Your are here:hacking technology > hacker course > Article list

Home > hacker course > Page 8
Chip & Pin launch has less to do with reducing fraud than reducing the Card Companies liabilityHits:16
Early Warning, the online scheme that helps UK retailers to prevent CNP (card-not-present) credit-card fraud, has today released figures showing a 30% increase (year on year) in the amount of CNP fraud data that has been gathered...07/08/2009
Versions 1.1 and below of the IN module in PunBB suffers from a remote blind SQLHits:22
#!/usr/bin/perl #[0-Day] PunBB Affiliations.php IN Mod = v1.1 Remote Blind SQL Injection Exploit #Coded By Dante90, WaRWolFz Crew #Bug Discovered By: Dante90 UltraSound, WaRWolFz Crew use strict; use LWP::UserAgent...07/07/2009
Japanese bank computer fraud robbery attempt should be no surpriseHits:47
A high-tech gang used a keyboard logging Trojan horse to spy on desktop computers at Sumitomo, the Japanese banking group, capturing keypresses. This gang is said to have planned to steal 220m and transfer the money electronically to ten...07/07/2009
Instant Messaging Continues to Advance as an Attack Vector for Hackers to Gain Access to OrganisatioHits:19
Websense Security Labs(tm) has reported a 300 percent increase of attacks that use instant messaging and malicious websites in the first quarter of 2005, versus the fourth quarter of 2004. IM can be a highly effective business tool for...07/07/2009
Virtualisation: Why existing security measures are no longer enoughHits:5
Although virtualisation is not a new concept its present implementations are changing the face of corporate IT, through the reduction of the number of physical servers, the consolidation of rack space and the cutting of energy costs....07/06/2009
Next Generation Authentication Technology Can be the Answer to Identity Theft and Online FraudHits:6
Every day billions of dollars are being lost by financial institutions and corporate enterprises through a range of ingenious acts of Internet fraud. This global problem is now reaching epidemic proportions and is the major...07/06/2009
Open Source For Perimeter SecurityHits:14
There is a widespread and wholly inaccurate impression that open source development is somehow haphazard and undisciplined, a free-for-all among brilliant but uncoordinated individuals. In fact, most major open source projects are very...07/06/2009
Computer Associates acquires eTrust CleanupHits:36
Computer Associates International, Inc has announced the acquisition of an advanced mainframe identity and access management solution that protects enterprise IT environments by automatically identifying and removing obsolete, unused and...07/01/2009
Top secret German Police hard drive sold over ebay for 20 eurosHits:22
This week's Spiegel - one of Germany's leading weekly papers has revealed that a computer hard drive with confidential data from the Brandenburg police in Germany has been auctioned over eBay for a mere 20 Euros. The used hard drive with...07/01/2009
Identity Theft In The Corporate NetworkHits:10
The office cleaner wanders around the IT department emptying bins into a black plastic sack. He bends below each desk to look for stray sandwich wrappers and plastic cups. Whilst he s under the desk, it is a matter of seconds for him...06/30/2009
Sheffield man arrested in connection with dating website hack and Fathers 4 Justice wormsHits:11
According to The Register, a 37-year-old man has been arrested by British police under suspicion of hacking into the online dating website, loveandfriends.com. Officers from New Scotland Yard's Computer Crime Unit are also said to have...06/30/2009
Pointsec to Secure Business Critical Data for Swiss ReHits:12
Pointsec has announced it will provide endpoint security technology for Swiss Re, one of the world's leading reinsurers and the world's largest life and health reinsurer. Swiss Re is one of the world's leading...06/26/2009
Finally Software Offers Protection from Keystroke Monitoring Spyware and Identity TheftHits:12
Finally Software has announced the immediate availability of Fin-Keylog, a software product designed to effectively protect sensitive keystroke data from being hacked from a PC. Fin-Keylog provides a real-time...06/26/2009
Is machine-to-machine the gap in your security?Hits:9
Over the last ten years, major changes have occurred in IT. With the Internet driving the pace, one of the most significant developments has been the rise of IP to become the dominant protocol. Another key element has...06/24/2009
Toxic Blogs Distribute Malcode and KeyloggersHits:16
Blogs are increasingly being exploited as a means to distribute malicious code and keylogging software. Cyber-criminals are now taking advantage of blog sites that allow users to easily publish their own web pages at no cost. Blogs can...06/24/2009

Home  <<Prev  3   4   5   6   7   8   9   10   11   12   13  Next>>  Last

Current Page:8 , Total 35 Pages, Every Page 15 Records, Total Records: 514

Hot Articles
Recommend Articles
New Articles
Sub category