blog trackingRealtime Web Statistics Browser Archives - Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘Browser’

Man In The Browser attack and OTP (Banking Institutions)

The view of security experts and financial services professionals considers the Man in the browser as the greatest threat to online banking, cybercrime increases its use.

Man in the Browser attack, DDoS attacks, phishing, are more important and insidious cyber threats against banking institutions. Latest statistics proposed by leading security companies confirm that online banking is considered a lucrative business for cybercrime.
In contrast, the response of the banking world was improving authentication processes, a classic example is represented by the rapid diffusion for multi-factor authentication, such as OTPs.
Classic for the “Man in the Middle” attack the attacker scheme is between the client and server banking victim, it is clear that the introduction of encrypting traffic could make the technique ineffective.
In the financial services sector in a survey Man In The Browser considered to be the greatest threat to online banking, malware, such as Zeus, Carberp, Sinowal and Clampi have capabilities MITB.

Security: the most effective preventive measure is considered out transaction verification band containing the transaction details along with OTP and the side of the bank to adopt a fraud detection based on the behavior of user profiles.

View full post on Who Got Hacked – Latest Hacking News and Security Updates

Apple store serving spyware, Tor browser for IOS is Fake , apple love to keep it in its store

http://media.nu.nl/m/m1mx50fa0945_wd640.jpg/anoniem-browsen-in-ios-via-tor-app.jpg 
 Members of Tor anonymity network has warn that the Tor browser application which is available in Apple store since november. or published this announcement on there official website by a high ranked volunteer Phobos.
Phobos said:
“It’s full of adware and spyware. Two users have called to complain. We should have it removed.”
Till now application have not been removed from the official apple store , it seems apple is not worry about users privacy as its still serving spyware .

View full post on Who Got Hacked – Latest Hacking News and Security Updates

[remote] – Squiggle 1.7 SVG Browser Java Code Execution

Squiggle 1.7 SVG Browser Java Code Execution
View full post on Exploit-DB updates

View full post on National Cyber Security

Twitter Backs Browser Privacy Project

View full post on News ≈ Packet Storm

View full post on National Cyber Security

TheHackersNews: RT @w3af : How unique and trackable is your web browser? http://t.co/bB9tHPV0

TheHackersNews: RT @w3af : How unique and trackable is your web browser? http://t.co/bB9tHPV0
View full post on Twitter / TheHackersNews

View full post on National Cyber Security

Orion Browser Dumper v1.0 released

Orion Browser Dumper v1.0 released
Jean-Pierre LESUEUR (DarkCoderSc) releases another Browser Forensic tool for Community called “Orion Browser Dumper v1.0″. 
<!– adsense –>
This software is an advanced local browser history extractor (dumper), in less than few seconds (like for Browser Forensic Tool) it will extract the whole history content of most famous …

View full post on National Cyber Security » Computer Hacking

TheHackersNews: RT @unixfreaxjp: #Tools – Browser Forensic Tool v2.0 – Advanced browser history search engine http://t.co/6wxSHGsw

TheHackersNews: RT @unixfreaxjp: #Tools – Browser Forensic Tool v2.0 – Advanced browser history search engine http://t.co/6wxSHGsw
View full post on Twitter / TheHackersNews

View full post on National Cyber Security

SpywareLady: Microsoft Internet Explorer 9: Browser or Spyware ? (Includes … http://t.co/EDZFMMsa

SpywareLady: Microsoft Internet Explorer 9: Browser or Spyware ? (Includes … http://t.co/EDZFMMsa
View full post on Twitter / SpywareLady

View full post on National Cyber Security

Google details Chrome browser security-testing technology

Since late last year, Google has been using an industrial-strength testing system to identify, analyze and fix security holes in its Chrome browser, helping it significantly cut down on the number of vulnerabilities that slip through to the most recent version product in production.Google details Chrome browser security-testing technology, Blog, Technology, Google, details., Chrome, Browser, securitytesting

View full post on Computerworld Security News

View full post on National Cyber Security » Announcements

Google Chrome Browser Tabs Can Travel From Device to Device

Tabs opened in the Google Chrome browser will soon travel with the user to other devices so long as the user is signed in, according to a company blog post.

View full post on computer worm – Yahoo! News Search Results

View full post on National Cyber Security » Virus/Malware/Worms

Page 1 of 3123»

Get The New Book By Gregory Evans

Everyone Is Talking About!

Are You Hacker Proof?
$15.95

Find Out More, Click Here!