Gmail Fake login page using XSS vulnerability on google mail

A XSS vulnerability in Gmail allow hackers to create fake login page and show the domain name as mail.google.com.
See the url :
http://mail.google.com/imgres?imgurl=http://abcdef&imgrefurl=http://abcdef.com/html
As the URL is mail.google.com, its easy to trick users into entering the username and password to such fake login pages. The strange thing is this method […]


The Cyber warfare; Attack on Al-Qaeda, Georgia and the Cyber cold war

The world is moving closer and closer to catastrophic cyber warfare. The latest rise hacking for political cause is pointing us to believe that more severe attack is just around the corner.
Attack on al-Qaeda (September 2008)
Al-Qaeda’s main online forums have been taken offline apparently by government agencies or funded by them. The forum was removed […]


Ethical Hacking showcased at ChicagoCon

Hacking for a living and making great money is a reality. Thanks to federal regulations, pen testing (AKA ethical hacking) is basically required by law. ChicagoCon 2008f by TDCC features world-class security training followed by a 2-day Ethical Hacking Conference that prepares attendees for this dream career.
The ChicagoCon features all new keynoters, additional security boot […]

Explore More

Detecting New Rootkits

A new rootkit can either be one that has never been seen before, or one that uses new technologies or previously unused methods of attack. Or both. Andthat is where

Cyber Attacks to Myanmar Media Sites

Last September 28, BurmeseHackers Group Hacked Irrawaddy Online Store twice, and we’ve been discussed about that. After a month, 27/09/2010: Irrawaddy, Mizzima and the Democratic Voice of Burma (DVB), were

What are the advantages and disadvantages of honey pots?

Honey pots have several advantages, which are as follows: * Small set of data: Honey pots collect small amounts of data, but almost all of this data is about real