Your are here:hacking technology > hacker course > Article list

Home > hacker course > Page 6
Hamster Audio Player 0.3a Universal Buffer Overflow Exploit (SEH)Hits:1
#!/usr/bin/perl #[+] Bug : Hamster Audio Player 0.3a Universal BOF Exploit (SEH) #[+] Author : ThE g0bL!N #[+] Greetz to all my friends #[+] Tested on: Windows XP Pro SP2 (Fr) ##[+] Big thnx:...2009-07-24
Butler Group Comments on UK Cyber-crime law review by All-Party CommitteeHits:2
Next Wednesday, 30th June, the All-Party Parliamentary Internet Group (APIG) plans to release its report on the Computer Misuse Act (CMA) following the public inquiry that began in March. This report is expected to be a key influence...2009-07-24
Korean government agencies hacked by Peep Trojan horseHits:1
The computer crime authorities in South Korea have identified that six government agencies, including the Korean Atomic Energy Research Institute and the Agency for Defense Development, have been compromised by hackers. The...2009-07-24
Secure data storage tools to protect sensitive data from latest virus threatHits:1
An effective method of preventing sensitive information from being harvested has become even more important to computer users since the recent outbreak of the Scob virus. This virus steals confidential information, such as passwords,...2009-07-23
New Bagle worm uses old tricks to spreadHits:1
Internet users are warned to beware of the latest Bagle worm, Bagle-AF, which is spreading steadily by email. Although the worm uses a multitude of randomly generated subject lines, message texts and attachments to confuse recipients, it...2009-07-23
150 suspects arrested in Operation Web SnareHits:2
US Attorney General John Ashcroft has announced the arrest or conviction of more than 150 people in connection with online computer crimes. The charges include the use of spam email to steal credit card numbers, online fraud and computer...2009-07-22
Is your webcam watching you?Hits:2
Sophos has warned computer users about a worm that has the capability to use webcams to spy on them in their home or workplace. The W32/Rbot-GR worm (also known as the Peeping Tom worm) spreads via network shares, exploiting a number...2009-07-22
Hackers disguise Trojan horse as sleazy David Beckham photographsHits:1
A file posing as photographic evidence that international soccer star David Beckham has been having an affair is in fact infected by the Hackarmy Trojan horse. Thousands of messages have been posted onto internet message boards and...2009-07-21
Watchfire announces new version of AppScanHits:2
Watchfire has announced new releases of AppScan Audit, QA, and Developer Editions. AppScan automates Web application security testing for rapid development of secure Web applications, enables security assurance testing before application...2009-07-21
Prevention better than cure to combat extortion threatsHits:2
The growing prevalence of extortion attacks calls for a fundamental rethink in how companies approach their security. The cost of extortion demands range between 5,000 to anything over 50,000. If you compare this to the average cost of...2009-07-20
Websense Enterprise "Keylogging" Filtering Category Protects Employees against Identity and InformatHits:1
Websense, Inc. has announced that Websense Enterprise now includes a new keylogging filtering category in the Websense Master Database. In 2004, there have been more than 100 high-profile incidents of malicious code discovered with built...2009-07-20
NatWest suspends online banking services to deflect new phishing attackHits:3
NatWest has been forced to suspend some of its online banking services as it has come under attack from a new phishing scam. Customers logging on to NatWest's online banking service are being advised that they cannot create...2009-07-18
Is buying online just as safe as shopping on the High Street?Hits:2
Despite the growing number of Internet fraud reports, buying online is still just as safe as shopping on the high street, according to NTA Monitor, one of the UK's leading full service Internet security testing companies. Although buying...2009-07-18
Doomsday DDoS SWAT Team for HireHits:2
Top Layer Networks has signed a deal with mnet Internet (mnet), one of the UK s corporate only ISP and co-location companies, to deliver an on-call Doomsday DDoS Disaster Recovery Service to customers experiencing brute force DoS and...2009-07-17
Is Your Business Being Stalked?Hits:2
Contrary to popular belief, guarding against threats to personal or small business computers is neither difficult nor expensive , says Australian consultant and author Bill Hely, who backs up his claim with the Second Edition...2009-07-17

Home  <<Prev  1   2   3   4   5   6   7   8   9   10   11  Next>>  Last

Current Page:6 , Total 35 Pages, Every Page 15 Records, Total Records: 514

Hot Articles
Recommend Articles
New Articles
Sub category