US-Cert has put out a vulnerability note during December 2011 regarding a brute force attack against wireless routers. The vulnerability was first discovered by Stefan Viehböck and was subsequently independently reported by Craig Heffner. Craig and his team have now released their tool “Reaver” over at Google Code which helps with the brute force attacks.
Continue reading “WiFi Protected Setup PIN brute force vulnerability”
Fortinet – a worldwide provider of network security appliances and the market leader in unified threat management (UTM) – has forecasted following eight threats that they consider to be the most damaging / dangerous in 2012.
Continue reading “Top 8 Security Predictions for 2012 by Fortinet”
If a private key is compromised by the man-in-the middle attacker he can decrypt the messages using the private key. The worst part is if he has recorded the previous conversations he can break that also using this private key. This can be prevented by the Forward-Secrecy technique. Continue reading “Tech Terminology Demystified – ‘Forward-Secrecy’”
It is similar to Firesheep or Faceniff, one-click session hijacking using your android smartphone or tablet computer. Continue reading “Wireless session hijacking using Droidsheep”
Businesses are exposed to various web security threats. Here we list some of the major threats that every organisation should be wary of and take pre-emptive steps to protect end users. Continue reading “Web security threats to a business”
Fraud is a business too and as can be seen from this article, cybercriminals are now outsourcing work to underground call centers to obtain information using social engineering skills.
Continue reading “Underground call-centre for identity theft uncovered by security researchers”