The Flame computer virus that smoldered undetected for more than 2 years in Middle Eastern energy facilities confirmed fears that the world has entered a new age of cyber espionage and sabotage. Internet defenders are tearing into freshly exposed Flame malware (malicious software) that could be adapted to spread to critical infrastructures in countries around the world. While the components and tactics of Flame were considered old school, the gigantic virus's interchangeable software modules and targeted nature were evidence that malware is a potent weapon in the Internet era. "We are seeing much more specific types of malware and attacks," said McAfee Labs director of security research David Marcus. "When you talk about a situation where the attacker knows the victim and tailors the malware for the environment it jumps out," he said. "That speaks to good reconnaissance and an attacker who knows what they are doing." Gat
... Read more »
This entry aims at illustrating current security flaws in WEP/WPA/WPA2.
Successfully cracking a wireless network assumes some basic familiarity with networking principles and terminology, as well as working with command-line tools. A basic familiarity with Linux can be helpful as well.
Attempting to access a network other than your own, or one you have permission to use is illegal!!!
To successfully crack WEP/WPA, you first need to be able to set your wireless network card in "monitor" mode to passively capture packets 
... Read more »
If you’ve just started using BitTorrent, you may not be fond of the whole "allow people to upload while you download” thing. It kills your bandwidth, and can make using the internet at all difficult, especially if you don’t have a power
... Read more »
I did this once...and I did at again...and again... On my mobile, with my precious memory card in, I committed a sin --- accidentally formatting it! Fortunately, something could redeem me.
If you have ever used a digital camera before, you probab
... Read more »
This section illustrates an example of a real life attack conducted against an organization that resulted in loss of critical data for the organization.
In this attack, Acme Widgets Corporation suffered a major breach from at
... Read more »
Yahoo booters are softwares that use packet codings to send the victim‘s computer using yahoo messenger, these pack codes contain some information and codes that computer can not understand, so computer gets hanged or slowed down by processing these packets, there are lots of different kinds of packets created by programmers to boot yahoo users in different ways, like disconnecting them from yahoo messenger and internet, or hanging their computer, or closing their yahoo messenger or sending them thousands of IM messages from different yahoo ids.Here is latest Ybooter. ... Read more »