Latest Story

Feodo Tracker

January 28, 2014
By

Abuse.ch publishes a list of Feodo botnet C&C servers tracked by its Feodo Tracker. You can sort the list by clicking on any column title (please note that JavaScript must be enabled in order to use this function). In addition, you have the possibility to filter the list below using certain pre-defined filters shown...
Read more »

Free Penetration Test Environment

December 17, 2013
By

Faraday by Infobyte introduces a new concept (IPE) Integrated Penetration-Test Environment a multiuser Penetration test IDE. Designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools...
Read more »

Design and Operational Guide to Protect against “Advanced Persistent Threats”

December 11, 2013
By

An Approach to improve security measures against new cyber security threats. This document explains what “Advanced Persistent Threats” really is and how to design and operate networks and systems to counter it. Download the document from here - https://www.ipa.go.jp/files/000017299.pdf
Read more »

iPhone Tracker

October 24, 2013
By

This open-source application maps the information that your iPhone is recording about your movements. It doesn’t record anything itself, it only displays files that are already hidden on your...
Read more »

Kvasir: Penetration Test Data Management

October 8, 2013
By

Penetration tests can be data management nightmares because of the large amounts of information that is generally obtained. Vulnerability scanners return lots of actual and potential vulnerabilities to review....
Read more »

Minion – automated security testing

September 10, 2013
By

Minion is a platform developed by the Security Automation team at Mozilla to enable integration and adoption of automated security testing that has been under development for the past...
Read more »