<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-2594382695120847325</atom:id><lastBuildDate>Fri, 20 Sep 2024 12:22:36 +0000</lastBuildDate><category>Cool Computer Tricks and Tips</category><category>Security News</category><category>Learn Hacking</category><category>Security News.</category><category>vulnerability</category><category>hackers News</category><category>android</category><category>malware</category><category>windows tricks</category><category>Security Tools</category><category>google chrome tricks</category><category>hacking tools.</category><category>making a virus</category><category>news</category><category>Free Recharge Trick</category><category>hacking tools</category><category>registry tricks</category><category>APK Download</category><category>Blackphone</category><category>Cross site scripting</category><category>Encryption</category><category>Facebook</category><category>Forensic Toolkit</category><category>Information security events</category><category>Kaspersky.</category><category>Linux</category><category>Monitoring</category><category>Networking</category><category>QR code</category><category>Security.</category><category>Spear Phishing</category><category>SwiftKey</category><category>Trojan</category><category>android tricks</category><category>bitcoin miner</category><category>cracked apps</category><category>ddos attack.</category><category>denial-of-service attacks.</category><category>iPhone</category><category>mobile keylogger</category><category>penetration testing.</category><category>port scanner.</category><category>privacy.</category><category>remove virus</category><category>secure ur pc</category><category>skype</category><category>spam.</category><category>vulnerability scanner.</category><category>wifi hacking</category><category>windows XP</category><category>youtube.</category><title>Hack Your Ways</title><description></description><link>http://hackurwayz.blogspot.com/</link><managingEditor>noreply@blogger.com (Hack Your Ways)</managingEditor><generator>Blogger</generator><openSearch:totalResults>88</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle/><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2594382695120847325.post-8207630452300807258</guid><pubDate>Tue, 25 Feb 2014 18:03:00 +0000</pubDate><atom:updated>2014-02-25T10:03:47.624-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">android</category><category domain="http://www.blogger.com/atom/ns#">Blackphone</category><category domain="http://www.blogger.com/atom/ns#">privacy.</category><category domain="http://www.blogger.com/atom/ns#">Security News</category><title>Silent Circle's Blackphone:- The World's Most Secure Solution in Mobile Privacy.</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiK82JkiGHw4KLV3ojMD42T9gFsgn-BaEqsZR2vp7_IPVmU-iZqruekFkTWeBzUABgu5Lk1paRib-j8kmzHX0RngV08UJzJNMjYlYPGBjsdIHAnbrzD75lDkscxAloNa8WLUEWgXguXS4s/s1600/Blackphone.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiK82JkiGHw4KLV3ojMD42T9gFsgn-BaEqsZR2vp7_IPVmU-iZqruekFkTWeBzUABgu5Lk1paRib-j8kmzHX0RngV08UJzJNMjYlYPGBjsdIHAnbrzD75lDkscxAloNa8WLUEWgXguXS4s/s1600/Blackphone.jpg" height="266" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;The Blackphone, a&amp;nbsp;privacy and security focused&amp;nbsp;encrypted&amp;nbsp;Smartphone&amp;nbsp;from Silent Circle and Spanish Smartphone maker &lt;b&gt;&lt;/b&gt;&lt;b&gt;&lt;/b&gt;&lt;b&gt;&lt;/b&gt;&lt;b&gt;&lt;/b&gt;&lt;b&gt;&lt;/b&gt;&lt;b&gt;Geeksphone&lt;/b&gt;&amp;nbsp;was announced today at the Mobile World Congress expo in Barcelona.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span itemprop="articleBody description text"&gt;The Blackphone handset, which is being unveiled at the event, goes on sale in June for $629.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5QlQgOQpAy03U1aKKtCMNZX780sSikGoqee9uaIEP_-F7xWOIPKhwwTtnPDlvl_jGNRh4OAdiH2L6Vxd6gpEtAP6lsxnq1tB5rv21GR2Fn1b4IliXkk5_hcrJ72joqwvG3oRvSdyugQ0/s1600/blkphone+price.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5QlQgOQpAy03U1aKKtCMNZX780sSikGoqee9uaIEP_-F7xWOIPKhwwTtnPDlvl_jGNRh4OAdiH2L6Vxd6gpEtAP6lsxnq1tB5rv21GR2Fn1b4IliXkk5_hcrJ72joqwvG3oRvSdyugQ0/s1600/blkphone+price.png" height="249" width="320" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span itemprop="articleBody description text"&gt;It works on a&lt;/span&gt;&amp;nbsp;fully security-hardened version of&lt;span style="text-align: justify;"&gt;&amp;nbsp;of Android called&lt;b&gt; &lt;span class="GINGER_SOFTWARE_mark" ginger_software_uiphraseguid="5c6c7207-48f2-4d94-bbd8-c19323fd6e2e" id="af9e2d18-d162-4ab5-b586-3d52e1680c15"&gt;&lt;span class="GINGER_SOFTWARE_mark" ginger_software_uiphraseguid="4118ea4c-2738-478a-afdf-4c6544e8556b" id="66f1f60b-48b7-4630-8dcc-2bb58abc69a2"&gt;PrivatOS&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/b&gt;and is pre-installed with lots of&amp;nbsp;&lt;/span&gt;privacy-enabled applications such as secure calling and text messaging, encrypted file transfer and video chat.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;The communications functions will be based on technology from Silent Circle, a U.S. provider of secure messaging co-founded by a&amp;nbsp;respected Cryptographer&amp;nbsp;&lt;i&gt;&lt;b&gt;Phil Zimmermann,&amp;nbsp;&lt;/b&gt;&lt;/i&gt;best known as the creator of&amp;nbsp;&lt;b&gt;Pretty Good Privacy&amp;nbsp;(PGP)&lt;/b&gt;, which is a widely used email encryption software.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;It has a 4.7-inch HD IPS 
display, a 2GHz quad-core processor, 16GB of storage, an 8-megapixel 
camera, LTE&amp;nbsp;connectivity.&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1D-cgKSqB1FDrZ3tFh6zFgJ8Qk1LMXa8rHjmyP2mgSux9tK2t0S0vK_dgeDZ1yR1aNz8F1PyvVucvzqNp7edOhbnrms3h3eDjDvSeDS6cbuWG_GlN9N1aH25p2Dn2FgSLBvSv0g0xJys/s1600/Blackphone1_.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1D-cgKSqB1FDrZ3tFh6zFgJ8Qk1LMXa8rHjmyP2mgSux9tK2t0S0vK_dgeDZ1yR1aNz8F1PyvVucvzqNp7edOhbnrms3h3eDjDvSeDS6cbuWG_GlN9N1aH25p2Dn2FgSLBvSv0g0xJys/s1600/Blackphone1_.jpg" height="257" style="cursor: move;" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;There is also a Wi-Fi connection manager for greater security on 
public networks, and a software that makes it possible to securely 
remote-wipe your device, and facilitate its recovery.Plus bundled in your cost of device are two years of Silent Circle, two 
years of Disconnect (secure/non-trackable search), two years of 
SpiderOak (secure cloud storage), unlimited use of Kismet (Wi-Fi&amp;nbsp;analyzer&amp;nbsp;product), and some&amp;nbsp;gift subscriptions to Silent Circle so that 
your friends and family won’t have to sign up separately to talk with 
you.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span class="main-article-info"&gt;Mike Janke, co-founder and CEO of Silent Circle told Mashable, "&lt;i&gt;If
 you are on the terrorist wanted list or a criminal, intelligence 
services will get into your device. There's no such thing as 100% 
secure phone as&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;i&gt;&lt;b&gt;Blackphone cannot mask metadata entirely from NSA.&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;KDJ3D3PS6M8V&lt;/div&gt;</description><link>http://hackurwayz.blogspot.com/2014/02/silent-circles-blackphone-worlds-most.html</link><author>noreply@blogger.com (Hack Your Ways)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiK82JkiGHw4KLV3ojMD42T9gFsgn-BaEqsZR2vp7_IPVmU-iZqruekFkTWeBzUABgu5Lk1paRib-j8kmzHX0RngV08UJzJNMjYlYPGBjsdIHAnbrzD75lDkscxAloNa8WLUEWgXguXS4s/s72-c/Blackphone.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2594382695120847325.post-2208526447198953849</guid><pubDate>Tue, 25 Feb 2014 15:40:00 +0000</pubDate><atom:updated>2014-02-25T07:40:51.519-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hackers News</category><category domain="http://www.blogger.com/atom/ns#">malware</category><category domain="http://www.blogger.com/atom/ns#">news</category><category domain="http://www.blogger.com/atom/ns#">Security News</category><category domain="http://www.blogger.com/atom/ns#">Security News.</category><category domain="http://www.blogger.com/atom/ns#">vulnerability</category><category domain="http://www.blogger.com/atom/ns#">youtube.</category><title>Banking Malware Distributed via YouTube Ads.</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_ghZp9m9Bh65gcAFNaF6qtNPx6ryJ-BMaLwIaiA1Jv76lqjjXsYnxIRz7VrkEwRmOJK7oFs5petoE4wMzz1lUhpglJYUapyle_Ub7uB287IUmmhDLVyTgVQGYUqqHebR5PsPfMp7HLNQ/s1600/utube+404.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_ghZp9m9Bh65gcAFNaF6qtNPx6ryJ-BMaLwIaiA1Jv76lqjjXsYnxIRz7VrkEwRmOJK7oFs5petoE4wMzz1lUhpglJYUapyle_Ub7uB287IUmmhDLVyTgVQGYUqqHebR5PsPfMp7HLNQ/s1600/utube+404.jpg" height="175" width="200" /&gt;&lt;/a&gt;&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span id="intelliTxt"&gt;&lt;strong&gt;Malvertising attacks are becoming more and more common and it appears that not even YouTube users are safe.&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Security researchers from &lt;/span&gt;&lt;i style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: x-large;"&gt;Bromium Labs&lt;/i&gt;&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt; recently found that YouTube advertising network has been used by&amp;nbsp;cyber criminals&amp;nbsp;to distribute malware.&amp;nbsp;&lt;/span&gt;&lt;span id="intelliTxt" style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;According to experts, cyber criminals compromised an ad network and were&amp;nbsp;&lt;/span&gt;&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;redirecting users to malicious websites, hosting the '&lt;/span&gt;&lt;b style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: x-large;"&gt;&lt;i&gt;Styx Exploit Kit&lt;/i&gt;&lt;/b&gt;&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;' and infect users computer with &lt;/span&gt;&lt;b style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: x-large;"&gt;&lt;i&gt;Caphaw Banking Trojan&lt;/i&gt;&lt;/b&gt;&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;..&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span id="intelliTxt"&gt;This particular exploit kit is designed to&amp;nbsp;&lt;/span&gt;exploit java vulnerability (CVE-2013-2460) in outdated versions, once in the targets computer system the malware detects the Java version installed on the operating system and based upon it loads suitable exploit compatible with the installed java 
version.&lt;/span&gt;&lt;br /&gt;
&lt;span id="intelliTxt"&gt;&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;The command and control server (C&amp;amp;C) used by the 
cyber criminals appears to be hosted in Europe and it relies on a domain 
generation algorithm (DGA).&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span id="intelliTxt" style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Researcher has notified Google of the attack, but so far, they still do not know how the cyber criminals have pulled it off&amp;nbsp;&lt;/span&gt;&lt;i style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: x-large;"&gt;to evade Google’s internal advertisement security checks.&lt;/i&gt;&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;And how many users had become victim of this attack is yet a question.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Google has confirmed that a rogue advertiser was behind this 
malvertisment and also said it has taken this campaign off and is beefing up 
internal procedures to prevent such events from occurring again.&lt;/span&gt;&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;KDJ3D3PS6M8V&lt;/div&gt;</description><link>http://hackurwayz.blogspot.com/2014/02/banking-malware-distributed-via-youtube.html</link><author>noreply@blogger.com (Hack Your Ways)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_ghZp9m9Bh65gcAFNaF6qtNPx6ryJ-BMaLwIaiA1Jv76lqjjXsYnxIRz7VrkEwRmOJK7oFs5petoE4wMzz1lUhpglJYUapyle_Ub7uB287IUmmhDLVyTgVQGYUqqHebR5PsPfMp7HLNQ/s72-c/utube+404.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2594382695120847325.post-8743446343682531462</guid><pubDate>Mon, 24 Feb 2014 19:32:00 +0000</pubDate><atom:updated>2014-02-24T11:33:20.537-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hackers News</category><category domain="http://www.blogger.com/atom/ns#">Security News</category><category domain="http://www.blogger.com/atom/ns#">Security News.</category><title>EC Council hacked again,website defaced.</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZRKH39JPOb_kik2DJv7qgRfpIUfm3SWi4N_J3OInx_QfyJCJW_UZVhdfFWj3BlkHDFySObWb8w44aj752Bllb9l1d96pv1CaZrzVtmfqTGjbHPnBEoYwZ2XnavAWuSYiDrcx2QgYRnts/s1600/ec_council0.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZRKH39JPOb_kik2DJv7qgRfpIUfm3SWi4N_J3OInx_QfyJCJW_UZVhdfFWj3BlkHDFySObWb8w44aj752Bllb9l1d96pv1CaZrzVtmfqTGjbHPnBEoYwZ2XnavAWuSYiDrcx2QgYRnts/s1600/ec_council0.jpg" height="301" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;EC-Council, an organization that offers Certified Ethical Hacker(CEH)&amp;nbsp;has been hacked by a hacker named Eugene Belford (A character from the 1995's movie "Hackers").&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Passport and photo ID details of more than 60,000 security professionals
 who have obtained or applied for the EC-Council's Certified Ethical 
Hacker certification are at risk after the breach, many of whom work in 
sensitive political and military positions. They include members of the 
US military, FBI, United Nations, and National Security Agency.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;The hacker left the EC-Council website with the Passport of Edward Snowden and documents
 proving that Snowden attended the CEH classes in India.&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj106zQAwyt8X7kDqW39KROHaKX83IL_MhnfYTtELFk0eSw5iCIjVdVRqpoN2XruHPYUBm9i4RV2hbYhgklD4x8sVTqmX3DMAm-HK91LBK3tu68d1tUY000brQq6-E2K-5RI2e0v7l9MFQ/s1600/snowden.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj106zQAwyt8X7kDqW39KROHaKX83IL_MhnfYTtELFk0eSw5iCIjVdVRqpoN2XruHPYUBm9i4RV2hbYhgklD4x8sVTqmX3DMAm-HK91LBK3tu68d1tUY000brQq6-E2K-5RI2e0v7l9MFQ/s1600/snowden.jpg" height="320" width="236" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;The self-described "certified unethical software security professional" responsible for the 
attack reportedly used a DNS redirect to access those details, which 
were stored in an inadequately protected location.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;When
 we take a look at the source code, we can see that the hacker has 
uploaded two pictures directly on to the EC-Council web server.&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEvP91nyf-bABn1_UCIPF3sYJotnz-mSTZwUzyx-rz-J1P_74pkODCTinU8EFtgJCcCUjTMEE7YslHzP89ANpeaEnErFSTygGlLFxbxnXMcTFQni6JZxQcfvaGZPowR85hkUcpkuDpzG4/s1600/eccouncil+hacked.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEvP91nyf-bABn1_UCIPF3sYJotnz-mSTZwUzyx-rz-J1P_74pkODCTinU8EFtgJCcCUjTMEE7YslHzP89ANpeaEnErFSTygGlLFxbxnXMcTFQni6JZxQcfvaGZPowR85hkUcpkuDpzG4/s1600/eccouncil+hacked.JPG" height="108" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;As of still it seems as though EC-Council has not gained control of
 their website.&amp;nbsp; An update was posted on the EC-Council site stating:&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;“owned by certified unethical software security professional&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Obligatory link: http://attrition.org/errata/charlatan/ec-council/ -Eugene Belford&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;P.S It seems like lots of you are missing the point here, I’m sitting
 on thousands of passports belonging to LE (and .mil) officials”.&lt;/span&gt;&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;KDJ3D3PS6M8V&lt;/div&gt;</description><link>http://hackurwayz.blogspot.com/2014/02/ec-council-hacked-againwebsite-defaced.html</link><author>noreply@blogger.com (Hack Your Ways)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZRKH39JPOb_kik2DJv7qgRfpIUfm3SWi4N_J3OInx_QfyJCJW_UZVhdfFWj3BlkHDFySObWb8w44aj752Bllb9l1d96pv1CaZrzVtmfqTGjbHPnBEoYwZ2XnavAWuSYiDrcx2QgYRnts/s72-c/ec_council0.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2594382695120847325.post-2592951606994629999</guid><pubDate>Thu, 13 Feb 2014 18:38:00 +0000</pubDate><atom:updated>2014-02-13T10:41:13.027-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hackers News</category><category domain="http://www.blogger.com/atom/ns#">Kaspersky.</category><category domain="http://www.blogger.com/atom/ns#">malware</category><category domain="http://www.blogger.com/atom/ns#">Security News</category><category domain="http://www.blogger.com/atom/ns#">Spear Phishing</category><title>'The Mask', A Sophisticated cyber spying operation that has been under the mask for about 7 years.</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Kaspersky Lab’s security research team have uncovered "The Mask" (aka Careto) a highly sophisticated cyber spying operation that has been alive since at least 2007&amp;nbsp;infecting more than 380 high-profile targets in 31 countries after investigating and monitoring data found on a set of command-and-control (C&amp;amp;C) servers used by the attackers. The main targets of the 
operation are government institutions; embassies and other diplomatic 
missions; energy, oil and gas companies; research institutions; private 
equity firms and activists.&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWSHXPUsuL7dQYg7X49XD4uAuHCW5L78w83LIkImJJQGrmF0ODuM-8nqiOt7rms4dICrXczW9H9igIGEp7yA8LjkTf_eu7VYovKeScvQ9920uhmtcpOj_fz1OGHm6Lo4-OhV-UMwigU6o/s1600/careto-map.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWSHXPUsuL7dQYg7X49XD4uAuHCW5L78w83LIkImJJQGrmF0ODuM-8nqiOt7rms4dICrXczW9H9igIGEp7yA8LjkTf_eu7VYovKeScvQ9920uhmtcpOj_fz1OGHm6Lo4-OhV-UMwigU6o/s1600/careto-map.jpg" height="320" width="204" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span itemprop="articleBody description text" style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Researchers 
dubbed the whole operation “The Mask,” the English translation for the 
Spanish word Careto, which is what the attackers called their main 
backdoor program. Based on other text strings found in the malware, the 
researchers believe its authors are probably proficient in Spanish.&lt;/span&gt;&lt;br /&gt;
