security
[Presentation] Why simple security is better security
Experts from IANS and Sophos explain why enterprise-class security offerings are a bad bet for smaller businesses, give tips on…
Read More »WIRELESS LAN SECURITY MEGAPRIMER PART 14: WEP IN-DEPTH
Description: Welcome to Part 14 of the WLAN Security Megaprimer! Please start this series by watching Part 1http://www.securitytube.net/video/1756, if you have…
Read More »-
Knowledge
Understanding Phishing Attack
បរិបទទូទៅ កំណត់ត្រាដំបូងនៃពាក្យថា “Phishing” គឺត្រូវបានគេរកឃើញនៅក្នុងកម្មវិធីសម្រាប់ធ្វើការវាយប្រហារមួយឈ្មោះថា AOHell (ដោយយោងតាមអ្នកបង្កើតរបស់វា) ដែលរួមបញ្ចូលមុខងារសម្រាប់ការលួចពាក្យសម្ងាត់នៃ អ្នកប្រើប្រាស់សេវាកម្ម American Online។ Phishing គឺជាការប៉ុនប៉ងដើម្បីទទួលបានព័ត៌មានដូចជាឈ្មោះអ្នកប្រើប្រាស់ ពាក្យសម្ងាត់ និងព័ត៌មានលម្អិតអំពីប័ណ្ណ ឥណទាន ដោយការបន្លំខ្លួនធ្វើជាដៃគូគួឲ្យទុកចិត្តនៅក្នុងបណ្តាញអេឡិចត្រូនិច Phishing ត្រូវបានផ្ដោតគោលដៅទៅលើអតិថិជនរបស់ធនាគារនិងការសេវាទូទាត់ប្រាក់លើបណ្តាញអិនធឺែណត។ បច្ចេកទេស –…
Read More » WIRELESS LAN SECURITY MEGAPRIMER PART 12: MAN-IN-THE-MIDDLE ATTACK
Description: Welcome to Part 12 of the WLAN Security Megaprimer! Please start this series by watching Part 1http://www.securitytube.net/video/1756, if you have…
Read More »Wireless LAN Security Mega-Primer Part 8: Hacking WLAN Authentication
In this video, we will learn how to hack through various WLAN Authentication schemas – Open and Shared Authentication. As…
Read More »Wireless LAN Security Mega-Primer Part 7: Laughing Off MAC Filters
In this video, we will look at how to bypass MAC based filters applied on access points. It is to…
Read More »Wireless LAN Security Mega-Primer Part 5: Dissecting WLAN Headers
In this video, we will dive deep into WLAN Header fields – Frame Control, Duration/ID, BSSID, SA, TA, DA, Sequence…
Read More »Wireless LAN Security Mega-Primer Part 4: Dissecting AP-CLIENT Connections
In this video, we will understand how AP and Client actually negotiate and establish a connection using – Probe Requests,…
Read More »Wireless LAN Security Mega-Primer Part 3: Pwning Beacon Frames
In Part 3, we will understand the basics of Beacon frames and how access points use it to advertise their…
Read More »Wireless LAN Security Mega-Primer Part 2: Bands, Channels and Sniffing
Description: In Part 2, we will learn how to setup our wireless card into monitor mode and start sniffing the…
Read More »How botnet “command-and-control” works
Botnet command and control centers come in many different forms – here’s a breakdown of how it works and how…
Read More »These IT Companies Are Making Life Too Easy For Hackers
Published on Jan 7, 2013 A Gift for the Hackers – Netherlands: IT companies are failing to secure devices connected to…
Read More »State of the Hack: One Year after the APT1 Report
Published on Feb 25, 2014 Nawaf Bitar Senior Vice President and General Manager, Security Business Unit, Juniper Networks, Inc. We are…
Read More »The New Model of Security
Published on Feb 28, 2014 The pace of change in technology is accelerating and security is no different, with attackers innovating…
Read More »The Future of Security
Published on Feb 27, 2014 How do you stop a motivated attacker who has unlimited resources from compromising your enterprise’s most…
Read More »