Looks like it might take a bit longer for the government to intercept messages with keywords such as ‘ammonium nitrate’ or ‘bomb’ passing through emails, web forums, blogs, social networks and even images. In a first of its kind live competition held between two spy systems developed by reputed tech arms of India’s national security […]
Category Archives: Security
The notorious hacker who helped the FBI bring down his worldwide empire is a martyr who took the rap for the crimes of his colleagues, a LulzSec member told FoxNews.com over beers at a Manhattan dive bar, just hours after learning the news about the shadowy figure known online as “Sabu.” “People are freaking […]
FBI Director Robert Mueller suggested Thursday that cyber-security threats could soon be more of a threat than terrorism. “Terrorism remains the FBI’s top priority. But in the not too distant future, we anticipate that the cyber threat will pose the number one threat to our country,” Mueller said in a speech before the RSA Cyber […]
Cisco ASA 1000V Cloud Firewall The cloud technology is spreading like wild fire all over the world. And like everything else in technology, unfortunately security is the last thing that vendors consider while developing technology. The same happened with the cloud. At the beginning, nobody thought about security in the virtual cloud. After several security […]
I just checked it a minute back and he was right. It has been hacked. This is the homepage at this moment (10:00 PM IST) As you can see from the image above, it has been hacked by EvilShadow team — 7z1&Ancker. From the tiny little flag and blog links, it looks like the […]
According to CVE-2012-0056, linux kernel 2.6.39 and later versions is vulnerable to local privilege escalation by any local users due to the mem_write function does not properly check for permissions when writing to /proc/<pid>/mem, when ASLR is disabled. Please take a look at this demonstration to see how it works. Reference: 1. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0056 2. http://blog.zx2c4.com/749 […]
DETAILED STEPS Step 1 Upload the Cisco Virtual Security Gateway ISO image to the vCenter datastore. Step 2 From the data center in the vSphere Client menu, choose your ESX host where you want to install the Cisco Virtual Security Gateway and choose New Virtual Machine. The Create New Virtual Machine dialog box opens. Step […]
Install your Trustwave SSL Certificate Click “System Configuration” in the navigation bar and click “ACS Certificate Setup”. Click “Install ACS Certificate” and choose the “Read certificate from file” option. Then provide the full path and filename of the .cer file which was e-mailed to you by Trustwave. Also, provide the full path and filename to […]
Bangalore: Across the world, thousands of Facebook users have been spammed. The spam is a flood of porn and violent images and other graphic content spread across the site over the past couple of days. Read more Here