&lt;span itemprop="articleBody description text" style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="text-align: justify;"&gt;Kaspersky's researchers believe this could be a nation-state sponsored operation as the level of operational security is not normal for cyber-criminal groups and might be new players on the global nation-state cyber-espionage stage.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span itemprop="articleBody description text"&gt;When active in a victim 
system, The Mask can intercept network traffic, keystrokes, Skype 
conversations, PGP keys, analyze WiFi traffic, screen captures and monitor all file operations,&amp;nbsp;&lt;/span&gt;collecting a large list of 
documents from the infected system, including encryption keys, VPN 
configurations, SSH keys and RDP (remote desktop protocol) files.They also found several 
extensions which have not been able to identify and 
could be related to custom military/government-level encryption tools.&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&amp;nbsp;Infections have been observed in: Algeria, Argentina, Belgium, Bolivia,
 Brazil, China, Colombia, Costa Rica, Cuba, Egypt, France, Germany, 
Gibraltar, Guatemala, Iran, Iraq, Libya, Malaysia, Mexico, Morocco, 
Norway, Pakistan, Poland, South Africa, Spain, Switzerland, Tunisia, 
Turkey, United Kingdom, United States and Venezuela.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span class="main-article-info"&gt;Victims were targeted 
using spear-phishing emails with links leading to websites that hosted 
exploits for Java and Adobe Flash Player, as well as malicious 
extensions for Mozilla Firefox and Google Chrome.These&amp;nbsp;&lt;/span&gt;&lt;span style="text-align: left;"&gt;malicious links seemed to point to news websites, most of them Spanish dailies like &lt;/span&gt;&lt;em style="text-align: left;"&gt;El Mundo&lt;/em&gt;&lt;span style="text-align: left;"&gt; and &lt;/span&gt;&lt;em style="text-align: left;"&gt;El Pais&lt;/em&gt;&lt;span style="text-align: left;"&gt;. But they also included fake links to &lt;/span&gt;&lt;em style="text-align: left;"&gt;The Guardian&lt;/em&gt;&lt;span style="text-align: left;"&gt;, &lt;/span&gt;&lt;em style="text-align: left;"&gt;The Washington Post&lt;/em&gt;&lt;span style="text-align: left;"&gt; and &lt;/span&gt;&lt;em style="text-align: left;"&gt;Time&lt;/em&gt;&lt;span style="text-align: left;"&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;The Mask Malware was designed to infect the 32- and 64-bit Windows versions, Mac OS X and Linux versions, but researchers believe that possibly there may be more versions for Android and iPhones (Apple iOS) platforms.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span itemprop="articleBody description text"&gt;Researchers said,"This is not very common in APT [Advanced Persistent Threat] operations, putting the Mask into the ‘elite’ APT[Advanced Persistent Threat]  groups section"because they&lt;/span&gt;&amp;nbsp;observed a very high degree of professionalism in the operational 
procedures of the group behind this attack, including monitoring of 
their infrastructure, shutdown of the operation, avoiding curious eyes 
through access rules, using wiping instead of deletion for log files, 
etc.&lt;/span&gt;&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4AMk9MDv_lnPLac7H8E8Sn3YYJhsgL-OPY9uUhM4Ie0ZBJ0gbYwbFLD7k2BG5ZDzODEwIap0qqaEUfDbXgauVFUIczEY-evXMQwYaYai78r-Xs-2cIihdDhRKLE2eBXmkBGOzC53212c/s1600/careto-code.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4AMk9MDv_lnPLac7H8E8Sn3YYJhsgL-OPY9uUhM4Ie0ZBJ0gbYwbFLD7k2BG5ZDzODEwIap0qqaEUfDbXgauVFUIczEY-evXMQwYaYai78r-Xs-2cIihdDhRKLE2eBXmkBGOzC53212c/s1600/careto-code.png" height="133" width="400" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;span itemprop="articleBody description text"&gt;&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;This is why they call it Careto, or "The Mask."&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;span class="main-article-info"&gt;&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;span class="main-article-info"&gt;&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;It 
includes the most sophisticated backdoor SGH, which is designed to 
perform a large surveillance function and another backdoor called SBD (Shadowinteger's Backdoor) which uses open source tools like &lt;span class="GINGER_SOFTWARE_mark" ginger_software_uiphraseguid="c7561353-acd6-4f7b-8f64-a3f522280e83" id="1591e1a9-c77b-4c6d-bfe1-a29b791cafd5"&gt;netcat&lt;/span&gt; is included in the malware.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class="main-article-info"&gt;&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;
&lt;div&gt;
The careto module used two layers of
 encryption both RSA and AES for its communication with the 
attackers’ command-and-control servers, preventing anyone who got 
physical access to the servers from reading the communication.&lt;/div&gt;
&lt;div&gt;
Kaspersky discovered the operation last year when the attackers 
attempted to exploit a five-year-old vulnerability in a previous 
generation of Kaspersky’s security software that had long-ago been 
patched and on investigation of
 this malware, CC servers were found down, which shows that attacker 
group was monitoring all aspects related to the malware activity. Since 
there are no identified patterns in these attacks and who is behind 
these activities is yet a matter of investigation for the researchers.&lt;/div&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;KDJ3D3PS6M8V&lt;/div&gt;</description><link>http://hackurwayz.blogspot.com/2014/02/the-maska-sophisticated-cyber-spying.html</link><author>noreply@blogger.com (Hack Your Ways)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWSHXPUsuL7dQYg7X49XD4uAuHCW5L78w83LIkImJJQGrmF0ODuM-8nqiOt7rms4dICrXczW9H9igIGEp7yA8LjkTf_eu7VYovKeScvQ9920uhmtcpOj_fz1OGHm6Lo4-OhV-UMwigU6o/s72-c/careto-map.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2594382695120847325.post-5193847674431312397</guid><pubDate>Mon, 10 Feb 2014 18:56:00 +0000</pubDate><atom:updated>2014-02-10T10:57:27.953-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">android</category><category domain="http://www.blogger.com/atom/ns#">denial-of-service attacks.</category><category domain="http://www.blogger.com/atom/ns#">iPhone</category><category domain="http://www.blogger.com/atom/ns#">Security News.</category><category domain="http://www.blogger.com/atom/ns#">vulnerability</category><title>Snapchat vulnerability allows hackers to launch DDoS attack and remotely crash your smartphone.</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;A new security bug has been reportedly discovered in photo sharing app, Snapchat,which could launch a&amp;nbsp;DDoS&amp;nbsp;attack on users&amp;nbsp;&amp;nbsp;smartphones and cause them to crash.&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZqeJ6ZYRYKFq2Ahb0WOSzAiAZGCuWYSFaN2kBjuj5AIcFS7f6dwtLScJn9FRqT9_bW_7fIDxXC9KK8Jbbj3q695-HmFqxzv_BKfJX8yWSgWCZKpo_XypAOg0WdxKj6IMpNzkZgHECd8E/s1600/snapchat.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZqeJ6ZYRYKFq2Ahb0WOSzAiAZGCuWYSFaN2kBjuj5AIcFS7f6dwtLScJn9FRqT9_bW_7fIDxXC9KK8Jbbj3q695-HmFqxzv_BKfJX8yWSgWCZKpo_XypAOg0WdxKj6IMpNzkZgHECd8E/s1600/snapchat.png" height="240" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Jamie Sanchez, a Security researcher first reported the vulnerability&amp;nbsp;&lt;span class="main-article-info"&gt;which can enable an hacker to launch a massive spam and&amp;nbsp;denial-of-service attacks&lt;/span&gt;.The bug could allow hackers to&amp;nbsp;overload user's inbox with messages, and crash the iPhone, requiring the user to reset their device, and make Android devices noticeably slower.&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhko831h88xn1ysTK-6zCqHcOE26lsXhhIPP8AUZpbkAyj2OVdo1Z4hhIX-Jl7elyCxqTmenmNKL14NyQUoRfkWely_mfNsWFC4DBAZP-x1ymQ2OrcptY2GxCKpmW6SCefYoob5evpXhl4/s1600/SNAPCHAT+vulnerability.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhko831h88xn1ysTK-6zCqHcOE26lsXhhIPP8AUZpbkAyj2OVdo1Z4hhIX-Jl7elyCxqTmenmNKL14NyQUoRfkWely_mfNsWFC4DBAZP-x1ymQ2OrcptY2GxCKpmW6SCefYoob5evpXhl4/s1600/SNAPCHAT+vulnerability.png" height="241" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span class="main-article-info"&gt;&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Jamie Sanchez&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;demonstrated the vulnerability to&lt;i&gt; LA Times&lt;/i&gt;
 reporter,With consent, he sent 1,000 messages in 5 seconds to reporter account, which crashed his iPhone. Android phones apparently won’t crash with the attack, but they will significantly slow down, and the app itself becomes crippled.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;He&amp;nbsp;&lt;/span&gt;&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;declined to contact 
Snapchat with his findings as he believes the company has no respect for
 the cyber security research community which was proved recently when the company did not pay much heed to researchers' warning about a&amp;nbsp;&lt;/span&gt;&lt;span style="color: blue;"&gt;&lt;a href="http://hackurwayz.blogspot.in/search/label/vulnerability" style="font-family: Arial, Helvetica, sans-serif; font-size: x-large;"&gt;&lt;span style="color: blue;"&gt;vulnerability&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style="color: #cccccc;"&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;that could expose user data and ultimately published phone numbers of&amp;nbsp;about 4.6 million users to prove their point.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="main-article-info"&gt;&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Snapchat issued statement ,"We are working to resolve the issue and will be reaching out to the security researcher who publicized the attack to learn more".&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;div id="stcpDiv" style="left: -1988px; position: absolute; top: -1999px;"&gt;
the bug could allow hackers to overload an inbox with messages, and crash the  &lt;a class="word-link" href="https://www.authintmail.com/section/news/iphone" title="iPhone"&gt;iPhone&lt;/a&gt;,
 requiring the user to reset their device, and make Android devices 
noticeably slower.&amp;nbsp;  - See more at: 
https://www.authintmail.com/article/technology/snapchat-vulnerability-can-crash-your-smartphone#sthash.mpgzAVPJ.dpuf&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;KDJ3D3PS6M8V&lt;/div&gt;</description><link>http://hackurwayz.blogspot.com/2014/02/snapchat-vulnerability-allows-hackers.html</link><author>noreply@blogger.com (Hack Your Ways)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZqeJ6ZYRYKFq2Ahb0WOSzAiAZGCuWYSFaN2kBjuj5AIcFS7f6dwtLScJn9FRqT9_bW_7fIDxXC9KK8Jbbj3q695-HmFqxzv_BKfJX8yWSgWCZKpo_XypAOg0WdxKj6IMpNzkZgHECd8E/s72-c/snapchat.png" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2594382695120847325.post-4144665125586742288</guid><pubDate>Sun, 09 Feb 2014 13:09:00 +0000</pubDate><atom:updated>2014-02-09T05:09:05.069-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">android</category><category domain="http://www.blogger.com/atom/ns#">malware</category><category domain="http://www.blogger.com/atom/ns#">QR code</category><category domain="http://www.blogger.com/atom/ns#">Security News</category><title>QR Codes: Quick Response or a Quick Virus code?</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;b&gt;&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Before scanning that QR code you just saw give it a second thought, Is it a clean code that will redirect you to an authentic site for the information you seek or a malicious code to breach your mobile security?&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhi5VBWvaOc_AGvavNvGxZeNjZcleQRPgIriEmggzLoHga3g59DiDktSAHNGLtHkfgMXqoZ4lp1dsB8wqTYkP6AneKsDmK0dfcIY-pd3rzFABubahTyeTOwJrWmKm_YgB1B8aKskPoZVbU/s1600/hackur+ways+qrcode.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;span style="color: #cccccc;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhi5VBWvaOc_AGvavNvGxZeNjZcleQRPgIriEmggzLoHga3g59DiDktSAHNGLtHkfgMXqoZ4lp1dsB8wqTYkP6AneKsDmK0dfcIY-pd3rzFABubahTyeTOwJrWmKm_YgB1B8aKskPoZVbU/s1600/hackur+ways+qrcode.png" height="200" width="200" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="color: #cccccc;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;It seems like everywhere you look these days in business cards, ads, posters, websites, magazines, buses, almost on any object about which you might want to know more, you see a QR code which have proved to be the cheapest and easiest way to link the real world with the virtual.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;QR code short for ‘Quick Response' code is a small two dimensional barcode that somewhat look like a scrambled checkerboards, invented by the Japanese corporation Denso Wave in 1994. Although these codes have been around for almost two decades, they were mainly used for industrial purposes until the last few years.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;b&gt;&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Why are QR codes so popular?&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;A Quick Response code is a type of matrix barcode that can store alphanumeric characters, in the form of URL's or text encoded in both vertical and horizontal direction, thus increasing its capacity of holding data than the traditional single dimensional barcodes i.e. 7,089 numeric characters or 4,296 alphanumeric characters and can store up to 2KB of data.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;All you have to do is take a picture of a QR code with your smartphone camera and a QR reader application to scan it, the link within will direct you to websites, online videos or launch apps. The problem is there is no way to tell what's behind that QR code until scanned by QR code reader app. The biggest risk is if someone sees a random QR code that's not connected to anything just a sticker on the wall people cannot deny &amp;nbsp;their&amp;nbsp;own curiosity, they will scan it because they want to know what it is, and attackers depend on this curiosity and craft their attacks.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;b&gt;&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Mobile Malwares:-&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;According to McAfee Labs Mobile malwares have doubled in last year.&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjI75BWVTbcIOUxvuTGjtGB_rb98vU8tLcNUwZZLMidawyIUgMqGvdVtI4iB6sFfajEeOjatAiww2p2g1goBd4EQh_im-Y2uZWJ9psvKho9Pe3c_BqEFA3Pr_rLW9smTx6ZEpWFTa5WK_c/s1600/mobile+malware+report.png" imageanchor="1"&gt;&lt;span style="color: #cccccc;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjI75BWVTbcIOUxvuTGjtGB_rb98vU8tLcNUwZZLMidawyIUgMqGvdVtI4iB6sFfajEeOjatAiww2p2g1goBd4EQh_im-Y2uZWJ9psvKho9Pe3c_BqEFA3Pr_rLW9smTx6ZEpWFTa5WK_c/s1600/mobile+malware+report.png" height="258" width="400" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Scams involving QR codes are gaining popularity. There are many cases of malicious QR codes being neatly placed over legitimate ones known as QRishing similar to phishing attacks.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;b&gt;IOS Device:-&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;On IOS devices for example, hackers are using jail-break exploits to send users to websites that will jailbreak the device. When a user scans a QR code he is redirected to an unknown website. These are drive by download attack, where these website hosts modified jailbreak exploits. Once visited the user phone will be jail broken and additional malware would be installed such as GPS trackers and key loggers.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;b&gt;Android Based System:-&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;As Android is an open platform, cyber attackers can examine its source code easily and exploit its weaknesses. This makes it more susceptible to QR code attacks because android allows applications to run in the background and offers more app freedom. On an Android based system, the chances of getting infected are often much higher since applications are allowed to do actions such as sending SMS, taking pictures, making calls etc.&lt;/span&gt;&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: #cccccc;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: #cccccc; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;"&gt;For example, a popular attack via QR code took place in
Russia, and involved a Trojan disguised as a mobile app called Jimm.&amp;nbsp;&lt;/span&gt;&lt;span style="color: #cccccc; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16pt; line-height: 115%;"&gt;This malicious application required the following user&amp;nbsp;&lt;/span&gt;&lt;span style="color: #cccccc; font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 21px; line-height: 24.533334732055664px;"&gt;permission.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgF4K1BH1symgDx9d_22v8M1_8mVfRFW-5Xsb9L-LvPbExOpxR51YyR41Hy985SaMGP6edd93w6CTjC8o4d1hHmgv6prYbdjKy-IVp-VquHrKnpJpP1zuEcHwrqHaiNQne9G3IrSmYTUEw/s1600/jimcode.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;span style="color: #cccccc;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgF4K1BH1symgDx9d_22v8M1_8mVfRFW-5Xsb9L-LvPbExOpxR51YyR41Hy985SaMGP6edd93w6CTjC8o4d1hHmgv6prYbdjKy-IVp-VquHrKnpJpP1zuEcHwrqHaiNQne9G3IrSmYTUEw/s1600/jimcode.jpg" height="101" width="400" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: 10pt; line-height: 115%;"&gt;User permission for Jimm.&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class="MsoNormal"&gt;
&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 18.0pt;"&gt;
&lt;span style="color: #cccccc; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;"&gt;Once installed, "Jimm”
started to send a series of expensive SMS’s to premium numbers ($6 each).&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16pt; line-height: 115%;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="color: #cccccc; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16pt; line-height: 115%;"&gt;&lt;b&gt;Phishing Attack:-&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16pt; line-height: 115%;"&gt;Attackers are using
