from the truth, it is pure and simple trickery, a con job. The

More Trojan horse for Apple Mac! Is Mac more insecure than windows?

January 27, 2009 0 Comments 0 tags

One more malware have been spotted for the Apple Mac machine. This time Trojan.iServices.B which gets into the system, open the backdoor in Mac machines and connect them to a

Detecting New Rootkits

January 25, 2009 0 Comments 0 tags

A new rootkit can either be one that has never been seen before, or one that uses new technologies or previously unused methods of attack. Or both. Andthat is where

What is a rootkit?

January 25, 2009 0 Comments 0 tags

For me, it is the evolution of the Trojan Horse concept. It is, in these days, a complete package of trojanized system utilities, with some interesting add-on programs, like specially

Cyber attacks are real but is there any foolproof defense yet?

January 23, 2009 0 Comments 0 tags

Tulip Systems Inc., the world renowned high bandwidth and broadcast stream hosting service US corporation was under repeated cyber attacks aimed at disrupting web services during the Georgia-Russia standoff few

Hack Tools, Utilities and Exploits

January 22, 2009 0 Comments 0 tags

Packetstorm Last 10 Files glsa-200901-13.txt – Gentoo Linux Security Advisory GLSA 200901-13 – Multiple vulnerabilities have been discovered in Pidgin, allowing for remote arbitrary code execution, denial of service and

What Damage Can Hackers Do?

January 22, 2009 0 Comments 0 tags

Hackers like to subvert computer security without permission. They are cyber criminals. This can mean gaining access to a computer across the Internet for illicit purposes. They might engage in