الأربعاء، 15 أغسطس 2012

Demand Penetration Testing


This video gives you a peek into iViZ's online security portal - the industry's leading on demand penetration testing. Customers enjoy far more action packed and valued features during actual usage. The video imparts a partial overview of its powerful capabilities to carry out external and internal security testing of websites, applications, networks at a much reduced cost with recurring frequency and effective compliance 
management.

VoIP Security Hacker Film : Bank

Think your Voice over IP is Secure? Think Again. View this dramatization of hacking into a financial institution's VoIP telephony system and see how vulnerable enterprise VoIP systems are. Need to secure your VoIP? Think 
VoIP IPS or ViPS! Film by Aimee Britten

Can’t Connect to the Internet? DNSChanger May Be to Blame


If you are experiencing internet connectivity problems with any of your computers, one reason could be because today was your last day to remove a virus from that system. As of this week, an estimated 350000 computers worldwide were still infected with the Alureon DNSChanger virus and over forty five thousand of those cases were here in the US The FBI wrapped up an investigation in November of last year which led to the arrest of a group of Estonian cybercriminals. The group had been hacking personal computers and installing malicious software since 2007. The hackers successfully redirected 650000 computers to fake websites that took its victim’s money through fraudulent transactions. Authorities disconnected the criminal internet servers and temporarily replaced them with secure ones in order to give victims and their infected computers the chance to eliminate the virus without losing internet access. But the computers out there that still have the virus on their computer will find that their system does not connect to the internet and won’t until they remove the software. In the future, Users can check if their computer has been infected by any DNS changer malware by visiting dns-ok.us. A screen will come up and either be green which means virus free or red indicating that the computer is infected. The problem can be fixed by using a free kit on the antivirus software website Kaspersky Information on how to identify and clean up infections can also be found on www.dcwg.org

الجمعة، 10 أغسطس 2012

Social Engineering Defense


When discussing IT security it is very common to pair up defenses with attacks. Firewalls counter network attacks, anti-virus for viruses, anti-spyware for spyware and so forth. So what is paired up with social engineering? What is the best way to defend against the attacker using deception, lying, and pretexting?
If you read just about any column or article on the topic the universal answer appears to be training. I beg to differ. Are quarterly, half-day training sessions really the best way to get employees to use screen savers and passwords? Is customer education the way to counter phishing attacks? Should you invest in security awareness training?

Social Engineering Podcast



Social engineering, in the context of security, is understood to mean the art ofmanipulating people into performing actions or divulging confidential information.[1] While it is similar to a confidence trick or simple fraud, it is typically trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases theattacker never comes face-to-face with the victims.

"Social engineering" as an act of psychological manipulation had previously been associated with the social sciences, but its usage has caught on among computer professionals

How to Make a USB Hacking Tool: USB Switchblade – Hacksaw STEALTH


Make your U3 compatible flash drive into a stealth auto-pwning "switchblade"! Plug in to any computer and (without anything happening on screen) save a log file containing email passwords, login passwords, wifi passwords, LM hashes, external IPs, and install an administrator account available for full remote access in under 30 seconds! Use at your own risk and do so responsibly with consent, as seen on Hak5 www.youtube.com YOU WILL NEED: – Sandisk or U3 compatible Flash Drive – this file: alltechmonster.blogspot.com ^^select "USB Switchblade Hacksaw Tools" mirror: www.mediafire.com – windows xp or windows 7 with windows xp mode (google it) – target PC – gmail account (optional) Check out my new BLOG: alltechmonster.blogspot.com




Ethical Hacking & Penetration 02 Types of Ethical Hacking



Certification is achieved by taking the C|EH examination after having either attended training at an ATC (Accredited Training Center) or done self-study. If a candidate opts for self-study, an application must be filled out and proof submitted of 2 years of relevant information security work experience. In case you do not have two years of information security related work experience, you can send them a request detailing your educational background and request for consideration on a case basis.[2] The current version of the C|EH is V8 uses EC-Council's exam 312-50, as did the earlier versions. Although the new version V8 has recently been launched.[3] This exam has 125 multiple-choice questions, a 4 hour time limit, and requires at least a score of 70% to pass.[4] The earlier v7 had 150 multiple-choice questions and a four hour time limit. The version 7 and version 8 exams costs Council Accredited Training Center, Pearson VUE, or Prometric testing center (in the United States). >US$100 as a nonrefundable fee if you have done selfstudy only [2] Prices apply in the United States (prices in other countries may differ),[2] and is administered via computer at an EC-Council Accredited Training Center, Pearson VUE, or Prometric testing center (in the United States).