QR codes to redirect users to fake websites for phishing. A malicious QR code will redirect users to a fake bank website that will look exactly
like original bank website. Since most smartphone screens are small, a normal
user may not see the difference and will type in his or her information and
hand it to the attackers.&lt;/span&gt;&lt;span style="color: #cccccc; font-family: Arial, sans-serif; font-size: 16pt; line-height: 115%;"&gt;The frequency of these
attacks is not yet high, but it is definitely worth keeping an eye out.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin-bottom: 18.0pt;"&gt;
&lt;span style="color: #cccccc; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_C7KkIqUJ8lo4mLJ7iU_7rxjhGRFPWW-W3ukqwHOAmdGIRroqiciQXCLq6JH_SWIcFUT3TQemXZSyc3qewKSDDhM-QOfg7JNeGeDUgPpp_6FDxRztqRKZr4KxxEaL0h6qiloJBlGAQro/s1600/qr+code+for+fake+bank+site.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;span style="color: #cccccc;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_C7KkIqUJ8lo4mLJ7iU_7rxjhGRFPWW-W3ukqwHOAmdGIRroqiciQXCLq6JH_SWIcFUT3TQemXZSyc3qewKSDDhM-QOfg7JNeGeDUgPpp_6FDxRztqRKZr4KxxEaL0h6qiloJBlGAQro/s1600/qr+code+for+fake+bank+site.png" height="313" width="400" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: #cccccc;"&gt;&lt;b&gt;&lt;span style="font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 18.0pt; line-height: 115%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 18.0pt; line-height: 115%;"&gt;How
to protect yourself from malicious QR code?&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-indent: 0px;"&gt;
&lt;/div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;&lt;span style="color: #cccccc;"&gt;&lt;span style="font-family: Arial, sans-serif; font-size: 16pt; line-height: 115%; text-indent: -17.85pt;"&gt;Use
a QR code reader app that has built-in security features.&lt;/span&gt;&lt;span style="font-family: Arial, sans-serif; font-size: 16pt; line-height: 24.533334732055664px;"&gt;Just like getting an anti-virus program for your computers and laptops, there are many proactive software to help you protect your mobile device from such malicious QR code.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;&lt;span style="color: #cccccc; font-family: Arial, sans-serif; font-size: 16pt; line-height: 24.533334732055664px;"&gt;Norton Snap a QR code reader available for both Iphone and android scans a QR code and check the link, its content is shown to user before the link is visited so that the user can decide whether to continue loading the link or not.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;&lt;span style="color: #cccccc;"&gt;&lt;span style="font-family: Arial, sans-serif; font-size: 16pt; line-height: 115%; text-indent: -17.85pt;"&gt;Inspect
the QR code and make sure it's not a sticker.&lt;/span&gt;&lt;span style="font-family: Arial, sans-serif; font-size: 16pt; line-height: 115%; text-indent: -17.85pt;"&gt;While many QR code are found
on website, the majority of the code you will encounter will be in the real
world. You might have seen codes on stores displays, coffee shops or on any
posters, before you scan it feel it and make sure it's not a sticker that has
been placed over the real code.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;&lt;span style="color: #cccccc;"&gt;&lt;span style="font-family: Arial, sans-serif; font-size: 16pt; line-height: 115%; text-indent: -18pt;"&gt;Be Suspicious.&lt;/span&gt;&lt;span style="font-family: Arial, sans-serif; font-size: 16pt; line-height: 115%; text-indent: -18pt;"&gt;If the
QR code destination website asks for your personal information, don’t give it
unless you have some trustworthy way of verifying that the website is legitimate.
Still if you feel suspicious use your Common
Sense, don’t fill it out.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="MsoListParagraphCxSpLast"&gt;
&lt;span style="color: #cccccc; font-family: Arial, sans-serif; font-size: 16pt; line-height: 115%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&lt;span style="color: #cccccc; font-family: Arial, sans-serif; font-size: 18pt; line-height: 115%;"&gt;Conclusions&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;/div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;&lt;span style="color: #cccccc;"&gt;&lt;span style="font-family: Arial, sans-serif; font-size: 16pt; line-height: 115%; text-indent: -18pt;"&gt;The success
behind QR code usage is largely pinned on its sheer simplicity. Marketing
specialists love this technology so do&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: Arial, sans-serif; font-size: 21px; line-height: 24.533334732055664px; text-indent: -18pt;"&gt;cyber criminals&lt;/span&gt;&lt;span style="font-family: Arial, sans-serif; font-size: 16pt; line-height: 115%; text-indent: -18pt;"&gt;. Therefore,&amp;nbsp;be very
careful when pointing your smartphone’s camera at a QR code.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style="color: #cccccc;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class="MsoNormal"&gt;
&lt;/div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;&lt;span style="color: #cccccc; font-family: Arial, sans-serif; font-size: 16pt; line-height: 115%; text-indent: -18pt;"&gt;Only use QR
code reader software that allows the user to confirm the action to be taken
i.e. visit a website or if you do not know and trust the link, cancel the
action.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;KDJ3D3PS6M8V&lt;/div&gt;</description><link>http://hackurwayz.blogspot.com/2014/02/qr-codes-quick-response-or-quick-virus.html</link><author>noreply@blogger.com (Hack Your Ways)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhi5VBWvaOc_AGvavNvGxZeNjZcleQRPgIriEmggzLoHga3g59DiDktSAHNGLtHkfgMXqoZ4lp1dsB8wqTYkP6AneKsDmK0dfcIY-pd3rzFABubahTyeTOwJrWmKm_YgB1B8aKskPoZVbU/s72-c/hackur+ways+qrcode.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2594382695120847325.post-3740457938651570596</guid><pubDate>Sat, 08 Feb 2014 19:33:00 +0000</pubDate><atom:updated>2014-02-08T11:34:21.527-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">android</category><category domain="http://www.blogger.com/atom/ns#">Facebook</category><category domain="http://www.blogger.com/atom/ns#">Security News</category><title>Android Security Tool 'Conceal' by Facebook to encrypt data on disk. </title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwgbOuZFfT6Jbftfq1iF0H_U6QbX-Xxdz0hD9HTEaD8d7FcIfZJM5IpziW4POXH70nq4RE9cNQo3LBTgtW9UYcC9-yz7VkRLkDUyapwfZs7mrm_t-c6bDE2IvvtsIj_Kyf_RnfKf77CqE/s1600/Locked-Android-560x308.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwgbOuZFfT6Jbftfq1iF0H_U6QbX-Xxdz0hD9HTEaD8d7FcIfZJM5IpziW4POXH70nq4RE9cNQo3LBTgtW9UYcC9-yz7VkRLkDUyapwfZs7mrm_t-c6bDE2IvvtsIj_Kyf_RnfKf77CqE/s1600/Locked-Android-560x308.jpg" height="220" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;When you install an app on your phone, you don’t always install it on 
the phone itself. You often store new apps and data on the external SD Card, letting you add more storage 
space as needed.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class="main-article-info"&gt;&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Typically, an app that has permission to
 read and write data from an SD card has the permission to read all data
 on that card, including information written by other apps. This means 
that if you install a malicious application by mistake, it can easily 
steal any sensitive data from your phone's SD Card.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span class="main-article-info"&gt;Engineers at Facebook have developed a way of protecting its popular Android apps when they’re stored on SD cards, and they’re
 now sharing this security tool&amp;nbsp;&lt;/span&gt;called '&lt;b&gt;Conceal&lt;/b&gt;', that will allow app developers to encrypt data on disk
 in the most resource efficient way, with an easy-to-use programming 
interface.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Conceal, is a programming code library for safely encrypting and 
decrypting data stored on SD cards. The company is already using the 
tool with the primary Facebook app that runs on Android.According to Facebook software engineers the company 
started building the tool about six months ago, but it only recently 
decided to open source it.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;This tool is based on algorithms from&amp;nbsp;&lt;/span&gt;&lt;span style="color: blue; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;a href="http://www.openssl.org/"&gt;&lt;span style="color: blue;"&gt;OpenSSL&lt;/span&gt;&lt;/a&gt;,&lt;/span&gt;&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&amp;nbsp;a common open&amp;nbsp;source encryption system for the web, but it’s designed 
specifically for mobile phones running Android — including low-end 
phones. The whole library takes up only about 85KB of space. Conceal&amp;nbsp;is smaller and faster than existing Java crypto libraries, uses &lt;i&gt;AES-GCM&lt;/i&gt;,  an authenticated encryption algorithm that helps to detect any  potential tampering with data.The library also provides resources for 
storing and managing keys to protect against known weaknesses in the 
Android's random number generator. Conceal officially supports Android 
2.3 and higher (Gingerbread). It will run on 2.2 (Froyo) phones as well.&lt;/span&gt;&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;KDJ3D3PS6M8V&lt;/div&gt;</description><link>http://hackurwayz.blogspot.com/2014/02/android-security-tool-conceal-by.html</link><author>noreply@blogger.com (Hack Your Ways)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwgbOuZFfT6Jbftfq1iF0H_U6QbX-Xxdz0hD9HTEaD8d7FcIfZJM5IpziW4POXH70nq4RE9cNQo3LBTgtW9UYcC9-yz7VkRLkDUyapwfZs7mrm_t-c6bDE2IvvtsIj_Kyf_RnfKf77CqE/s72-c/Locked-Android-560x308.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2594382695120847325.post-4058512168186530269</guid><pubDate>Sat, 08 Feb 2014 13:15:00 +0000</pubDate><atom:updated>2014-02-08T05:46:43.863-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Information security events</category><title>Information Security Conferences 2014.</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4lg9hhb3960-iSN-taIbmZI4Dy8Iv4GfhEKsPUK7Q3VN3zpLpZ0NSB4X0DsNk45Ui-bTTeSn54VbwjHt_wTut9zoqhc7lXV-D_fKFUquesWYYl4hBoscBgw17eBDiAi9nG11RYzpQ9UY/s1600/upcoming+infosec+con+14.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4lg9hhb3960-iSN-taIbmZI4Dy8Iv4GfhEKsPUK7Q3VN3zpLpZ0NSB4X0DsNk45Ui-bTTeSn54VbwjHt_wTut9zoqhc7lXV-D_fKFUquesWYYl4hBoscBgw17eBDiAi9nG11RYzpQ9UY/s1600/upcoming+infosec+con+14.jpg" height="300" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilUbyKFKVWE2eMz1pT4_9OiJvBqEEeACuJlTrdIuYvAFSJEfK93tzfh-7pL6HQQ77EIBwiknT3mEzYui-F61mO_vf29RJtpCNc5yO4V585sDYE6VQGj8Qq9QOSRokiXSIpWLj4QX8RscA/s1600/feb.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;br /&gt;&lt;/a&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilUbyKFKVWE2eMz1pT4_9OiJvBqEEeACuJlTrdIuYvAFSJEfK93tzfh-7pL6HQQ77EIBwiknT3mEzYui-F61mO_vf29RJtpCNc5yO4V585sDYE6VQGj8Qq9QOSRokiXSIpWLj4QX8RscA/s1600/feb.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;br /&gt;&lt;/a&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilUbyKFKVWE2eMz1pT4_9OiJvBqEEeACuJlTrdIuYvAFSJEfK93tzfh-7pL6HQQ77EIBwiknT3mEzYui-F61mO_vf29RJtpCNc5yO4V585sDYE6VQGj8Qq9QOSRokiXSIpWLj4QX8RscA/s1600/feb.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilUbyKFKVWE2eMz1pT4_9OiJvBqEEeACuJlTrdIuYvAFSJEfK93tzfh-7pL6HQQ77EIBwiknT3mEzYui-F61mO_vf29RJtpCNc5yO4V585sDYE6VQGj8Qq9QOSRokiXSIpWLj4QX8RscA/s1600/feb.jpg" height="104" width="320" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: February 9 – 13, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Kaspersky’s SAS 2014.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Punta Cana, Dominican Republic.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://sas.kaspersky.com/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: February 12 – 14, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;nullcon Security Conference 2014.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Goa, India.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.nullcon.net/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: February 15, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;BSides Tampa, Florida.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Tampa, Florida, United States.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.securitybsides.com/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: February 17 – 18, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Code Blue.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Tokyo, Japan.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://codeblue.jp/en-index.html"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: February 17 – 20, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;12th USENIX Conference on File and Storage Technologies .&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Santa Clara, CA, United States.&lt;/span&gt;&lt;br /&gt;
&lt;a href="https://www.usenix.org/conference/fast14"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: February 23 – 26, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;NDSS Symposium 2014.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: San Diego, California, United States.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.internetsociety.org/ndss2014"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: February 23 – 26, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;2014 Network and Distributed System Security Symposium.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: San Diego, CA, United States.&lt;/span&gt;&lt;br /&gt;
&lt;a href="https://www.usenix.org/conferences/all"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: February 24 – 28, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;RSA Conference USA 2014.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Moscone Center, San Francisco, United States.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.rsaconference.com/events/us14"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: February 28, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;International Symposium on Engineering Secure Software and Systems .&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Munich, Germany.&lt;/span&gt;&lt;br /&gt;
&lt;a href="https://distrinet.cs.kuleuven.be/events/essos/2014/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlzFZLvNWPmKYkloZY9Gh67kLjgklBiqQNNlOMAjXcTc0pAGlLFwFp62TTmlca79Szb1AJQpo1NDDjst3OkzhB0dTvxjhfMO1KD9cbF0kuQX1qpDoa29jVrNyn4DlTUP86fHbtvlNr4f8/s1600/feb.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlzFZLvNWPmKYkloZY9Gh67kLjgklBiqQNNlOMAjXcTc0pAGlLFwFp62TTmlca79Szb1AJQpo1NDDjst3OkzhB0dTvxjhfMO1KD9cbF0kuQX1qpDoa29jVrNyn4DlTUP86fHbtvlNr4f8/s1600/feb.jpg" height="126" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a href="https://www.blogger.com/blogger.g?blogID=2594382695120847325" name="march14"&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br style="clear: left;" /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;
Date: March 1 – 2, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&lt;/span&gt;&amp;nbsp;&lt;strong&gt;The 10th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Salt Lake City, UT, United States.&lt;/span&gt;&lt;br /&gt;
&lt;a href="https://www.usenix.org/conferences/all"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: March 3 – 5, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;21st International Workshop on Fast Software Encryption (FSE 2014).&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: London, United Kingdom.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://fse2014.isg.rhul.ac.uk/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: March 3 – 7, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Financial Cryptography and Data Security 2014 .&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Accra Beach Hotel, Barbados.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://ifca.ai/fc14/index.html"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: March 6 – 8, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Rooted CON.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Hotel Auditorium de Madrid, Madrid, Spain.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.rootedcon.es/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: March 8, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;DEFCON Kerala (India).&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Kerala, India.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://defconkerala.com/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: March 12 – 14, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;CanSecWest 2014.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Sheraton Wall Centre Hotel, Vancouver, Canada.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://cansecwest.com/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: March 14, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Cyber Intelligence Asia 2014.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Singapore.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.intelligence-sec.com/events/cyber-intelligence-asia-2014"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: March 17 – 21, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&lt;/span&gt;&amp;nbsp;&lt;strong&gt;TROOPERS14.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Heidelberg Germany.&lt;/span&gt;&lt;br /&gt;
