How Packet Sniffer Work ?

Packet Sniffing dikenal pula sebagai protocol analyzer yang sebenarnya merupakan tools yang umum digunakan oleh Network…

Two Thirds of Personal Banking Apps Found Full of Vulnerabilities

A researcher looked at the security of home banking apps, and found shocking results. Forty home…

The Onion explains how its Twitter account was hacked

IDG News Service – Hackers who commandeered The Onion’s Twitter account used simple but effective phishing attacks…

Does Facebook hold the key to security and user experience?

The “I forgot my password” button is familiar to everyone, but a friend to no one.…

Windows Server 2012

Cloud computing in general, and private clouds in particular, have emerged as a response to the…

Updating Hash Security: NIST and SHA-3

The NIST (National Institute of Standards and Technology) is holding a competition aimed at finding the…

Anonymous claims to expose bank executive details

Hacktivist group Anonymous said it has posted the sensitive details of 4,000 bank executives on a government website.…

How to Avoid a Hacktivist Attack

Last year saw a massive surge in hacktivism – hacking motivated by political and social objectives…

Laptop Security: The First Line of Defense

White Papers – Laptop Security: The First Line of Defense – By Kensington Companies invest millions of…