Tag Archives: Hacking

Firesheep Hijacking Tool Makes Hacking For Dummies a Reality

Over the years, there has been a steady progression of polished, easy to use tools that have lowered the bar for hackers. Firesheep is a good example of one such tool. Firesheep was designed to highlight how many web sites … Continue reading

Posted in Ethical Hacking, Hacking | Tagged , , , | Leave a comment

Top Ten Places Cyber Criminals Go to Steal Your Identity

Are you ever uneasy about all the companies that want your social security number and other personal information?  A recent study compiled by McAfee, featured on eSecurity Planet, listed the top ten most hacked industries. While the Internet has brought … Continue reading

Posted in Hacking | Tagged , , , , , , | Leave a comment

Stuxnet changes cyber security battlefield

While many things are unknown about Stuxnet, what is known is that it marks a critical change in cyber war.   So much so that Kaspersky labs describes it as “a prototype of a cyber-weapon that will lead to the creation … Continue reading

Posted in Hacking, IT and Computer Security | Tagged , , , , , , | Leave a comment

MagicJack Hacking

MagicJack is a great device for those traveling abroad or anyone needing an occasional extra phone.  The only real problem is when you happen to forget the MagicJack adapter or in situations when it’s just not possible to plug in … Continue reading

Posted in Ethical Hacking, Smart Phone Hacking | Tagged , , , | Leave a comment

Are BlackBerry’s a Security Risk as the UAE claim?

The United Arab Emirates (UAE) is calling BlackBerry devices a security risk. The UAE telecom regulator has stated, “BlackBerry operates beyond the jurisdiction of national legislation.”  BlackBerrys are the only devices used in the country that have data managed by … Continue reading

Posted in Smart Phone Hacking | Tagged , , , , , | Leave a comment

Web Cam Hacking

While web cameras make it easy to keep in touch with friends and family it is possible for these devices to be hacked. If you have a web cam on your laptop or home computer, hackers may target these devices.  … Continue reading

Posted in Ethical Hacking | Tagged , , , , | Leave a comment

Wireless Vulnerabilities are a Tempting Target for Cyber Criminals and Hackers

Wireless continues to be a big security concern as it is a primary attack vector for hackers.  It is also something that needs to be closely examined during a security assessment.   Even if your not part of a ethical hacking … Continue reading

Posted in Ethical Hacking | Tagged , , , , | Leave a comment