&lt;a href="https://www.troopers.de/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: March 18, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;The International Conference on Computer Security and Digital Investigation (ComSec2014).&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Kuala Lumpur, Malaysia.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://sdiwc.net/conferences/2014/comsec2014/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: March 20, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&lt;/span&gt;&amp;nbsp;&lt;strong&gt;Suits and Spooks.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Singapore.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.suitsandspooks.com/2014/03/suits-and-spooks-singapore/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: March 20 – 21, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Security B-Sides Austin.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: WinGate Williamson Conference Center Round Rock, Austin, Texas, USA.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.securitybsides.com/w/page/70906892/BSidesAustin2014"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: March 24 – 25, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;9th International Conference on Cyber Warfare and Security ICCWS-2014.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Purdue University, West Lafayette, Indiana, USA.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://academic-conferences.org/iciw/iciw2014/iciw14-home.htm"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: March 26 – 28, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC).&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Buenos Aires, Argentina.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.iacr.org/workshops/pkc2014/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: March 25 – 28, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Black Hat | Asia.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Singapore.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.blackhat.com/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: March 31 – April 2, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Ignite 2014.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: The Cosmopolitan, Las Vegas, USA.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://go.paloaltonetworks.com/igniteconference"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: March 31 – April 4, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;The Symposium on Security for Asia Network (SyScan).&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Swissotel, Merchant Court, Singapore.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.syscan.org/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXKtf8cIAxg70gtDUaOqU-75e5Ksw2Oyv4ifREt4sSgSSKtknHYB7a0fXmXBYGhrR06vA-PtzWMOUeVFR0ALAFhktf7BEGhkNbj2HfRyGpp2W_FDUsM0xqYJuhN8wgJNwBASTkCGpQzsg/s1600/feb.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXKtf8cIAxg70gtDUaOqU-75e5Ksw2Oyv4ifREt4sSgSSKtknHYB7a0fXmXBYGhrR06vA-PtzWMOUeVFR0ALAFhktf7BEGhkNbj2HfRyGpp2W_FDUsM0xqYJuhN8wgJNwBASTkCGpQzsg/s1600/feb.jpg" height="126" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a href="https://www.blogger.com/blogger.g?blogID=2594382695120847325" name="april14"&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br style="clear: left;" /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;
Date: April 1 – 3, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;13th European Security Conference &amp;amp; Exhibition .&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: The Hague, Netherlands.&lt;/span&gt;&lt;br /&gt;
&lt;a href="https://www.asisonline.org/Education-Events/Global-Conferences/2014-European-Security-Conference-and-Exhibition/Pages/default.aspx"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: April 2 – 4, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;11th USENIX Symposium on Networked Systems Design and Implementation.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Seattle, WA, United States.&lt;/span&gt;&lt;br /&gt;
&lt;a href="https://www.usenix.org/conference/nsdi14h/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: April 5 – 6, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;BSides Orlando, Florida.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Orlando, Florida, United States.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://bsidesorlando.org/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: April 5 – 6, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;BSides Puerto Rico.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Puerto Rico.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.securitybsides.com/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: April 7 – 9, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;InfoSec World.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Disney Contemporary Resort, Orlando, Florida, United States.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.infosec-world.com/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: April 8 – 10, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;SOURCE Boston.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Marriott Tremont, Boston, United States.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.sourceconference.com/boston/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: April 10 – 13, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;notacon.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Cleveland, Ohio, United States.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.notacon.org/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: April 11 – 12, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;1st National Women in Cybersecurity Conference.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Nashville, TN, United States.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.csc.tntech.edu/wicys/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: April 14 – 17, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;International Conference on Cyber-Physical Systems.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Berlin, Germany.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://iccps.acm.org/2014/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: April 15 – 18, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;2014 World Conference on Information Systems and Technologies (WorldCIST 14).&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Madeira, Portugal.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.aisti.eu/worldcist14/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: April 17, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Suits and Spooks.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: San Francisco, USA.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.suitsandspooks.com/2014/04/suits-and-spooks-san-francisco/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: April 25, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;THOTCON 0×5.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Chicago, United States.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://thotcon.org/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: April 27 – May 2, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;The United States Cyber Crime Conference.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: National Conference Center, DC Metro Area, USA.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.usacybercrime.com/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: April 28 – 30, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;2014 National Cyber Crime Conference.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Four Points Sheraton, Norwood, United States.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.mass.gov/ago/bureaus/criminal/the-cyber-crime-division/national-cyber-crime-conference.html"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: April 29- – May 1, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;The Third International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec2014).&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Faculty of Engineering – Lebanese University, Campus of Hadath, Beirut – Lebanon.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://sdiwc.net/conferences/2014/cybersec2014/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: April 30, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong style="color: #cccccc;"&gt; &lt;/strong&gt;&lt;strong&gt;Houston CISO Executive Summit.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: The Westin Houston, Memorial City, Houston, USA.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.evanta.com/ciso/summits/houston/governing-body"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_2kBpF7z5MjoOuiqRPaxnuA8bu5-gdGfSzf0aAyfhHzgr1YqLAX8nc5fxOsq8_HgyBMu8e7lafA7F0I_MofebQBK9nI9q4twp13YxA_0M-8BrF1hyphenhyphentWLnLaBBbUer11Wnmta7qk3XXZU/s1600/feb.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_2kBpF7z5MjoOuiqRPaxnuA8bu5-gdGfSzf0aAyfhHzgr1YqLAX8nc5fxOsq8_HgyBMu8e7lafA7F0I_MofebQBK9nI9q4twp13YxA_0M-8BrF1hyphenhyphentWLnLaBBbUer11Wnmta7qk3XXZU/s1600/feb.jpg" height="126" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a href="https://www.blogger.com/blogger.g?blogID=2594382695120847325" name="may14"&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br style="clear: left;" /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;
Date: May 6, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Western Canada Information Security Conference.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Winnipeg, Manitoba, Canada.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://wcisc.ca/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: May 9 – 10, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;BSides Boston, MA.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Boston, MA, United States.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.securitybsides.com/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: May 11 – 15, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Eurocrypt.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Copenhagen, Denmark.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://ec14.compute.dtu.dk/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: May 12 – 14, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Information Security Practice &amp;amp; Experience Conference.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Fuzhou, China.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://icsd.i2r.a-star.edu.sg/ispec2014"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: May 12 – 16, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;AusCERT2014 (13th annual AusCERT Information Security Conference).&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Royal Pines Resort, Queensland Gold Coast, Australia.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://conference.auscert.org.au/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: May 14, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;35th IEEE Symposium on Security and Privacy.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: San Jose, CA, United States.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.ieee-security.org/TC/SP2014/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: May 14 – 17, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;2014 Honeynet Project Workshop.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Warsaw, Poland.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://warsaw2014.honeynet.org/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: May 15 – 16, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Infiltrate 2014.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Miami, United States.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.immunityinc.com/infiltrate/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: May 16 – 18, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;CarolinaCon 10.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: North Carolina, United States.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.carolinacon.org/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: May 17, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;BSides Nashville.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Nashville, TN, USA.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.securitybsides.com/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: May 19, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;National Homeland Security Conference.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Philadelphia, USA.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://nationaluasi.com/dru/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: May 27 – 30, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Hack in the Box (HITB) Security Conference.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Amsterdam, Netherlands.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://conference.hitb.org/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0JyIcE7LZBcZwtdHPdvFGaAqLVDuan3zaIN0YSxjhaw5tIO9-GVzYZUxz3UcGU-euAyy3FKHY32o1jcQOh-0WmoBtDVDNyYuy2uo11-dlz4pFPr-zve1kaMW29RtaViTczwraWxbGXdI/s1600/feb.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0JyIcE7LZBcZwtdHPdvFGaAqLVDuan3zaIN0YSxjhaw5tIO9-GVzYZUxz3UcGU-euAyy3FKHY32o1jcQOh-0WmoBtDVDNyYuy2uo11-dlz4pFPr-zve1kaMW29RtaViTczwraWxbGXdI/s1600/feb.jpg" height="126" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a href="https://www.blogger.com/blogger.g?blogID=2594382695120847325" name="june14"&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br style="clear: left;" /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;
Date: June, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Shakacon Security Conference 2014.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Honolulu, Hawaii.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.shakacon.org/index.html"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: June 1 – 4, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Sixteenth Annual International Techno Security Conference.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Myrtle Beach Marriott Resort, South Carolina, USA.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.techsec.com/html/Security%20Conference%202014.html"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: June 2 – 3, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:- &lt;/span&gt;&lt;b&gt;A&lt;/b&gt;&lt;strong&gt;rea41 Security Conference.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Zurich, Switzerland.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://area41.io/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: June 4 – 7, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;IEEE Cyber 2014.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Hong Kong, China.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.ieee-cyber.org/2014/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: June 13 – 15, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;CircleCityCon.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Hyatt Regency Indianapolis, USA.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://circlecitycon.com/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: June 17 – 18, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;SC Congress Toronto.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Metro Convention Center, Toronto, Canada.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://congress.scmagazine.com/page.cfm/link=10"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: June 23 – 26, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Security &amp;amp; Risk Management Summit.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: National Harbor, MD (Washington, D.C. area).&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.gartner.com/technology/summits/na/security/index.jsp"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: June 23 – 26, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;OWASP AppSec Europe.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Cambridge, United Kingdom.&lt;/span&gt;&lt;br /&gt;
&lt;a href="https://2014.appsec.eu/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAKLyXseRQ9igZySTswZh_D8fgj3WfjeuKn1QE-hjjzGn0VX2YjOeDGkWiK76udU9hI5EG_rtBMr3CVsmMbfCseDzYmwHF6MgHY4fkAiOhlWjm9ZHUGO7cbIAekMAonqBk3KCckYP4teA/s1600/feb.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAKLyXseRQ9igZySTswZh_D8fgj3WfjeuKn1QE-hjjzGn0VX2YjOeDGkWiK76udU9hI5EG_rtBMr3CVsmMbfCseDzYmwHF6MgHY4fkAiOhlWjm9ZHUGO7cbIAekMAonqBk3KCckYP4teA/s1600/feb.jpg" height="126" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a href="https://www.blogger.com/blogger.g?blogID=2594382695120847325" name="july14"&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br style="clear: left;" /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;
Date: July 3 – 4, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;13th European Conference on Cyber Warfare and Security ECCWS-2014.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Piraeus, Greece.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://academic-conferences.org/eccws/eccws2014/eccws14-home.htm"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: July 12 – 24, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;PST2014 International Conference on Privacy, Security and Trust (PST).&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Toronto, Canada.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://pst2014.ryerson.ca/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: July 22 – 23, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;RSA Conference Asia Pacific &amp;amp; Japan.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Marina Bay Sands, Singapore.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.rsaconference.com/events/ap14"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: July 18 – 20, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Hope X.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Hotel Pennsylvania, New York City, United States.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://x.hope.net/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPK1m6cxOcXni4zFWmdPqEfIZvlXJ4Lfw4VuqmrviCQIwBihVzoxBJFo53Rsxne097wdDhgUBsRnBd7clWzlRXptMCHmZUkpF3yWhjH9-Orv_gVWI4MXdtqSWBApg9gcvG0b9_5MbeZj8/s1600/feb.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPK1m6cxOcXni4zFWmdPqEfIZvlXJ4Lfw4VuqmrviCQIwBihVzoxBJFo53Rsxne097wdDhgUBsRnBd7clWzlRXptMCHmZUkpF3yWhjH9-Orv_gVWI4MXdtqSWBApg9gcvG0b9_5MbeZj8/s1600/feb.jpg" height="119" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a href="https://www.blogger.com/blogger.g?blogID=2594382695120847325" name="aug14"&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br style="clear: left;" /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;
