XARA – An old way to hack: Cross Application Resource Access

Cross Application Resource Access = XARA  is another way to hack applications on a computer, it was researched with the following paper:  https://drive.google.com/file/d/0BxxXk1d3yyuZOFlsdkNMSGswSGs/view The Mac OSX and iOS operating systems were tested in the research paper by the 6 researchers:  Luyi Xing,  Xiaolong Bai, tongxin Li, XiaoFeng Wang, Kai Chen, and Xiaojing Liao In fact … Read more

Kenn White says OpenSSL Being Rewritten

At last weeks Showmecon Kenn White spoke about the project he is auditing OpenSSL. the following is from the webpage https://opencryptoaudit.org/people   When I first walked in to listen to his speech at the show, I was not paying attention, as the topic seemed to be about how some basic hacks were occuring. Including the ones … Read more

Assume YOU Are Hacked!!!

Let me explain with a small history lesson: It is a good assumption that as the Internet helped create a global community, we are no longer connecting our computers to a LAN – Local Area Network with a firewall that can defend the network against  the local regional troublemakers(the local youth or hackers that are learning … Read more

Criminal Hackers Have 1000% ROI on Ransomware & Exploits

Trustedwave released a 110 page Global Security Report This article will review the ROI portion of the report.   This report focuses on breaches on TrustedWave investigations (as Trustedwave has many security services and products) so this report is trying to help sell their services. One could say it is a competitor of consultants and … Read more