-
Recent Posts
Recent Comments
Carlton on Metasploit – Installatio… Morten Juhl on CUPS seo on CUPS antalya escort kızla… on Wireless network interface… iphone 6 on Metasploit – Installatio… Archives
Categories
Meta
Category Archives: Week 23
Outsourcing cybercrime
According to this article There is a thriving black market for support for cybercrime , the article refers to a key note (1 hour 18 min video.) given by the Lead Investigator from the Center for Internet Epidemiology and Defenses … Continue reading
Posted in IT Security, Week 23
Leave a comment
LulzSec claims responsibility for CIA.gov outage
LulzSec (Lulz Security) is on the road again and now on CIA homepage. LulzSec did take down the Website briefly probably via a DDoS attack Wednesday afternoon. “LulzSec, the hacking and prankster collective that has attacked the US Senate, Sony, … Continue reading
Posted in IT Security, Week 23
Leave a comment
Why Cyber Attacks Are So Difficult to Trace Back to Hackers
One common of hacking practices is to hack to poorly secured computers and use them as proxies to attack other more secured systems. Even more hackers can set up a chain of different proxies in different counties. This method allows … Continue reading
Posted in IT Security, Week 23
Leave a comment
Nintendo server attacked
This article explains about the company Nintendo, which was attacked by the hacking group Lulz Security. It is the same hacking group that attacked the websites of Sony weeks ago. I find it interesting and surprising the fact that both … Continue reading
Posted in IT Security, Week 23
Leave a comment
Botnet world
There was a big hit to botnet world when the Spamit.com closed their shop and the gigantic Rustock botnet was slowed down. As looking to statistics we can see that this made this year so far happy to anti – … Continue reading
Posted in IT Security, Week 23
Leave a comment
Using GPU to crack passwords
Recently, I read about a password cracking tool called ighashgpu. What is interesting about it is that it is using the GPU for bruteforcing, instead of CPU which is usually used.
Posted in IT Security, Week 23
1 Comment