Date: August 2 – 7, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Black Hat | USA.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Las Vegas, Nevada, United States.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.blackhat.com/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: August 5 – 6, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;BSides Las Vegas, United States.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Las Vegas, Nevada, United States.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.securitybsides.com/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: August 7 – 10, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;DEF CON 22.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Rio Hotel and Casino, Las Vegas, United States.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.defcon.org/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: August 17 – 21, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;CRYPTO 2014 (34rd International Cryptology Conference).&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: University of California, Santa Barbara (UCSB), CA, United States.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.iacr.org/conferences/crypto2014/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: August 20 – 22, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;23rd USENIX Security Symposium.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: San Diego, CA, United States.&lt;/span&gt;&lt;br /&gt;
&lt;a href="https://www.usenix.org/conferences/all"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJzjlg0APuGG1OWZswtj2fCQIlFF_7HUrpZn5Lpi190Z_WZnyrr79hH_RLJWYlqSWJZxstFCO2LOmKldhytwpgbl8A4Y9MuK7vwaTRSXIYvqQQhqjkwRlSrLdt23qhZC3LEeyISieAH14/s1600/feb.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJzjlg0APuGG1OWZswtj2fCQIlFF_7HUrpZn5Lpi190Z_WZnyrr79hH_RLJWYlqSWJZxstFCO2LOmKldhytwpgbl8A4Y9MuK7vwaTRSXIYvqQQhqjkwRlSrLdt23qhZC3LEeyISieAH14/s1600/feb.jpg" height="85" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a href="https://www.blogger.com/blogger.g?blogID=2594382695120847325" name="sep14"&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br style="clear: left;" /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;
Date: September 3 – 5, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;9th Conference on Security and Cryptography for Networks.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Amalfi, Italy.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://scn.dia.unisa.it/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: September 17 – 19, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;(LATINCRYPT) Third International Conference on Cryptology and Information Security in Latin America.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Resort Costao do Santinho, Brazil.&lt;/span&gt;&lt;br /&gt;
&lt;a href="https://sites.google.com/site/latincrypt2014/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: September 23 – 26, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;CHES 2014 (Cryptographic Hardware and Embedded Systems).&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Busan, Korea.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.chesworkshop.org/ches2014/start.php"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: September 23 – 27, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;BruCON Training and Conference 2014.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Gent, Beligium.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://2014.brucon.org/index.php/Main_Page"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: September 24 – 26, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Beijing, China.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.greenorbs.org/TrustCom2014/index.htm"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: September 24 – 26, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;VB2014 – 24th Virus Bulletin International Conference.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Seattle, WA, USA.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.virusbtn.com/conference/vb2014/index"&gt;&lt;span style="color: blue;"&gt;Link to the event
&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6Lgi7e5V2dKUWPzE2h5Jeh1uegKR-BKYKH9lGgpeULddp5DTPokXv8fJEWLi6x_Y6rNMqbfEFG8F4loaOU9GL0tkjYioWgdX6MQN1wFsy4_m9jTWb5f6jTpXQWF3j4ACk2Pgn3wrsSq8/s1600/feb.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6Lgi7e5V2dKUWPzE2h5Jeh1uegKR-BKYKH9lGgpeULddp5DTPokXv8fJEWLi6x_Y6rNMqbfEFG8F4loaOU9GL0tkjYioWgdX6MQN1wFsy4_m9jTWb5f6jTpXQWF3j4ACk2Pgn3wrsSq8/s1600/feb.jpg" height="108" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a href="https://www.blogger.com/blogger.g?blogID=2594382695120847325" name="oct14"&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br style="clear: left;" /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;
Date: October 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Toorcon 2014.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: San Diego, CA, United States.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://toorcon.net/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #cccccc; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Date: October 14 – 17, 2014.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Black Hat Europe.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Amsterdam, Netherlands.&lt;/span&gt;&lt;br /&gt;
&lt;a href="https://www.blackhat.com/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: October 20 – 22, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;b&gt;SecTor (Security Training and Conference).&lt;/b&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Toronto, ON, Canada.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://sector.ca/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: October 21 – 24, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;LASCON 2014.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Austin, TX.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://lascon.org/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhF3UF6Cq5nLhZ0DyicVkY5Hfdujkjl-w4XQHI2K287HUoXz99FgnmLBCtHXmyDYavc4d6ZHYaY6qLjeM45tuj4kPh2cB1pQdAZHw78ZhIUYRc0j9vEU7HQC4D3eDdTVrReCu3MoqCVCDg/s1600/feb.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhF3UF6Cq5nLhZ0DyicVkY5Hfdujkjl-w4XQHI2K287HUoXz99FgnmLBCtHXmyDYavc4d6ZHYaY6qLjeM45tuj4kPh2cB1pQdAZHw78ZhIUYRc0j9vEU7HQC4D3eDdTVrReCu3MoqCVCDg/s1600/feb.jpg" height="93" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a href="https://www.blogger.com/blogger.g?blogID=2594382695120847325" name="nov14"&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br style="clear: left;" /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;
Date: November 9 – 14, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;28th Large Installation System&lt;/strong&gt;&lt;strong&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Administration Conference.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Seattle, WA, United States.&lt;/span&gt;&lt;br /&gt;
&lt;a href="https://www.usenix.org/conferences/all"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;Date: November 19 – 21, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&lt;/span&gt;&lt;strong&gt;ISACA North America ISRM Conference.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Las Vegas, NV, USA.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.isaca.org/Education/Conferences/Pages/North-America-ISRM-2014.aspx"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8agkYiv_gNyrBA-goC3OidHBtH0NlgV5dukooJYRy4BO_Estk1YFeQzmiIUjoZN-JUd__Mips9ouubiK-WstZubelp9iJiBrR-B_zBrkLCgS9wxB-BtzaNYOsz8u65uRRcvIoVoZwJr8/s1600/feb.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8agkYiv_gNyrBA-goC3OidHBtH0NlgV5dukooJYRy4BO_Estk1YFeQzmiIUjoZN-JUd__Mips9ouubiK-WstZubelp9iJiBrR-B_zBrkLCgS9wxB-BtzaNYOsz8u65uRRcvIoVoZwJr8/s1600/feb.jpg" height="93" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a href="https://www.blogger.com/blogger.g?blogID=2594382695120847325" name="dec14"&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br style="clear: left;" /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span style="color: #cccccc;"&gt;
Date: December 27 – 30, 2014.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Conference Title:-&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Chaos Communication Congress.&lt;/strong&gt;&lt;br /&gt;&lt;span style="color: #cccccc;"&gt;
Where: Hamburg, Germany.&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://ccc.de/"&gt;&lt;span style="color: blue;"&gt;Link to the event&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;KDJ3D3PS6M8V&lt;/div&gt;</description><link>http://hackurwayz.blogspot.com/2014/02/information-security-conferences-of-2014.html</link><author>noreply@blogger.com (Hack Your Ways)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4lg9hhb3960-iSN-taIbmZI4Dy8Iv4GfhEKsPUK7Q3VN3zpLpZ0NSB4X0DsNk45Ui-bTTeSn54VbwjHt_wTut9zoqhc7lXV-D_fKFUquesWYYl4hBoscBgw17eBDiAi9nG11RYzpQ9UY/s72-c/upcoming+infosec+con+14.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2594382695120847325.post-4883768261315409851</guid><pubDate>Wed, 01 Jan 2014 18:19:00 +0000</pubDate><atom:updated>2014-01-01T10:19:42.525-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">malware</category><category domain="http://www.blogger.com/atom/ns#">Security News</category><category domain="http://www.blogger.com/atom/ns#">Security News.</category><category domain="http://www.blogger.com/atom/ns#">vulnerability</category><title>Your laptop Camera could spy on you without lighting up the warning light.</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBAml2rh3MF3PSfbYDMzUSfW_3bG0Doz06nFQh2gmeXu36bMVXtEKn6hgNvWJ1JfI_QIV8WX6EXwqI6MSj2w9SunblYWt1eWgjE83Kqikr6bmu7NPUtXKo40HAxp6-JRNW5Xiy_XCYbkw/s1600/2233416364_d1e23c11b8_z.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBAml2rh3MF3PSfbYDMzUSfW_3bG0Doz06nFQh2gmeXu36bMVXtEKn6hgNvWJ1JfI_QIV8WX6EXwqI6MSj2w9SunblYWt1eWgjE83Kqikr6bmu7NPUtXKo40HAxp6-JRNW5Xiy_XCYbkw/s1600/2233416364_d1e23c11b8_z.jpg" height="183" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;If you own a MacBook or any other laptop, you should cover up it's webcam, because there’s a possibility someone could be watching you.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Most of the webcam&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;have a tiny light lets you know that the webcam is active, but it's possible for malware to disable this important privacy&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;feature.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Two Students from Johns Hopkins University &amp;nbsp;Matthew Brocker and Stephen Checkoway created a proof of concept app called “iSeeYou” that confirmed that&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;MacBook iSight webcams can spy on their users without the warning light being activated.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;A young man recently pleaded guilty in court to extortion after he performed a remote hack on Miss Teen USA’s webcam to secretly collect&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;nude photos. It was revealed through court papers that the FBI has the ability to do the same thing with a variety of current laptops including Apple products.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Your laptop camera could Spy on You without lighting up &lt;/span&gt;&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;the warning light and The software used to remotely control it is a Remote Administration Tool (RAT),&lt;/span&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;which is used by IT departments and educational institutions to administer large numbers of computers. This type of hack doesn't require the hacker to have physical&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;possession of the laptop nor does it require administrator privileges.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Are you sure that your laptop’s camera is not turned on.?&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;So the next time you sit in front of your laptop do think on it.&lt;/span&gt;&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;KDJ3D3PS6M8V&lt;/div&gt;</description><link>http://hackurwayz.blogspot.com/2014/01/your-laptop-camera-could-spy-on-you.html</link><author>noreply@blogger.com (Hack Your Ways)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBAml2rh3MF3PSfbYDMzUSfW_3bG0Doz06nFQh2gmeXu36bMVXtEKn6hgNvWJ1JfI_QIV8WX6EXwqI6MSj2w9SunblYWt1eWgjE83Kqikr6bmu7NPUtXKo40HAxp6-JRNW5Xiy_XCYbkw/s72-c/2233416364_d1e23c11b8_z.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2594382695120847325.post-5593520228884121622</guid><pubDate>Wed, 01 Jan 2014 16:55:00 +0000</pubDate><atom:updated>2014-01-01T08:55:06.552-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">android</category><title> Rogue Gaming app that steals WhatsApp conversations.</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbdY72i0GUHksarbqkaNLRrA1KE2_xplh6Ha0vWj1AGxcWaMJVSe1PvLWtjoRX-lgRelRSlTnPJROxS6DwGG2pyQDB_Pr6gQdDqVr9OkCK90mOXHU2zAUwQrFS_aPTTBVj9Pi6gyXM-bw/s1600/Whatsapp.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbdY72i0GUHksarbqkaNLRrA1KE2_xplh6Ha0vWj1AGxcWaMJVSe1PvLWtjoRX-lgRelRSlTnPJROxS6DwGG2pyQDB_Pr6gQdDqVr9OkCK90mOXHU2zAUwQrFS_aPTTBVj9Pi6gyXM-bw/s1600/Whatsapp.jpg" height="201" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Many of my friends ask me if it is possible to steal WhatsApp chat messages and how, of course a malware are an excellent answer to it.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Spreading the malware through an official channel the attacker could improve the efficiency of the attack,and it is exactly what is happening,an Android game that was published on the official Google Play store to stealthy steal users WhatsApp conversation databases and resell the collection of messages,images,video etc on an internet website.The game “Balloon Pop 2” has been identified and removed from Google Play store,it was able to spy on conversations made via WhatsApp and upload them to the WhatsAppCopy&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;website.On the website the Android game BalloonPop 2 is advertised as a way of backing up any device’s WhatsApp conversation.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;The website managers sustain that their app is a legitimate game that could be used to back up&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;WhatsApp messages and they aren't responsible for its abuse for spying purposes.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;The attacker paying a fee could view the stolen WhatsApp conversations from the website but it is necessary to provide the phone number&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;of the targeted Android device to read the messages exchanged by the victims.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Despite of being immediately removed from the Google Play &lt;/span&gt;&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;store there is risk that people with ill-intention will continue to distribute it through unofficial channels.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;The risk is on a higher side as people are less concerned about the security of their smartphones than their computing devices.And lack of defense mechanisms on almost every device make them a privileged target,the number of malicious code designed for Android and iOS will literally explode in coming days.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;There are many unidentified rogue app on play store still to be discovered and the fact that an app published on official store isn't sufficient to consider it reliable and secure,&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;same consideration is valid for other mobile platforms.&lt;/span&gt;&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;KDJ3D3PS6M8V&lt;/div&gt;</description><link>http://hackurwayz.blogspot.com/2014/01/rogue-gaming-app-that-steals-whatsapp.html</link><author>noreply@blogger.com (Hack Your Ways)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbdY72i0GUHksarbqkaNLRrA1KE2_xplh6Ha0vWj1AGxcWaMJVSe1PvLWtjoRX-lgRelRSlTnPJROxS6DwGG2pyQDB_Pr6gQdDqVr9OkCK90mOXHU2zAUwQrFS_aPTTBVj9Pi6gyXM-bw/s72-c/Whatsapp.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2594382695120847325.post-441834061893895720</guid><pubDate>Sat, 20 Jul 2013 12:19:00 +0000</pubDate><atom:updated>2013-07-20T05:26:07.831-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Encryption</category><category domain="http://www.blogger.com/atom/ns#">Security News</category><title>Google tests NSA proof encryption to protect its users data on Google Drive.</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwuRuRwqaPXocAA4mrNg8b6rfMhUG9gVt0J80yxBl4fsw3OY1YM-sXFQQvwBIC6ciyFyGbN8cJUbnhf_8j6UY2OxVD4JUF1Mp1Vk3iXDHjoT8JoQr5etd6jR-DeuaKysdTohVXTzN7yR4/s1600/jewel.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwuRuRwqaPXocAA4mrNg8b6rfMhUG9gVt0J80yxBl4fsw3OY1YM-sXFQQvwBIC6ciyFyGbN8cJUbnhf_8j6UY2OxVD4JUF1Mp1Vk3iXDHjoT8JoQr5etd6jR-DeuaKysdTohVXTzN7yR4/s1600/jewel.png" height="234" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Google is exploring ways to encrypt files stored in Google Drive to prevent the the U.S. government and&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;other authorities from demanding access to user data, according to a CNET report.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Encryption has been a popular word since former NSA contractor Edward Snowden leaked documents revealing an NSA program called PRISM that collects user data from major Internet companies, including Google.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Many companies use SSL and HTTPS to securely transmit data from a users computer to the destination servers.This protects the data from anyone listening in on the transmission, a procedure called a man-in-the-middle attack.Currently, when you upload or download something from Google Drive the transmission is in encrypted form,but Google is storing that data in an unencrypted manner.