Cain & Abel v4.9.26 released

Tuesday, January 6th, 2009

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords ...

Lock Down Your Data

Saturday, December 20th, 2008

This is a great list of various things you can do to protect your data.  Here's a quick summary: 10. Wipe that iPhone (or BlackBerry) before trading in. 9. Use virtual credit cards for iffy online buys. 8. Hide data inside files with steganography. 7. Plan for the worst. 6. Get smarter on security questions. 5. ...

Once Thought Safe, WPA Wi-Fi Encryption Is Cracked

Friday, November 7th, 2008

Security researchers say they've developed a way to partially crack the Wi-Fi Protected Access (WPA) encryption standard used to protect data on many wireless networks. The attack, described as the first practical attack on WPA, will be discussed at the PacSec conference in Tokyo next week. There, researcher Erik Tews will ...

Firefox extension protects against man-in-the-middle attacks

Tuesday, August 26th, 2008

Researchers at Carnegie Mellon University have released an extension for Firefox 3 that can protect wireless network users from so-called "man-in-the-middle" attacks. The software, dubbed "Perspectives," is available for download for free. Perspectives also protects against attacks that exploit a recently exposed flaw in the DNS system, which translates Web addresses into ...

Wi-Fi networks suffer ‘autoimmune’ attacks

Monday, August 4th, 2008

JUST as the body's immune system sometimes mistakenly attacks its own cells, so the security software intended to protect network users can be fooled into attacking them. This could make attacks by hackers even harder to detect and prevent.Security software typically prevents unauthorised access by encrypting most of the data ...