Last week’s feature explaining why passwords are under assault like never before touched a nerve with many Ars readers, and with good reason. After all, passwords are the keys that secure web-based bank accounts, sensitive e-mail services, and virtually every other facet of our online life. Lose …
A few hours ago, FireEye published some information related to a new Java 0day exploited in the wild.
The malicious JAR file was served from ok.aa24.net / meeting / index.html
The html loads the Java applet passing some parameters that are used later to build the URL to download the payload. …
A Korean news site was recently observed distributing malware. I thought it would be an opportune time to test out my program that attempts to locate malicious scripts on a website. Here’s an excerpt from the results:
Looking at the screenshot above from the bottom up, we see some suspicious co…
Dispositivo Móvel – VCT
Researchers have discovered additional capabilities within the Crisis financial malware, namely that it also spread via virtual machines.
Crisis, also known as Morcut, is a malicious rootkit which infects both Windows and Mac OS X machines using a fake Adobe Flash Player installer, Takashi Kats…
WikiDrivers – Wiki-style resource and guide for device drivers
A Poor Man’s DNS Anomaly Detection Script
Santoku Beta – The New Mobile Forensics, Malware Analysis and App Security Testing Distro
IP-Adress.com Proxy List | Whois Proxy List | IP-Adress.com
Ultrasurf – Free Proxy-Based Internet Privacy and Security Tools
An online password cracking service for penetration testers and network auditors who need to check the security of WPA protected wireless networks, crack password hashes, or break document encryption.
Whether it’s a WPA2 network, NTLM hashes, Unix hashes, or an encrypted PDF file, one thing’s f…