&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;According to CNET's report, Google is experimenting with &lt;/span&gt;&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;ways to encrypt the files while they are stored, as well.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;"Mechanisms like this could give people more confidence and allow them to start backing up potentially their whole device," Seth Schoen, senior staff technologist at the Electronic Frontier Foundation in San Francisco, told CNET.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;If Google encrypts this data and doesn’t provide the NSA with the key, then the information the NSA collects would be useless.&lt;/span&gt;&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;KDJ3D3PS6M8V&lt;/div&gt;</description><link>http://hackurwayz.blogspot.com/2013/07/google-tests-nsa-proof-encryption-to.html</link><author>noreply@blogger.com (Hack Your Ways)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwuRuRwqaPXocAA4mrNg8b6rfMhUG9gVt0J80yxBl4fsw3OY1YM-sXFQQvwBIC6ciyFyGbN8cJUbnhf_8j6UY2OxVD4JUF1Mp1Vk3iXDHjoT8JoQr5etd6jR-DeuaKysdTohVXTzN7yR4/s72-c/jewel.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2594382695120847325.post-5255157051098144798</guid><pubDate>Sat, 20 Jul 2013 09:38:00 +0000</pubDate><atom:updated>2013-07-20T02:58:09.145-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hackers News</category><category domain="http://www.blogger.com/atom/ns#">news</category><category domain="http://www.blogger.com/atom/ns#">Security News</category><category domain="http://www.blogger.com/atom/ns#">Security News.</category><title>World's largest collaborative phone directory compromised.</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9Msi_BKT5nPB8oaAR6ZFMVV4eB-OiSBlcohKjnSmU5mbzitNPC1x8ONuoA6JeV0K7G3q7H1QQ-KGB4sWTyqHN141donFeL01zCrkktv5elbNElnrRpTu-Xq-ZlmvQuKRdofBhUEHDTN8/s1600/Syrian-Electronic-Army-Hacks-Global-Phone-Directory-Truecaller.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9Msi_BKT5nPB8oaAR6ZFMVV4eB-OiSBlcohKjnSmU5mbzitNPC1x8ONuoA6JeV0K7G3q7H1QQ-KGB4sWTyqHN141donFeL01zCrkktv5elbNElnrRpTu-Xq-ZlmvQuKRdofBhUEHDTN8/s1600/Syrian-Electronic-Army-Hacks-Global-Phone-Directory-Truecaller.png" height="174" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;True Caller,a popular app built by a Swedish company and world's largest collaborative phone directory compromised by Syrian Electronic Army.The hacker group claimed on its Twitter accounts and its website,that it has managed to get access into the databases containing a hundred of millions of phone numbers and its owners in addition of millions of Facebook/Twitter/Linkedin/Gmail accounts.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Syrian Electronic Army have also posted screenshots of the website's WordPress dashboard and database.&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhomHzppw2a9va0OGwx_NskvsgHH2HJj6ilrziYuoiNzjUWmZWY8eq5Xvx8u8gbLj1D3kpK-aHRIB4PhRj5taYn-sPQMuYcE_ZYNGtJtxnOL4WUs-Wcy0cSMUUM-jntG6vN86vCIWyuMrE/s1600/truecaller.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhomHzppw2a9va0OGwx_NskvsgHH2HJj6ilrziYuoiNzjUWmZWY8eq5Xvx8u8gbLj1D3kpK-aHRIB4PhRj5taYn-sPQMuYcE_ZYNGtJtxnOL4WUs-Wcy0cSMUUM-jntG6vN86vCIWyuMrE/s1600/truecaller.jpg" height="180" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;According to the hackers about 560 GB of data was downloaded from Truecaller servers.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;In another tweet they have also leaked the login credentials for the site's database.&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhY5RsOIXmdC22fGVZr_UwdKiztUGt0Iko_BBsZCGyWUgoKnfZcBI1SDaodi2qG73Vlt2P5XJd1vKbLpsE-lNpfM44bsAigfixqJY1NAUzvmIs_avBFHVAmSqHVZMD5StAmV2xA4hwrwQ/s1600/truecaller_hacked.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhY5RsOIXmdC22fGVZr_UwdKiztUGt0Iko_BBsZCGyWUgoKnfZcBI1SDaodi2qG73Vlt2P5XJd1vKbLpsE-lNpfM44bsAigfixqJY1NAUzvmIs_avBFHVAmSqHVZMD5StAmV2xA4hwrwQ/s1600/truecaller_hacked.png" height="153" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;TrueCaller confirmed the security breach in their&amp;nbsp;official&amp;nbsp;blog. However, they denied the hacker's claim that they had access to the social network's access codes.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;KDJ3D3PS6M8V&lt;/div&gt;</description><link>http://hackurwayz.blogspot.com/2013/07/worlds-largest-collaborative-phone.html</link><author>noreply@blogger.com (Hack Your Ways)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9Msi_BKT5nPB8oaAR6ZFMVV4eB-OiSBlcohKjnSmU5mbzitNPC1x8ONuoA6JeV0K7G3q7H1QQ-KGB4sWTyqHN141donFeL01zCrkktv5elbNElnrRpTu-Xq-ZlmvQuKRdofBhUEHDTN8/s72-c/Syrian-Electronic-Army-Hacks-Global-Phone-Directory-Truecaller.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2594382695120847325.post-8595493728774659388</guid><pubDate>Thu, 30 May 2013 19:24:00 +0000</pubDate><atom:updated>2013-05-30T12:24:30.587-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Security News</category><category domain="http://www.blogger.com/atom/ns#">Security News.</category><category domain="http://www.blogger.com/atom/ns#">vulnerability</category><title>PayPal denies to pay Bug Bounty reward to teenager.</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiva98fAs_EP099QdiamDEg2YlI49Jdr59cVHstIIc7HgFPZihZGUJJr29ZTItP7VGIKqO1X7GkQUzxfBwKCluBu_0DwKmWraZyaHKM0D584VUnL7ck_iXMXO3YsxV_UZ2-KcYbPrYTUcw/s1600/paypal-security.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiva98fAs_EP099QdiamDEg2YlI49Jdr59cVHstIIc7HgFPZihZGUJJr29ZTItP7VGIKqO1X7GkQUzxfBwKCluBu_0DwKmWraZyaHKM0D584VUnL7ck_iXMXO3YsxV_UZ2-KcYbPrYTUcw/s1600/paypal-security.jpg" height="210" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;span itemprop="articleBody description text"&gt;
A 17-year-old German student contends PayPal has denied him a reward for finding a vulnerability in its website.&lt;/span&gt;&lt;span itemprop="articleBody description text"&gt;Robert Kugler said he notified PayPal of the vulnerability on May 19. He
 said he was informed by email that because he is under 18 years old, he
 did not qualify for its Bug Bounty Program.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Many companies such as Google and Facebook have reward programs. The 
programs are intended to create an incentive for website users to report
 problems and create fixes before hackers can take advantage.&lt;/span&gt;&lt;br /&gt;

&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Google pays from $100 up to $20,000 depending on the severity of the 
issue and Facebook pays a minimum of $500 for qualifying bugs. Neither 
company has age restrictions listed on their websites.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Robert Kugler is a German student who has found bugs for companies like Microsoft and Mozilla in the past. His work on uncovering problems in Mozilla’s Firefox browser has earned him about $4,500 over the past two years.On PayPal’s website, the company lists the terms for rewarding people who find bugs, but mentions nothing about the age of the discoverer. One of the stipulations for PayPal’s program is that the finder have a PayPal account that money can be transferred in to.&lt;/span&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="post-footer"&gt;
&lt;div class="OUTBRAIN" data-dynload="" data-ob-mark="true" data-src="thn" id="outbrain_widget_0" obdone="true" style="font-family: Arial, Tahoma, sans-serif; font-size: 13px; line-height: 16px;"&gt;
&lt;div class="ob_brnStrip_container NA"&gt;
&lt;span class="ob_empty"&gt;&lt;wbr&gt;&lt;/wbr&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;KDJ3D3PS6M8V&lt;/div&gt;</description><link>http://hackurwayz.blogspot.com/2013/05/paypal-denies-to-pay-bug-bounty-reward.html</link><author>noreply@blogger.com (Hack Your Ways)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiva98fAs_EP099QdiamDEg2YlI49Jdr59cVHstIIc7HgFPZihZGUJJr29ZTItP7VGIKqO1X7GkQUzxfBwKCluBu_0DwKmWraZyaHKM0D584VUnL7ck_iXMXO3YsxV_UZ2-KcYbPrYTUcw/s72-c/paypal-security.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2594382695120847325.post-5320128242389297415</guid><pubDate>Thu, 30 May 2013 18:17:00 +0000</pubDate><atom:updated>2013-05-30T11:17:48.521-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hackers News</category><category domain="http://www.blogger.com/atom/ns#">news</category><category domain="http://www.blogger.com/atom/ns#">Security News</category><category domain="http://www.blogger.com/atom/ns#">Security News.</category><title>Australia's top spy agency headquarters blueprints stolen by Chinese hackers.</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_ybMXzmEsZantzNjnb6E7rSx7yloHtmxHVgDHbRyjEpBHL9fTPfkMHT4bw0PUutaZcOyWQ1LNzyfKRTJ67SyauHxnAQ5QjtptDcT55CjP4gtibLg_8PzUss49xmPZToI2ixWT18UCVxo/s1600/asiohq.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_ybMXzmEsZantzNjnb6E7rSx7yloHtmxHVgDHbRyjEpBHL9fTPfkMHT4bw0PUutaZcOyWQ1LNzyfKRTJ67SyauHxnAQ5QjtptDcT55CjP4gtibLg_8PzUss49xmPZToI2ixWT18UCVxo/s1600/asiohq.png" height="180" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Australian Broadcasting Corp. television reported that 
the plans for the 630 million Australian dollar ($608 million) 
Australian Security Intelligence Organization building in Canberra had been stolen 
through a cyberattack on a building contractor&lt;/span&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Australian officials refused to confirm or deny whether 
Chinese hackers had stolen the blueprints of a new spy agency 
headquarters as a news report claims.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;According to ABC's Four corners the blueprints setting out the building's cable layouts and 
security systems had been illegally accessed by a server in China.  &lt;/span&gt;&lt;br /&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;Under this hacking operations&amp;nbsp;the Prime Minster's Office, the Defence Ministry and the Department of Foreign Affairs had been breached.&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;KDJ3D3PS6M8V&lt;/div&gt;</description><link>http://hackurwayz.blogspot.com/2013/05/australias-top-spy-agency-headquarters.html</link><author>noreply@blogger.com (Hack Your Ways)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_ybMXzmEsZantzNjnb6E7rSx7yloHtmxHVgDHbRyjEpBHL9fTPfkMHT4bw0PUutaZcOyWQ1LNzyfKRTJ67SyauHxnAQ5QjtptDcT55CjP4gtibLg_8PzUss49xmPZToI2ixWT18UCVxo/s72-c/asiohq.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2594382695120847325.post-1746670854061312748</guid><pubDate>Fri, 24 May 2013 10:49:00 +0000</pubDate><atom:updated>2013-05-24T03:49:41.783-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">android</category><category domain="http://www.blogger.com/atom/ns#">Security News</category><category domain="http://www.blogger.com/atom/ns#">Security News.</category><category domain="http://www.blogger.com/atom/ns#">vulnerability</category><title>iPhone has most vulnerabilities, so why is Android the most attacked?</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRlcS21E8so1VGSOvGrDKud09V2zvC_1P0ErwAXIQpAr7yIMRqm_3Ro5zJdpgmUIjSF8sMVw6i-Zq9Jjtb-rfX_k2pn9uTjfium3PpmbfYNVIoDwZp7Tnx1LnqRggmQbh8wVqnRJzikfc/s1600/android-vs-ios.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="201" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRlcS21E8so1VGSOvGrDKud09V2zvC_1P0ErwAXIQpAr7yIMRqm_3Ro5zJdpgmUIjSF8sMVw6i-Zq9Jjtb-rfX_k2pn9uTjfium3PpmbfYNVIoDwZp7Tnx1LnqRggmQbh8wVqnRJzikfc/s320/android-vs-ios.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;The biggest story in malware right now is mobile malware. The shift from traditional mobile phones that simply made phone calls to smartphones containing gigabytes of data has made the&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;pocket-sized computers a prime target for attackers.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style="color: lime;"&gt;&lt;span style="font-size: large; font-weight: bold;"&gt;There was a 32 percent increase in the number of documented vulnerabilities for mobile operating systems and, not surprisingly, a 58 percent increase in mobile malware and&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;Android smartphones and tablets are the hottest targets.&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style="color: lime;"&gt;&lt;span style="font-size: large;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Virtually all mobile malware samples detected are intended for Android, ranging from malware that sends out SMS messages, or&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;b style="color: lime;"&gt;&lt;span style="font-size: large;"&gt;fraudulent SMS payments, mobile botnets, spyware, and Trojans that can capture or destroy data from Android devices.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; There has been biggest spike in malware samples detected in four years, and the growing threat faced by mobile devices—particularly Android mobile devices.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;Malicious websites are a popular method for getting malware out there. An average of 2.7 million malicious URLs were detected each month, pointing to approximately 300,000 bad domains.&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;That works out to about 10,000 new malicious domains being created every day with the express purpose of hosting malware and hijacking unprotected PCs or mobile devices.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;As many people lack adequate protection on their mobile devices and the &amp;nbsp;fact that many companies are embracing BYOD (bring your own device) and allowing employees to use their own personal&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;mobile devices to connect to network resources and company data raises the stakes and makes mobile devices an even greater risk in many cases.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;Apple’s iOS is more locked down by nature, and the apps have to be approved by Apple to get into the app store. With Android, though, the platform is more open by design, and users are free to&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;get apps from a wide variety of sources outside of the official Google Play store. Android apps are typically not reviewed or vetted in any way, making it easier for attackers to plant apps&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;containing malware.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;KDJ3D3PS6M8V&lt;/div&gt;</description><link>http://hackurwayz.blogspot.com/2013/05/iphone-has-most-vulnerabilities-so-why.html</link><author>noreply@blogger.com (Hack Your Ways)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRlcS21E8so1VGSOvGrDKud09V2zvC_1P0ErwAXIQpAr7yIMRqm_3Ro5zJdpgmUIjSF8sMVw6i-Zq9Jjtb-rfX_k2pn9uTjfium3PpmbfYNVIoDwZp7Tnx1LnqRggmQbh8wVqnRJzikfc/s72-c/android-vs-ios.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2594382695120847325.post-4958627149182108307</guid><pubDate>Fri, 24 May 2013 08:48:00 +0000</pubDate><atom:updated>2013-05-24T01:48:13.585-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Monitoring</category><category domain="http://www.blogger.com/atom/ns#">Networking</category><category domain="http://www.blogger.com/atom/ns#">Security.</category><title>Nmap ("Network Mapper")</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfK_yeLcsbtsm0ohofwgUW_lyY8_g3n0lI2yxkSwb_X6B4NMBeHMw-fvjjzdnyjQRU6ckTr8e9GS1eG34HHxdq18QGmhTZCDaETMQ0kqjZ30NSTEyXMSni4bfboC8cKKdyKnITD-xDZwA/s1600/zenmap-multi-1220x700.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfK_yeLcsbtsm0ohofwgUW_lyY8_g3n0lI2yxkSwb_X6B4NMBeHMw-fvjjzdnyjQRU6ckTr8e9GS1eG34HHxdq18QGmhTZCDaETMQ0kqjZ30NSTEyXMSni4bfboC8cKKdyKnITD-xDZwA/s320/zenmap-multi-1220x700.png" width="309" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;Nmap ("Network Mapper") is a free and open source utility for network 
exploration or security auditing. Many systems and network 
administrators also find it useful for tasks such as network inventory, 
managing service upgrade schedules, and monitoring host or service 
uptime. Nmap uses raw IP packets in novel ways to determine what hosts 
are available on the network, what services (application name and 
version) those hosts are offering, what operating systems (and OS 
versions) they are running, what type of packet filters/firewalls are in
 use, and dozens of other characteristics.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;header&gt;
                &lt;h2&gt;
&lt;span style="color: lime; font-size: large;"&gt;Features&lt;/span&gt;&lt;/h2&gt;
&lt;/header&gt;
            &lt;div class="content editable"&gt;
                &lt;ul class="features"&gt;
&lt;li class="feature"&gt;&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;Host discovery - Identify hosts on a network.&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li class="feature"&gt;&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;Port scanning - Enumerate the open ports on one or more target hosts.&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li class="feature"&gt;&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;Version
 detection - Interrogate network services listening on remote devices to
