NTP (Network Time Protocol) is the widely used protocol used by computers to ensure that their internal clocks are accurate. Surprisingly, connections between computers and NTP servers are rarely encrypted, making it possible for hackers to perform man-in-the-middle attacks that reset clocks to times that are months or even years in the past. Recently, in a paper […]

Hello, everybody ! Hacker’s world starts new year with a cool gift from an hacker named “Pr0x13″ with the tool iDict which permits to bruteforce iCloud account. This tool is available to download on GitHub. This tool uses an exploit a security flaw of Apple iCloud security infrastructure to bypass restrictions and two-factor authentication security that […]

Hello ! In this new post, I will explain how to retrieve current pattern of an Android device. For you information, this problem has been proposed on a web-based CTF (Capture the Flag) in a computer security competition. I always tried on a rooted device but if someone can try this trick on a non-rooted […]

A newly discovered security issue in the widely used Linux software, Bash. Some cyber experts have said that this vulnerability may be a bigger threat than famous Heartbleed flaw surfaced in April 14. For those who don’t know, Bash is the software used to control the command prompt on many *nix computer. With this new […]

Speaking at the Black Hat cyber security conference, the analyst Ruben Santamarta of IOActive presented a paper showing that communications devices from Harris, Hughes, Cobham, Thuraya, JRC, and Iridium are all highly vulnerable to attack. Soldiers on the front lines use satellite communications systems, called SATCOMS to call in back up, lead their comrades away from […]

Today, an important news about the IT security is issued.  A group of Russian hackers has seized about 1.2 billion internet passwords on U.S. and foreign companies around the world. Hackers have put their hands on user names and access codes of some 420,000 websites. This information comes from researchers at security company Security Hold. […]

Norse’s ability to track and analyze vast amounts of live Web traffic, providing the first truly effective protection from all threat vectors. Amazing web site !!! http://map.ipviking.com/

In recent days, several clients Swiss banks may be potential victims of a Trojan horse. According to various sources, a group of hackers have launched a massive attack against e-banking accounts of 12 Swiss banks. The trojan is called “Retefe” and  this attack has been publicly published by TrendMicro. Attack – Step 1 – Phishing + […]

Heartbleed flaw is a serious vulnerability in OpenSSL library. This problem has been found by Neel Mehta of Google Security and the fix has been developed by Adam Langley  and Bodo Moeller. This big bug allows anyone who is connected to Internet the read the server or client memory if they run a vulnerable version […]

The author Released in January 2000 after completing five years in prison, it has since become one of the brightest experts in computer security. Consultant and cofounder of Defensive Thinking, he has written articles for numerous magazines and newspapers information. His adventures hacker inspired a Hollywood movie, cyberstalking. This book is the second of Kevin David […]