EC Council was reported to have been compromised by a hacker called Godzilla. Based on published materials it seems that the hacker got access to training course material of several certification programs. Looking into the published content by the hacker and analysing the screenshots shows that the server was hacked by the upload of the WSO web shell code The malicious shell was probably up... [More]
The following links take you to the What's New topics for System Center 2012 Service Pack 1 (SP1). System Center 2012 – App Controller SP1 System Center 2012 Configuration Manager SP1 System Center 2012 – Data Protection Manager (DPM) System Center 2012 SP1 – Operations Manager System Center 2012 - Orchestrator System Center 2012 – Service Manager System Center 2012 – Virtual... [More]
Source: http://www.entrepreneur.com.ph/ideas-and-opportunities/article/using-tech-for-your-business Upgrading the technology that runs your business could mean the difference between keeping the status quo and boosting sales. In line with their commitment to empower businesses through technology, Microsoft, together with its Certified Partner for Learning Solutions namely Fast Lane, brought Erdal... [More]
EC Council Senior Director Stephen is handling my CEI Circle of the Excelence Award Me during my speech… EC Council CEO Jay Bavisi while is handing Fastlane Asia Pacific's Circle of Excellence Best Training Partner Award Award Winners together with EC Council Management Team and while we are discussing CEH v8
This week I am teaching EC Council’s famous Certified Ethical Hacker class, one of the chapter has some details on “Google hacking” … During the class we found very interesting details…
If you name is listed below, or you know any of those people, please reach them out: My aim with publishing the name is to reach them out and let them change their ID numbers ASAP. W... [More]
A hacking anatomy and what we can learn out of it!
There is nearly no single week , we don’t read in the news that there is a attack launched against a government, business or organization. As we all know there is NO WAY to STAP a Hacker. All what we can do is make their job harder ? But how?
The best way is to keep an eye on Security News, to subscribe to some newsletters etc. Once a incide... [More]
If you’re a LinkedIn user, do yourself a favour and change your password right now !!! LinkedIn Wednesday confirmed that at least some passwords compromised in a major security breach correspond to LinkedIn accounts. Norweigan IT website Dagens IT first reported the breach, noting that “Two days ago a... [More]
Very interesting article to read specially if you are in IT Source: arstechnica.com A couple of days ago, I received an e-mail from Iran. It was sent by an analyst from the Iranian Computer Emergency Response Team, and it was informing me about a piece of malware their team had found infecting a variety of Iranian computers. This turned out to be Flame: the malware that has now been fro... [More]
Vulnerability in TCP/IP Could Allow Elevation of Privilege
Two security holes in Windows, including one affecting the TCP/IP component that could allow an attacker that logs on to a system to upgrade his user access privileges by running a specially crafted application. This hole is considered important for all supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server... [More]
A friend of mine called me during the night, asking for help.
He was downloading “free stuff” (magazine) from the net and enjoying the FREE reading, next day when he wanted to log in back to his PC , guess what happened , his FREE anti virus did not protect him from not getting infected.
After my investigations I found out that this”free magazine” web site had everything in... [More]
Do you want to learn how you can “protect your Windows Servers, computers in advanced level ? Then do not miss out this opportunity Advanced Windows Defence - 2 day tutorial Date: Monday 14th and Tuesday 15th May 2012 Time: 9:00 am - 5:00 pm Room: Monarch Room Price: $1150 AusCERT members / $1980 standard delegates This Workshop will cover fundamental areas of fortifying your Wind... [More]
For my blog visitors,I have good news:
Visiting this blog is not just keeping you up to date with what is going on in IT World , i am giving you also access to some resources like Pen Test Market Magazine.Pen Test Market Magazine is usually free to all PEN TEST MAG subscribers, but i do have permission to distribute this months issue for everybody.
Here is March 2012 edition of the mag for free : ... [More]
First Issue of PenTest Market is Out! PenTest Market. This magazine is going to make all the difference. You will see pentesting from a different perspective. Our contributors come from the IT security world but not exclusively. Especially for you we invited potential clients of pen testers to show the other side of the barricade. This is a great opportunity to learn about their expectations . Th... [More]
Hackers from the "RedHack" group who brought down the Ankara Police Department's website and acquired secret information last week said one of the passwords of the secret police files was "123456."
A member of the hacking group named “Radikal” saying that "RedHack was founded after deliberating on how to utilize our skills for the oppressed peoples." "The question is, how serious can a... [More]
Daniel Weis posted a link in his blog which took my attention !!! Am sure you will be inversed as me if you are doing “Ethical Hacking” or “Penetration Testing” Here is the info from the Web site: A password cracking service for penetration testers and network auditors who need to check the security of WPA2-PSK protected wireless networks, crack password hashes, or break document encryption... [More]