attacker

  1. quagmire

    Serious Android crypto key theft vulnerability affects 86% of devices

    Serious Android crypto key theft vulnerability affects 86% of devices | Ars Technica
  2. F

    Cell network security holes revealed, with an app to test your carrier

    The link to Qian's app, Firewall Middlebox Detection is not working Source Cell network security holes revealed, with an app to test your carrier
  3. soumya

    New attack code crashes Windows XP & Vista

    Security researchers have released attack code that will crash Windows XP and Vista PCs that are susceptible to a recently patched bug in the operating system. The code was released yesterday to security professionals who use Immunity's Canvas computer security testing software. It causes...
  4. J

    ~**~ How Can You Get Infected by Trojans?~**~

    How Can You Get Infected by Trojans? ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ A lot of people out there can't differ various ways of infection just because in their minds the only way of getting infected is by downloading and running server.exe and they will never do it as they say. As you'll read...
  5. mihirvashist

    Social Engineering

    hi everybody i'm going to give a very short tutorial on social engineering social engineering is an art where an attacker tries to lure out information out of a victim by using name of a firm,i'll explain via an example:- suppose i'm an atacker i call a person and tell him that i am calling from...
Top Bottom