 determine the application name and version number.&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li class="feature"&gt;&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;OS detection - Remotely determine the operating system and some hardware characteristics of network devices.&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li class="feature"&gt;&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;Scriptable interaction with the target - Using Nmap Scripting Engine and the Lua language, customized queries can be made.&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li class="feature"&gt;&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;Reverse DNS lookup.&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li class="feature"&gt;&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;Find device type information.&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li class="feature"&gt;&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;Retrieve MAC addresses and many more.&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;Download:-&lt;a href="http://nmap.org/download.html"&gt;Nmap download&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;KDJ3D3PS6M8V&lt;/div&gt;</description><link>http://hackurwayz.blogspot.com/2013/05/nmap-network-mapper.html</link><author>noreply@blogger.com (Hack Your Ways)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfK_yeLcsbtsm0ohofwgUW_lyY8_g3n0lI2yxkSwb_X6B4NMBeHMw-fvjjzdnyjQRU6ckTr8e9GS1eG34HHxdq18QGmhTZCDaETMQ0kqjZ30NSTEyXMSni4bfboC8cKKdyKnITD-xDZwA/s72-c/zenmap-multi-1220x700.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2594382695120847325.post-7243173799564985008</guid><pubDate>Fri, 24 May 2013 06:59:00 +0000</pubDate><atom:updated>2013-05-24T00:04:02.187-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacking tools.</category><category domain="http://www.blogger.com/atom/ns#">port scanner.</category><title> Topera- The IPv6 port scanner invisible to Snort IDS.</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgx-bjk4qgiEYg62fKfoQ5sSjg5MQvBRJPEh6M6p1xrr7hUjLsrMy2HkGnZDNKmn_Jh2rHErKD18LRcZFPEXKlcuJ4ZKkHTdbncLGazYAjRLtJspBYVSnxLxoXLiV5GdpbZsXTO-DJKanc/s1600/topera_help.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="258" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgx-bjk4qgiEYg62fKfoQ5sSjg5MQvBRJPEh6M6p1xrr7hUjLsrMy2HkGnZDNKmn_Jh2rHErKD18LRcZFPEXKlcuJ4ZKkHTdbncLGazYAjRLtJspBYVSnxLxoXLiV5GdpbZsXTO-DJKanc/s320/topera_help.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;i&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/i&gt;
&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;&lt;i&gt;Topera&lt;/i&gt; is a brand new TCP port scanner under IPv6, with 
the particularity that these scans are not detected by Snort. Snort is 
the most known IDS/IPS and is widely used in many different critical 
environments. Some commercial tools (Juniper or Checkpoint ones) use it 
as detection engine also.&amp;nbsp;Mocking snort detection capabilities could 
suppose a high risk in some cases.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;&amp;nbsp;Fixed some bugs: - &lt;i&gt;Get local IPv6 address - Get local ethernet interface - sniffer packet counter - Some minor fixes&lt;/i&gt;.&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;You can see an example of execution of Topera in link below demo &amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;&lt;a href="http://www.youtube.com/watch?feature=player_embedded&amp;amp;v=XBx6E6yRgSM" target="_blank" title=""&gt;video&lt;/a&gt;.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: lime; font-size: large;"&gt;&lt;a href="https://code.google.com/p/topera/downloads/detail?name=topera-v0.0.2.zip&amp;amp;can=2&amp;amp;q=" target="_blank" title=""&gt;Download&amp;nbsp;Topera IPv6 port scanner&lt;/a&gt;.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;KDJ3D3PS6M8V&lt;/div&gt;</description><link>http://hackurwayz.blogspot.com/2013/05/topera-ipv6-port-scanner-invisible-to.html</link><author>noreply@blogger.com (Hack Your Ways)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgx-bjk4qgiEYg62fKfoQ5sSjg5MQvBRJPEh6M6p1xrr7hUjLsrMy2HkGnZDNKmn_Jh2rHErKD18LRcZFPEXKlcuJ4ZKkHTdbncLGazYAjRLtJspBYVSnxLxoXLiV5GdpbZsXTO-DJKanc/s72-c/topera_help.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2594382695120847325.post-3700854000715970766</guid><pubDate>Wed, 10 Apr 2013 13:17:00 +0000</pubDate><atom:updated>2013-04-10T06:17:51.847-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">APK Download</category><category domain="http://www.blogger.com/atom/ns#">cracked apps</category><category domain="http://www.blogger.com/atom/ns#">malware</category><category domain="http://www.blogger.com/atom/ns#">mobile keylogger</category><category domain="http://www.blogger.com/atom/ns#">Security News.</category><category domain="http://www.blogger.com/atom/ns#">SwiftKey</category><category domain="http://www.blogger.com/atom/ns#">Trojan</category><title>Android  app SwiftKey Keyboard turned into a Keylogger app.</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0Hqkt5rnreoqyhiY4mbUI05o_WE-MBUSvzuzfTny7ohp5cseHNGkFnVlQi_NuLJsb5kIn5RYKujolyZBCRlPPcu46GQdcKEVv-46DNaMY6eyTtQGm6uaZogYkc2b1HBnl7C4DAg7StSQ/s1600/Swiftkey.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0Hqkt5rnreoqyhiY4mbUI05o_WE-MBUSvzuzfTny7ohp5cseHNGkFnVlQi_NuLJsb5kIn5RYKujolyZBCRlPPcu46GQdcKEVv-46DNaMY6eyTtQGm6uaZogYkc2b1HBnl7C4DAg7StSQ/s1600/Swiftkey.jpeg" height="180" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;One of the best 3rd party&amp;nbsp;Android Mobile Keyboard called '&lt;i&gt;SwiftKey&lt;/i&gt;'&amp;nbsp;turned
 into a Keylogger Trojan by an Android developer to&amp;nbsp;show the possible 
security threat of downloading pirated cracked apps from non-official App
 Stores and websites , "&lt;i&gt;anyone pirating Swiftkey is taking a serious risk&lt;/i&gt;" developer said.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&amp;nbsp;He &lt;a href="http://www.android-app-development.ie/blog/2013/03/06/inserting-keylogger-code-in-android-swiftkey-using-apktool/" target="_blank"&gt;demonstrated&lt;/a&gt;
 how to inject a Keylogger snippets of code into a legitimate Android 
Keyboard application that infected a mobile device with Trojan, 
connected with a remote server and transmitted data from the 
device&amp;nbsp;inducing&amp;nbsp;your all&amp;nbsp;key logs.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;i&gt;Android apps are coded in Java and compiled to byte code that is 
run on the Dalvik VM and this byte code is not that hard to edit and 
insert back into an APK.&lt;/i&gt;" he explained.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;
He developed a keylogger from SwiftKey(&lt;a href="http://www.android-app-development.ie/blog/wp-content/uploads/2013/03/SwiftKey_KeyLogger_android_app_development_ie.apk" target="_blank"&gt;&lt;i&gt;APK Download&lt;/i&gt;&lt;/a&gt;), a malicious Java program designed to collect and send all&amp;nbsp;key logs&amp;nbsp;to a remote server (&lt;a href="http://www.android-app-development.ie/swiftkey_keylogger/keylogs.php" target="_blank"&gt;Check Keylogs&lt;/a&gt;) Along with the host IP address. He&amp;nbsp;explained&amp;nbsp;the complete code also on his blog.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;
Android malware is growing at a far more rapid pace than for other 
mobile platforms. For a Cyber Criminals, it is not important to develop 
their own malware program from&amp;nbsp;scratch, Reversing&amp;nbsp;ready-mate&amp;nbsp;apps 
and&amp;nbsp;inserting&amp;nbsp;malware code&amp;nbsp;can easily make their job more easy.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&amp;nbsp;Be careful from where you are downloading apps and&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;b style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;think about the permissions and consider what the app is asking to do, and&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;KDJ3D3PS6M8V&lt;/div&gt;</description><link>http://hackurwayz.blogspot.com/2013/04/android-app-swiftkey-keyboard-turned.html</link><author>noreply@blogger.com (Hack Your Ways)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0Hqkt5rnreoqyhiY4mbUI05o_WE-MBUSvzuzfTny7ohp5cseHNGkFnVlQi_NuLJsb5kIn5RYKujolyZBCRlPPcu46GQdcKEVv-46DNaMY6eyTtQGm6uaZogYkc2b1HBnl7C4DAg7StSQ/s72-c/Swiftkey.jpeg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2594382695120847325.post-7583085319524414432</guid><pubDate>Wed, 10 Apr 2013 11:48:00 +0000</pubDate><atom:updated>2013-04-10T06:11:09.753-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">bitcoin miner</category><category domain="http://www.blogger.com/atom/ns#">malware</category><category domain="http://www.blogger.com/atom/ns#">Security News</category><category domain="http://www.blogger.com/atom/ns#">skype</category><category domain="http://www.blogger.com/atom/ns#">spam.</category><title>Skype Malware that turns computers into Bitcoin miners.</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirpUSZ3W_yqsVOTncv3OjdFEAGeZ51zudtlPoPbiyHC54kB5QBk-PSHmV4EIjs6MvFyZcL2i2D073skt4M0GAYKt_XhaRLrcVmW6oncn2OcoYBmaKBi143wYxYL3Tp_kT310ipEX2k854/s1600/db3ff1162a25dbe3cc25de87512b959b_330.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirpUSZ3W_yqsVOTncv3OjdFEAGeZ51zudtlPoPbiyHC54kB5QBk-PSHmV4EIjs6MvFyZcL2i2D073skt4M0GAYKt_XhaRLrcVmW6oncn2OcoYBmaKBi143wYxYL3Tp_kT310ipEX2k854/s1600/db3ff1162a25dbe3cc25de87512b959b_330.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;span style="line-height: 21px;"&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;Increasingly &amp;nbsp;desperate &amp;nbsp;to &amp;nbsp;cash &amp;nbsp;in &amp;nbsp;on &amp;nbsp;the &amp;nbsp;sky-rocketing &amp;nbsp;price &amp;nbsp;of &amp;nbsp;Bitcoin &amp;nbsp;these days, &amp;nbsp;gangs &amp;nbsp;of &amp;nbsp;cybercriminals &amp;nbsp;have &amp;nbsp;designed &amp;nbsp;a &amp;nbsp;new &amp;nbsp;malware &amp;nbsp;that’s &amp;nbsp;infecting computers &amp;nbsp;via &amp;nbsp;Skype in an attempt to build a botnet massive enough to start mining the virtual currency.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;Researchers from Kaspersky Lab have discovered a new spam message campaign being transmitted via Skype contains malware capable of using an infected computer to mine for Bitcoins. The malware, identified as Trojan.Win32.Jorik.IRCbot.xkt.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;According to Kaspersky Lab, &amp;nbsp;the average click rate for the rogue URL is high, at over 2,000 clicks per hour, and the creators of this malware had used it to seize control of hundreds of computers in Russia, Germany, Ukraine, Poland, Spain and other countries.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;The malware spreads itself by infecting the Skype VoIP program, using the age old &lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;trick of sending messages to an infected user’s contacts, such as “Hey, this is my favorite picture of you”, alongside a link to a malicious download. If the unwitting victim click on that link, the malware downloads itself onto their PC, turning the machine into a Bitcoin mining slave alongside the rest of its botnet.&lt;br /&gt;
Bitcoin mining malware is just the latest tactic we have seen from cyber criminals.Previous tactics have included malware designed to target people’s Bitcoin wallets,&lt;/b&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;KDJ3D3PS6M8V&lt;/div&gt;</description><link>http://hackurwayz.blogspot.com/2013/04/skype-malware-that-turns-computers-into.html</link><author>noreply@blogger.com (Hack Your Ways)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirpUSZ3W_yqsVOTncv3OjdFEAGeZ51zudtlPoPbiyHC54kB5QBk-PSHmV4EIjs6MvFyZcL2i2D073skt4M0GAYKt_XhaRLrcVmW6oncn2OcoYBmaKBi143wYxYL3Tp_kT310ipEX2k854/s72-c/db3ff1162a25dbe3cc25de87512b959b_330.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2594382695120847325.post-3074357228871904710</guid><pubDate>Wed, 10 Apr 2013 10:41:00 +0000</pubDate><atom:updated>2013-04-10T03:41:10.646-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cross site scripting</category><category domain="http://www.blogger.com/atom/ns#">ddos attack.</category><category domain="http://www.blogger.com/atom/ns#">Security News</category><category domain="http://www.blogger.com/atom/ns#">vulnerability</category><category domain="http://www.blogger.com/atom/ns#">wifi hacking</category><title>AirDroid security flaw allows hackers to perform Dos attack from your Android device.</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnldgfIbqFgizNy65P5UnKzFRC6Xo2zLdHrdVI63_GyGshhyphenhyphenLzt6MMS-YK2qBBnANtNRRZR0m-jCxjVJ1OJ2M-nRop0h3TCN8p6Qm1QH__yYyjY3vXkBDzyx81PXht9MJ4ih8paxy3BQ8/s1600/Airdroid-PC-Browser.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnldgfIbqFgizNy65P5UnKzFRC6Xo2zLdHrdVI63_GyGshhyphenhyphenLzt6MMS-YK2qBBnANtNRRZR0m-jCxjVJ1OJ2M-nRop0h3TCN8p6Qm1QH__yYyjY3vXkBDzyx81PXht9MJ4ih8paxy3BQ8/s1600/Airdroid-PC-Browser.jpg" height="208" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;span style="line-height: 16px;"&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;AirDroid, a free app which provides wireless management of your Android phone or tablet from any browser on the same Wi-Fi network, has a dangerous cross-site scripting (XSS) vulnerability which allow hackers &amp;nbsp;to perform Dos attack from your Android device.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;Cross Site scripting or XSS vulnerability in the browser version of AirDroid allows an attacker to send a malicious text message to the browser associated with the account when attacker is able to get access to a phone with AirDroid installed.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;According to the Department of Homeland Security’s&amp;nbsp;
&lt;a href="http://www.kb.cert.org/vuls/id/557252" style="background-color: #f9f9f9; color: #d31a1c;"&gt;Vulnerability Notes Database&lt;/a&gt;&amp;nbsp;, &lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;"When this message is viewed on the AirDroid web interface an attacker&lt;br /&gt;
can initiate a cross-site scripting attack, which may result in information leakage, privilege escalation, and denial of service on the host computer.&lt;br /&gt;
&lt;br /&gt;
There is no patch at this time for this vulnerability. As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent XSS, CSRF, or SQLi attacks since the attack comes as an HTTP request from a legitimate user’s host. But Restricting access would prevent an attacker from accessing the AirDroid web interface using stolen credentials from a blocked network location.”&lt;/b&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;KDJ3D3PS6M8V&lt;/div&gt;</description><link>http://hackurwayz.blogspot.com/2013/04/airdroid-security-flaw-allows-hackers.html</link><author>noreply@blogger.com (Hack Your Ways)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnldgfIbqFgizNy65P5UnKzFRC6Xo2zLdHrdVI63_GyGshhyphenhyphenLzt6MMS-YK2qBBnANtNRRZR0m-jCxjVJ1OJ2M-nRop0h3TCN8p6Qm1QH__yYyjY3vXkBDzyx81PXht9MJ4ih8paxy3BQ8/s72-c/Airdroid-PC-Browser.jpg" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2594382695120847325.post-8224637855241616383</guid><pubDate>Tue, 09 Apr 2013 07:49:00 +0000</pubDate><atom:updated>2013-04-09T00:59:02.045-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Security News</category><title>Evernote account used as Command-and-Control Server by Hackers.</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAVB_dWVVX9vW6_EdNto33rfl2I626Vw2ozeGgMOSBKSbOqKOYiUvR4HxkWUI-N9fW4WEiZl90wjAILA7bZEP27bs7x6OKd7QauhUsuaQyUJbUGVr6BLcWaEvrywaXqBDrz38BI2-HVnI/s1600/evernote.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAVB_dWVVX9vW6_EdNto33rfl2I626Vw2ozeGgMOSBKSbOqKOYiUvR4HxkWUI-N9fW4WEiZl90wjAILA7bZEP27bs7x6OKd7QauhUsuaQyUJbUGVr6BLcWaEvrywaXqBDrz38BI2-HVnI/s1600/evernote.png" height="199" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;span style="text-align: left;"&gt;Cyber criminals&lt;/span&gt;&amp;nbsp;are using popular note-taking app &lt;i&gt;Evernote&lt;/i&gt; as&amp;nbsp;Command-and-Control Server&amp;nbsp;to give commands to the&amp;nbsp;malware&amp;nbsp;installed&amp;nbsp;on infected PCs using botnets.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;
TrendMicro uncovered a malware detected as “&lt;i&gt;BKDR_VERNOT.A&lt;/i&gt;” tried to communicate with Command-and-Control Server using Evernote.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;Malware delivered via an executable file that installs the malware as a 
dynamic-link library. The installer then ties the DLL into a legitimate 
running process, hiding it from casual detection.&amp;nbsp;Once installed, 
BKDR_VERNOT.A can perform several backdoor commands such as downloading,
 executing, and renaming files. It then gathers information from the 
infected system, including details about its OS, timezone, user name, 
computer name, registered owner and organization.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGv6m1lVQhFmonxLe8KW2Zy-3d7NIiirpyyNj2V6P5cD6BULpfacaYLeZcM7d5z09W1AxJqy07EC8TTHJvmjwmTfrJ5v5px0Mn9OYROjkGEw9Rcg9fVHzO2CN2MpIvn7x5xukyHU8VFNw/s1600/Hacker+uses+Ever.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGv6m1lVQhFmonxLe8KW2Zy-3d7NIiirpyyNj2V6P5cD6BULpfacaYLeZcM7d5z09W1AxJqy07EC8TTHJvmjwmTfrJ5v5px0Mn9OYROjkGEw9Rcg9fVHzO2CN2MpIvn7x5xukyHU8VFNw/s1600/Hacker+uses+Ever.png" height="320" width="242" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;span style="text-align: left;"&gt;Researchers&lt;/span&gt;&amp;nbsp;also pointed out that&amp;nbsp;the backdoor may have also used Evernote as a location to upload stolen data. "&lt;i&gt;Unfortunately,
 during our testing, it was not able to login using the credentials 
embedded in the malware. This is possibly a security measure imposed by 
Evernote following its recent hacking issue.&lt;/i&gt;"&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;KDJ3D3PS6M8V&lt;/div&gt;</description><link>http://hackurwayz.blogspot.com/2013/04/evernote-account-used-as-command-and.html</link><author>noreply@blogger.com (Hack Your Ways)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAVB_dWVVX9vW6_EdNto33rfl2I626Vw2ozeGgMOSBKSbOqKOYiUvR4HxkWUI-N9fW4WEiZl90wjAILA7bZEP27bs7x6OKd7QauhUsuaQyUJbUGVr6BLcWaEvrywaXqBDrz38BI2-HVnI/s72-c/evernote.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2594382695120847325.post-4788664605304063415</guid><pubDate>Tue, 09 Apr 2013 07:08:00 +0000</pubDate><atom:updated>2013-04-09T00:08:58.687-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Security Tools</category><title>NinjaWPass - Protect WordPress against keyloggers and stolen passwords</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtBtSG9se4ABg39lyf1L4KXjnTR4_rTw9EhLJNstXKeNWVEi3SEGBzDKqHoeXG_lkyi3l9VNPOKG7aHXsmU7JHPsoaaJyDmAX-7jvBOTZAmalXKr6NIdAhTIC8gwnzngKzCTq_xtWeoms/s1600/nwp_login.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtBtSG9se4ABg39lyf1L4KXjnTR4_rTw9EhLJNstXKeNWVEi3SEGBzDKqHoeXG_lkyi3l9VNPOKG7aHXsmU7JHPsoaaJyDmAX-7jvBOTZAmalXKr6NIdAhTIC8gwnzngKzCTq_xtWeoms/s1600/nwp_login.jpg" height="320" width="292" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;NinjaWPass is a free WordPress plugin written to protect your blog 
administration console. It makes it basically impossible for a hacker 
who stole your password to log in to your console.
&lt;br /&gt;
&lt;br /&gt;
The way it works is simple but very efficient :
&lt;br /&gt;
All you need to do is to define a second password (AKA the NinjaWPass password) from 10 to 30 characters.
