Hakin9 is a free, online, monthly publication on IT Security. The magazine is published in English and is available in the Internet a...

Hakin9: Identity Theft!

Friday, March 04, 2011 Sensei Fedon 0 Comments

Hakin9 is a free, online, monthly publication on IT Security. The magazine is published in English and is available in the Internet as a FREE download. It is a source of advanced, practical guidelines regarding the latest hacking methods as well as the ways of securing systems, networks and applications.
6c4cdf8822c1a71f13af61e85f40465f Hakin9: Identity Theft! 

In this issue:
  • Identity Proof Your Personal Data by Julian Evans
    There doesn’t appear to be a day that passes where we don’t hear about a corporate or government network data breach in the media. Whatever individuals or businesses do, we all fail miserably when it comes to protecting our most valued assets – personal and financial information. So what is a data breach and how will it affect businesses, government and individuals?
  • Guarding Against Identity Theft by Gary Miliefsky
    In my last article I made predictions on the ever growing and dynamic landscape of cyberwar and cybercrime – bottom line, some of my predictions are already coming true this year so it’s time to become even more vigilant to guard your personal identity and for your organization to do the same.
  • The Best Way to Learn and Apply Cryptography by Arkadius C. Litwinczuk
    The CrypTool project is about making the sometimes daunting subject of cryptography more accessible and easy to understand. It is the most comprehensive cryptography learning tool worldwide.
  • Analysis of a Scam by Rich Hoggan
    It’s all to often that we hear about being scammed on the Internet especially when using Craigslist – the popular website for selling and buying almost anything on the Internet. But it seems as though the majority of the website has become devoted to messages warning us of the potential for getting scammed.
  • Secure Env for PT by Antonio Merola
    Security awareness guideline about setting a controlled environment to conduct technical security testing and assessments, in order to protect companies and professionals from possible legal implications.
  • Knowing VoIP – part III by Winston Santos
    In previous chapters we have talked about the marvelous world of VoIP, what it allows us to do, accomplish and so on. Now let’s focus on the dangers that we need to be aware of and the countermeasure as well.
  • Bluetooth Mice Can Leak Your Passwords! by Aniket Pingley, Xian Pan, Nan Zhang, Xinwen Fu
    In this article, we will introduce a hidden vulnerability in Bluetooth mouse communication that may leak critical information including passwords. Bluetooth mouse communication is generally unencrypted. By sniffing raw Bluetooth mouse communication, we are able to reconstruct the mouse trajectory on screen with default mouse acceleration enabled. Therefore, if passwords are typed through a software keyboard, the sniffed mouse movement will expose the passwords.
Inorder to download the free magazine, you need to be registered with the site. So, what are you waiting for? Go ahead and register yourselves and download the free e-book here.
Source: PentestIT

0 comments: