passwords
Gawker breach triggers password-changing requests from Yahoo, Twitter
The compromise of Gawker’s database containing some 1.3 million user login credentials and the realization that a lot of users – despite constantly being advised …
New Trojan hijacks shortcuts to ensure its execution
A new information-stealing Trojan that seems to be Chinese in origin has been detected by Avira’ researchers. It is designed to steal usernames and passwords associated …
Gawker Media breach claimed by Gnosis
The credit for the breach of Gawker Media has been claimed by a group that goes by the name of Gnosis, and was apparently a way to get back at the company, its staff and its …
Gawker Media data breach linked to Twitter spam campaign
A recent security breach at Gawker Media which involved the leaking of user passwords for sites such as Gizmodo and Lifehacker, has now been linked to a widespread spam …
Using social networks safely
Everyone uses social networks like Facebook, Twitter or LinkedIn. Although these fantastic sites do have their upside, they also open users up to more computer viruses and …
First credit card with password generator
Gemalto launched the first credit card to combine one-time password security capabilities with standard payment. This innovation allows banks to provide a single card that …
ElcomSoft breaks Firefox, Safari, Opera, and Chrome passwords
Elcomsoft Internet Password Breaker now retrieves cached passwords stored in a variety of email clients and Web browsers. The new update adds Mozilla Firefox, Apple Safari, …
Portable multi-boot security suite Katana 2.0 released
Katana is a portable multi-boot security suite which brings together all of the best security distributions to run from one USB drive. Katana includes distributions which …
One in five card holders use birth date as PIN
Remembering passwords may seem the biggest problem you have when managing your e-mail or social network account, but that’s only because you don’t really believe …
RSYaba: Modular brute force attacker
RSYaba allows you to run brute force attacks against various services in a similar way to Hydra and Medusa. The tool is written in Ruby so modifying the scripts is a lot …
Five tips for safe computer use
Panda Security released a list of the top five tips that computer users should follow to ensure a safe and secure online experience. With the exponential growth of social …
Integrating Hydra with Nessus
The video below shows you how to integrate custom username and password dictionaries with Hydra to your Nessus scans.