&lt;br /&gt;
At the WordPress login prompt, besides your current password, you will 
be asked to enter 3 randomly chosen characters from your NinjaWPass 
password. Whether your computer is infected by a keylogger or someone is
 spying over your shoulder, this protection will keep them away.&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;Additionally, the plugin offers the possibility to receive an alert by 
email whenever someone logs into your WordPress admin interface.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="font-size: medium;"&gt;&lt;a href="http://sourceforge.net/projects/ninjawpass/files/latest/download?source=files" target="_blank"&gt;Download&amp;nbsp;NinjaWPass&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;div class="blogger-post-footer"&gt;KDJ3D3PS6M8V&lt;/div&gt;</description><link>http://hackurwayz.blogspot.com/2013/04/ninjawpass-protect-wordpress-against.html</link><author>noreply@blogger.com (Hack Your Ways)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtBtSG9se4ABg39lyf1L4KXjnTR4_rTw9EhLJNstXKeNWVEi3SEGBzDKqHoeXG_lkyi3l9VNPOKG7aHXsmU7JHPsoaaJyDmAX-7jvBOTZAmalXKr6NIdAhTIC8gwnzngKzCTq_xtWeoms/s72-c/nwp_login.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2594382695120847325.post-4312209502524023301</guid><pubDate>Tue, 09 Apr 2013 06:27:00 +0000</pubDate><atom:updated>2013-04-09T00:09:56.594-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacking tools</category><category domain="http://www.blogger.com/atom/ns#">Linux</category><category domain="http://www.blogger.com/atom/ns#">penetration testing.</category><category domain="http://www.blogger.com/atom/ns#">Security Tools</category><title>Server Shield v1.1.5 - Protect your Linux machine in 1 minute</title><description>&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-CKt2tkKx363naJYINvItnCBk0OaHJP2ozm7GJslJ4OrZdzNTz4ssuKF2vyjnvijUk9WlrdyUA3CjNsZGhQB2q_ZcYDoWaqjvURK2vQ14GqN1ZHOxxQcdv_1xULqXuUoDZDDD2ILY0WU/s1600/Protect+your+Linux+server.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-CKt2tkKx363naJYINvItnCBk0OaHJP2ozm7GJslJ4OrZdzNTz4ssuKF2vyjnvijUk9WlrdyUA3CjNsZGhQB2q_ZcYDoWaqjvURK2vQ14GqN1ZHOxxQcdv_1xULqXuUoDZDDD2ILY0WU/s1600/Protect+your+Linux+server.png" height="320" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #333333; font-family: Helvetica, arial, freesans, clean, sans-serif; font-size: 14px; line-height: 22px; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 22px; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;Server Shield is a lightweight method of protecting and hardening your Linux server. It is easy to install, hard to mess up, and makes your server instantly and effortlessly resistant to many basic and advanced attacks.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 22px; margin-bottom: 15px; margin-top: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;All IP addresses will be automatically detected and used for the firewall configuration. Automatic security updates are enabled by default.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 22px; margin-bottom: 15px; margin-top: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;
&lt;em style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;No maintenance required— just set it and forget it!&lt;/b&gt;&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Features&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;Firewall Hardening&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;TCP Hardening&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;Data Leakage Protection&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;ICMP/Ping Flood Protection&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;Rootkit Protection&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;DoS Protection&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;Spoof Protection&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;Bogus TCP Protection&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;SYN Flood Protection&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;
&lt;span style="font-size: 14px; line-height: 22px;"&gt;FTP/SSH Bruteforce Protection&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;
&lt;span style="font-size: 14px; line-height: 22px;"&gt;Automatic Security Updates&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;
&lt;span style="font-size: 14px; line-height: 22px;"&gt;DNS Amplification Protection&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Requires:-&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 22px; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;Server Shield depends on several pieces of open source software to function properly.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 22px; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;
&lt;b&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;iptables ("yum install iptables")&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 22px; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;If yum is available, the following packages will be silently installed and kept up to date:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ul style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 22px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 15px; padding-bottom: 0px; padding-left: 30px; padding-right: 0px; padding-top: 0px;"&gt;
&lt;li style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;yum-security&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;iptables&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;net-tools&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;sed&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;gawk&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;git&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Installation:-&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;pre style="background-color: #f8f8f8; border-bottom-color: rgb(204, 204, 204); border-bottom-left-radius: 3px; border-bottom-right-radius: 3px; border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-image: initial; border-left-color: rgb(204, 204, 204); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(204, 204, 204); border-right-style: solid; border-right-width: 1px; border-style: initial; border-top-color: rgb(204, 204, 204); border-top-left-radius: 3px; border-top-right-radius: 3px; border-top-style: solid; border-top-width: 1px; line-height: 19px; margin-bottom: 15px; margin-top: 15px; overflow-x: auto; overflow-y: auto; padding-bottom: 6px; padding-left: 10px; padding-right: 10px; padding-top: 6px; text-align: -webkit-auto;"&gt;&lt;code style="background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-left-radius: 3px; border-bottom-right-radius: 3px; border-bottom-style: none; border-color: initial; border-image: initial; border-left-style: none; border-right-style: none; border-style: initial; border-top-left-radius: 3px; border-top-right-radius: 3px; border-top-style: none; border-width: initial; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;&lt;b&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;git clone https://github.com/bluedragonz/server-shield

cd server-shield;chmod +x sshield;mv sshield /etc/init.d

/etc/init.d/sshield start&lt;/span&gt;&lt;/b&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;i&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="font-size: medium;"&gt;&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;a href="https://github.com/bluedragonz/server-shield/archive/master.zip" target="_blank"&gt;Download Server Shield v1.0.2&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;KDJ3D3PS6M8V&lt;/div&gt;</description><link>http://hackurwayz.blogspot.com/2013/04/server-shield-v115-protect-your-linux.html</link><author>noreply@blogger.com (Hack Your Ways)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-CKt2tkKx363naJYINvItnCBk0OaHJP2ozm7GJslJ4OrZdzNTz4ssuKF2vyjnvijUk9WlrdyUA3CjNsZGhQB2q_ZcYDoWaqjvURK2vQ14GqN1ZHOxxQcdv_1xULqXuUoDZDDD2ILY0WU/s72-c/Protect+your+Linux+server.png" width="72"/><thr:total>0</thr:total><enclosure length="-1" type="application/zip" url="https://github.com/bluedragonz/server-shield/archive/master.zip"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Server Shield is a lightweight method of protecting and hardening your Linux server. It is easy to install, hard to mess up, and makes your server instantly and effortlessly resistant to many basic and advanced attacks. All IP addresses will be automatically detected and used for the firewall configuration. Automatic security updates are enabled by default. No maintenance required— just set it and forget it! Features Firewall Hardening TCP Hardening Data Leakage Protection ICMP/Ping Flood Protection Rootkit Protection DoS Protection Spoof Protection Bogus TCP Protection SYN Flood Protection FTP/SSH Bruteforce Protection Automatic Security Updates DNS Amplification Protection Requires:- Server Shield depends on several pieces of open source software to function properly. iptables ("yum install iptables")&amp;nbsp;&amp;nbsp; If yum is available, the following packages will be silently installed and kept up to date: yum-security iptables net-tools sed gawk git Installation:- git clone https://github.com/bluedragonz/server-shield cd server-shield;chmod +x sshield;mv sshield /etc/init.d /etc/init.d/sshield start &amp;nbsp;&amp;nbsp; &amp;nbsp; Download Server Shield v1.0.2 KDJ3D3PS6M8V</itunes:subtitle><itunes:author>noreply@blogger.com (Hack Your Ways)</itunes:author><itunes:summary>Server Shield is a lightweight method of protecting and hardening your Linux server. It is easy to install, hard to mess up, and makes your server instantly and effortlessly resistant to many basic and advanced attacks. All IP addresses will be automatically detected and used for the firewall configuration. Automatic security updates are enabled by default. No maintenance required— just set it and forget it! Features Firewall Hardening TCP Hardening Data Leakage Protection ICMP/Ping Flood Protection Rootkit Protection DoS Protection Spoof Protection Bogus TCP Protection SYN Flood Protection FTP/SSH Bruteforce Protection Automatic Security Updates DNS Amplification Protection Requires:- Server Shield depends on several pieces of open source software to function properly. iptables ("yum install iptables")&amp;nbsp;&amp;nbsp; If yum is available, the following packages will be silently installed and kept up to date: yum-security iptables net-tools sed gawk git Installation:- git clone https://github.com/bluedragonz/server-shield cd server-shield;chmod +x sshield;mv sshield /etc/init.d /etc/init.d/sshield start &amp;nbsp;&amp;nbsp; &amp;nbsp; Download Server Shield v1.0.2 KDJ3D3PS6M8V</itunes:summary><itunes:keywords>hacking tools, Linux, penetration testing., Security Tools</itunes:keywords></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2594382695120847325.post-691414209199053047</guid><pubDate>Mon, 08 Apr 2013 17:56:00 +0000</pubDate><atom:updated>2013-04-08T10:56:12.965-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Forensic Toolkit</category><category domain="http://www.blogger.com/atom/ns#">hacking tools</category><category domain="http://www.blogger.com/atom/ns#">Security Tools</category><category domain="http://www.blogger.com/atom/ns#">vulnerability scanner.</category><title>ExploitShield Browser Edition - Forget about browser vulnerabilities.</title><description>&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzfZsGtxABPEw2eh4k3RGwB-179jOvO8oQVuGmu-ZlGzjH4PfQ78kUmAmbJgIziVQfnmpmmGDnGOSmVry7_9oLedDQc-ZCGHHIuP53nK6ibp5IfE_DQ59yUMgP-_HeUylCEfAXfP7nQ2k/s1600/ScreenShot00071.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzfZsGtxABPEw2eh4k3RGwB-179jOvO8oQVuGmu-ZlGzjH4PfQ78kUmAmbJgIziVQfnmpmmGDnGOSmVry7_9oLedDQc-ZCGHHIuP53nK6ibp5IfE_DQ59yUMgP-_HeUylCEfAXfP7nQ2k/s1600/ScreenShot00071.png" height="254" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;ExploitShield Browser Edition protects against all known and unknown 
0-day day vulnerability exploits, protecting users where traditional 
antivirus and security products fail. It consists of an innovative 
patent-pending vulnerability-agnostic application shielding technology 
that prevents malicious vulnerability exploits from compromising your &amp;nbsp;computers.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;
Includes "shields" for all major browsers (IE, Firefox, Chrome, Opera) 
and browser all components such as Java, Adobe Reader, Flash, Shockwave.
 Blocks all exploit kits such as Blackhole, Sakura, Phoenix, Incognito 
without requiring any signature updates.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEga3uwaZzEESILxGFw4yhFBBWcxwmYszaO6MBLrd6V_RUzQ9B9K0Sx2ToEmThh5EowyBkO8sJJrexCZUiA64EDHcFgE3fJEf-8FfObjrAGfY-mCNlm7uT9cwvIxcBptcxbFTn_7Ofwm40A/s1600/ScreenShot00087.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEga3uwaZzEESILxGFw4yhFBBWcxwmYszaO6MBLrd6V_RUzQ9B9K0Sx2ToEmThh5EowyBkO8sJJrexCZUiA64EDHcFgE3fJEf-8FfObjrAGfY-mCNlm7uT9cwvIxcBptcxbFTn_7Ofwm40A/s1600/ScreenShot00087.png" height="129" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;No need to train or configure, ExploitShield is 100% install-and-forget 
anti-exploit solution. Read more: ExploitShield Browser Edition.&amp;nbsp;The&lt;/b&gt;&lt;/span&gt;&amp;nbsp;&lt;a href="http://www.zerovulnerabilitylabs.com/home/"&gt;ZeroVulnerabilityLabs&lt;/a&gt;&amp;nbsp;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;website maintains a real time list of detected 
threats.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style="font-size: medium;"&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;You can download it from here&lt;/span&gt;&amp;nbsp;&lt;a href="http://www.zerovulnerabilitylabs.com/download/ExploitShield-Setup.exe" target="_blank"&gt;Download&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;KDJ3D3PS6M8V&lt;/div&gt;</description><link>http://hackurwayz.blogspot.com/2013/04/exploitshield-browser-edition-forget.html</link><author>noreply@blogger.com (Hack Your Ways)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzfZsGtxABPEw2eh4k3RGwB-179jOvO8oQVuGmu-ZlGzjH4PfQ78kUmAmbJgIziVQfnmpmmGDnGOSmVry7_9oLedDQc-ZCGHHIuP53nK6ibp5IfE_DQ59yUMgP-_HeUylCEfAXfP7nQ2k/s72-c/ScreenShot00071.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2594382695120847325.post-1791838087821962187</guid><pubDate>Mon, 08 Apr 2013 15:55:00 +0000</pubDate><atom:updated>2013-04-08T08:55:15.195-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">vulnerability</category><title>Hacking Google users with Google's GooPass phishing attack</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguBOPvGOrsneFp1X9_VmGcfQOsO5AY68_VW9L0WMUudjSz1qPuqNPEkP2s8R9_PSyZQ-fghhSkFpSQjMKN-2EYucVKaSsMRb94FZg056AvCwVW-gafX4Vuc77-8KVgN7lk8aqYJaxAr0Y/s1600/Googe_Gopass.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguBOPvGOrsneFp1X9_VmGcfQOsO5AY68_VW9L0WMUudjSz1qPuqNPEkP2s8R9_PSyZQ-fghhSkFpSQjMKN-2EYucVKaSsMRb94FZg056AvCwVW-gafX4Vuc77-8KVgN7lk8aqYJaxAr0Y/s1600/Googe_Gopass.png" height="400" width="363" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div id="aim19060130340158433079"&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;i&gt;Google Drive&lt;/i&gt; is the new home for &lt;i&gt;Google Docs&lt;/i&gt;,
 that users can access everywhere for&amp;nbsp;Storing files safely. In a 
recent&amp;nbsp;demonstration&amp;nbsp;hacker successfully performed an attack on Google 
Docs to trick users to grab&amp;nbsp;their Facebook, Gmail, Yahoo credentials 
with Credit Card Information.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;
Security researcher &lt;i&gt;Christy Philip Mathew&lt;/i&gt; came up with combination of&amp;nbsp;&lt;i&gt;Clickjacking&lt;/i&gt; and &lt;i&gt;CSRF&lt;/i&gt; vulnerabilities in Google's Docs that can allow a hacker to create a document in victim's Drive for further phishing attack.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;
For those who are not aware about Clickjacking, It is a technique where 
an attacker tricks a user into performing certain actions on a website 
by hiding clickable elements inside an invisible iframe.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;He explain how this technique can be executed to pwn a Google user to 
steal victim's &lt;a name='more'&gt;&lt;/a&gt;all type of credentials with a phishing attack. Here 
attacker need to send a Malicious URL to the victim, where victim needs 
to interact with some buttons only.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id="aim29060130340158433079"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;
Vulnerability allow hacker to trick Google user to create an document in
 victim's drive, which is actually owned by attacker and the victim. To 
perform a&amp;nbsp;successful phishing attack, an attacker can carefully craft 
that&amp;nbsp;document&amp;nbsp;maliciously.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;I have prepared an&amp;nbsp;example after&amp;nbsp;analyzing the possible threats of this vulnerability,where attacker can rename the document to 
something "&lt;i&gt;Google GooPass&lt;/i&gt;"
 (imaginary service for storing passwords 
and&amp;nbsp;important&amp;nbsp;information&amp;nbsp;secretly&amp;nbsp;in&amp;nbsp;Google&amp;nbsp;drive) and crafted a simple
 design that can phish users to enter their Credit card information, 
Google, Facebook username password etc, as shown in above:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&amp;nbsp;Victim can be led to believe that it's a Google&amp;nbsp;default&amp;nbsp;file or Service 
to save all type of personal information secretly at one 
location.&amp;nbsp;Because attacker and victim, both are the owner of this new 
file, where attacker can make the document public for further access 
after removing himself from&amp;nbsp;ownership&amp;nbsp;of that document.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;
At the end, victim is only owner of the document (which is now public) 
and if phishing attempt works, hacker will be able to see all updates 
remotely, anytime - anywhere!&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;Note :&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ol&gt;
&lt;li&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;Vulnerability is not fixed yet, we request Google&amp;nbsp;to fix this as soon as possible to assure maximum security to Google users.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: lime; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;There is no Google service called '&lt;span style="font-style: italic;"&gt;Google GooPass'&lt;/span&gt;, the term is just used to trick victim for phishing purpose.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;KDJ3D3PS6M8V&lt;/div&gt;</description><link>http://hackurwayz.blogspot.com/2013/04/hacking-google-users-with-googles.html</link><author>noreply@blogger.com (Hack Your Ways)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguBOPvGOrsneFp1X9_VmGcfQOsO5AY68_VW9L0WMUudjSz1qPuqNPEkP2s8R9_PSyZQ-fghhSkFpSQjMKN-2EYucVKaSsMRb94FZg056AvCwVW-gafX4Vuc77-8KVgN7lk8aqYJaxAr0Y/s72-c/Googe_Gopass.png" width="72"/><thr:total>0</thr:total></item></channel></rss>