Skip to main content

Posts

Public Honeynet Data – Who are the top 20 hacking countries?

Public Honeynet Data – Who are the top 20 hacking countries? I could watch this site all day. In case you were wondering really wondering who the top hacker countries are, the German Alliance for Cyber Security  has a dashboard display as to what is happening on 97 honeypots around the internet. It makes for some fascinating observation of what is really happening as far as those 97 honeypots are seeing, and what kinds of attacks that hackers are unleashing on the internet. What I thought was the most interesting was the idea in the news that Chinese hackers are going to kill everyone in the USA, when according to the data observed it is really Russia that is the most prolific by far, with the USA in 6 th  place and China in 12 th  place. According to the data, this is how the top 20 break out in terms of what this system is seeing. Honestly I love data like this because it is fully open, and approachable. It is in an easy to understand display that would b...

Fake Your Location on Facebook Using Firefox

In this article we will tell you how to fake your location on facebook using firefox. Here are some of the tips. One thing doing rounds and going viral all over the globe is a social networking site which came into existence in the year 2004. Fondly called FB and officially known as Facebook. According to the survey in September 2012, there were around one billion users who were active on the site. As Facebook is now accessible via mobile as well, it just added to the active users list. Each and everyone wants to stay updated with what’s happening in the world and around and specifically in their community and circle. For using the Facebook features fully one has to get himself registered and then they can add their friends, snaps, videos and any details or applications they need to use. It was a creation of some of the college fellow men of the Harvard University. The man behind the social networking site was Mark Zuckerberg. In the initial stage it was just confined to the Har...

Bug allows complete lock screen bypass on Samsung Galaxy S III

Following claims that the lock screen in the Galaxy Note II can be  briefly bypassed , another Samsung owner has stepped up to claim that the bug goes much farther, and can allow full access to the device. In a separate post on the  Full Disclosure mailing list , Sean McMillian posted a variation on the method that the original discoverer of the bug, Terence Eden, had used to briefly access the home screen on his Galaxy Note II. Instead of launching an application on the home screen, McMillian wrote that if an attacker locks the screen and then unlocks it again, the bug would allow full access to the phone. McMillian also tested the device on three separate Galaxy S III devices, highlighting that the issue is likely more related to Samsung's software, rather than a widespread Android issue. ZDNet was able to confirm the complete bypass on an S3 running Android 4.1.2, although the timing to replicate the issue is very small and difficult to replicate at first. Once b...

iOS 6.1 lock-screen bypass fumble highlights BYOD fragility

The Verge  first noticed ( via  Techmeme ) that iPhone and iPad users running the latest iOS 6.1 platform can bypass the lock screen, even when a password is set.  No matter how secure your password is, by fumbling around with a few buttons in sequence, your password-enabled iPhone or iPad is laid open for anyone to potentially rifle through parts of your phone or tablet. Are the alarm bells ringing yet? Engage the panic switch. Your entire mobile enterprise and bring-your-own-device (BYOD) plan at work just crumbled because Apple inadvertently allows unauthorized users to gain access to local device data, including in some cases server-stored contacts, voicemail, and photos. Read this Does jailbreaking or rooting devices, and BYOD mix? The short answer is no. The slightly longer answer... definitely not. Read more And for now there's nothing you can do about it.  You can have the strongest password, the enhanced security features, the r...

Why Cloud Services Are So Easy To Hack

Cloud services aren’t fundamentally vulnerable because they’re badly designed; they’re vulnerable because they are used by people who can easily be manipulated via social engineering. If your business uses cloud services and you don’t educate your staff, you might as well kiss your data and your reputation goodbye. Lightning picture  from Shutterstock Veteran ethical hacker Peter Wood made that argument in a presentation at Data Centre World in London (which I’m covering as part of our ongoing  World Of Servers  series). Wood’s company has been penetration testing systems since 1989. While the technical approaches to hacking have changed radically over that time frame, the social engineering techniques needed to access information remain fundamentally the same. “What’s different in cloud from a security view is when you’re renting software-as-a-service, you’ve given away the management of security to a third party,” Wood said. “Do you want to outsource the resp...

How to hack a website with Metasploit

--- The Metasploit Framework --- Note : This is an advance topic.Read Carefully. Feel free to ask any kind of queries . We are always here to help you. If you are really interested in network security, chances are you must have heard of the Metasploit over the last few years. Now, have you ever wondered what someone can do to your PC, by just knowing your IP. Here's the answer. He could 0wN you, or in other words , he could have full access to your PC provided you hav e just a few security loopholes which may arise cause of even a simple reason like not updating your Flash player last week, when it prompted you to do so. Metasploit is a hacker's best friend, mainly cause it makes the job of exploitation and post-exploitation a lot easier compared to other traditional methods of hacking. The topic Metasploit is very vast in itself. However, i'll try keeping it basic and simple so that it could be understood by everyone here. Also, Metasp loit can...