heartbleed

Knowing the Heartbleed bug

Dear Readers, I would like to introduce you beta version of article : “Knowing Heartbleed bug” What you will learn…  -the Heartbleed bug in theory  -how to discover Hearbleed bug vulnerability  -how to x Hearbleed bug What you should know…  -basics of SSL  -basics of software developing Introduction The Secure…

2

Building security during SDLC: IBM’s Appscan Enterprise

Dear Readers, The article I would like to introduce is about IBM’s Appscan Enterprise. Introduction: We often talk about securing a web application and discuss tools which can help us identify specific vulnerabilities. However, the problem gets interesting if we need to scale the solution and conduct assessment of web applications at an organizational level;…

Cyber USA Square Large file

Cyber Intelligence USA

Cyber Intelligence USA Cybercrime is still a major cause of concern for many government departments, and combating these cyber threats is becoming harder due to the sophisticated and complex manner the criminals are using. Cyber Intelligence USA will bring together senior government and law enforcement officials to discuss the latest recent cybercrimes that have taken place…

Cyber Europe 2014 Square

Cyber Intelligence Europe 2014

Cyber Intelligence Europe: Cyber Intelligence Europe returns to Brussels to allow for good participation from across Europe and from European Governing bodies to share information on how to protect sensitive computer systems from a cyber-attack. Many governments and armed forces are now spending their budgets to strengthen their infrastructure to counter the cyber hackers.  It…

heartbleed

First Heartbleed Hacker Caught!

19-year old teenage hacker was caughed yesterday in Canada. It is being said that he could have been using Heartbleed bug to break into tax agency. The suspect, Stephen Solis-Reyes, was arrested at his home in London, Ontario yesterday and he is accused of unauthorised use of computer and mischief in relation to data. The…

logo blog

“Stakkato Principal” – method of hacking

Dear Readers, We would like to introduce you “Stakkato” hacking method. Take a look! “Stakkato Principal” Author: Mardian Gunawan Introduction: Stakkato, or stakkato intrusion are known for its simplicity to take over thousand of high profile website. Basically its just leveraging using known (kiddies) methods yet the impact is devastating. knowledge one will gain and…