Home » Author Archive
“Autosploit” combines Shodan and Metasploit for Automated remote hosts hunting
Autosploit is a new tool that has only recently been released to the public by “cyber security enthusiast”, “VectorSEC“. It’s obvious that the release of such a tool be a controversy, after all – even legitimate non-automated tools used by noble pentesters and security researchers get enough slack as is, just due to the nature that these tools can be abused and packaged into other “kits” marketed to those with malicious intent. And on the tweet about its release, it is also obvious that people are...
Iranian leaders Issue Statement on Internet Censorship
After a series of anti-government protests in several cities across Iran, Iranian officials have been busy trying to take online control by censoring and blocking access to several websites and applications over the last few months. Services such as Telegram (access has since been restored) and Instagram were the most recent additions to the pervasive internet control with a confirmed “886 domains” according to OONI.
Shortly after the recent blockage of Telegram, Iranians took to the internet under several social media sites expressing...
Why Being a Techie in Dubai Sucks
I moved to Dubai a year ago this week, I love the place, nice weather, well, as long as it is not summer, great food, and a city with a great vibe. It does have it’s problems however.
Traffic. Anyone that lives in Dubai for very long will start to complain about the traffic, it is horrible, I knew about the traffic issues before I moved to Dubai, having done years of business in the region, having come from London, I thought I could handle it, I mean waiting 20 mins surrounded by other vehicles to move a mile in London is not uncommon. But here...
Barbarians at the Password Gate
Why you should be worried about your passwords
We’re now using the Internet for a wide range of everyday activities, including online banking, stock trading, online shopping, bill paying, socializing, gaming, entertainment and online research. In the last few years there’s been a massive growth in the number of social networking sites such as Facebook, Linkedin, Twitter, Craigslist, Instagram, Tumblr. We share all kinds of personal details on these sites as well as music, pictures and videos, most of which we would certainly prefer...
Consumer Oriented Two-Factor Authentication and the Challenges
After Facebook, Google, Microsoft and PayPal, Apple has started offering two-factor authentication to help its customers secure their Apple IDs against hacking. Initially, two-step verification is being offered in the U.S., UK, Australia, Ireland, and New Zealand. Additional countries will be added over time, per Apple’s support website.
The new feature is designed to block unauthorized changes to the iCloud or iTunes accounts, and keep hackers who steal Apple IDs from purchasing digital context or hardware using the credit cards stored in...
NIST Guidelines for Mobile DevicesNIST Guidelines for Mobile Devices
This week, NIST (National Institute of Standards and Technology) has release the guidelines for managing and securing of mobile devices in the enterprise (Guidelines for Managing and Securing Mobile Devices in the Enterprise – SP 800-124 Revision 1). The purpose of this publication is to provide recommendation to help organizations centrally manage and secure their mobile devices against various threats.
This document is intended for technical staffs such as security engineers and those who are responsible in planning, implementing and maintaining...