SAN MATEO, Calif.--From the size of the crowd at Maker Faire today, it's clear the world has a growing appetite for DIY innovation. More than 100,000 people were expected for the sixth annual event, taking place at the San Mateo County Event Center this...
iPad Owners Spend More Time Using in Bed than in Bathroom
Users of Apple's iPad and other tablets prefer to spend more time fiddling with their devices in bed than in the bathroom.That’s the assessment of a new study by The Nielsen Co.Nielsen recently surveyed 12,000 tablet, e-reader and smartphone owners in...
Labels:
Article
'Jeopardy!'-Winning Computer Delving Into Medicine

IBM's Watson computer system, best known for defeating the world's best "Jeopardy!" players, now delivers rapid-fire answers to questions about diseases and medicines.The company says it could be suggesting diagnoses and treatments to doctors right at...
Labels:
News
Microsoft and Facebook team up to fight child porn
Facebook is expanding its efforts to fight child pornography using Microsoft technology, Redmond announced in a blog post yesterday.The world's largest social network has joined the National Center for Missing and Exploited Children's PhotoDNA program....
Labels:
News
PG Auto Pro Classifieds Software Shell Upload
############################################################################################################# PG Auto Pro classifieds software (FCKeditor) Arbitary File Upload #### Author : kaMtiEz (kamtiez@exploit-id.com)...
Labels:
Exploit
WordPress EditorMonkey (FCKeditor) Remote File Upload
## WordPress EditorMonkey (FCKeditor) Remote File Upload## Author : kaMtiEz (kamtiez@exploit-id.com)## Homepage : www.indonesiancoder.com | www.exploit-id.com | www.magelangcyber.web.id## Date : 14 May, 2011[ Software Information ][+] Vendor : http://rajprasad.wordpress.com/plugins/editormonkey/[+]...
Labels:
Exploit
Is Google’s Chromebook The Death Knell For Antivirus?

Updated and corrected below.The antivirus industry likely let out a collective groan when Google first made a familiar-sounding boast Wednesday: that the just-launched laptops it’s calling Chromebooks have “security built-in so there is no anti-virus...
Labels:
News
Sony to pay compensation over PlayStation security breach
SONY will compensate millions of PlayStation users whose personal details were hacked in a massive security breach.And yesterday the electronics giant’s CEO Sir Howard Stringer also apologised for the first time to all those affected.On the PlayStation...
Labels:
News
LastPass May Have Been Hacked, Virgin Media Outsources To Accenture, BlackBerry PlayBook Successor

LastPass, a company that allows its users to manage their passwords online, has revealed that it has detected anomalous traffic at its data center which might be due to hackers. The company said on its website that "We know roughly the amount of data...
Labels:
News
Sony apologizes, offers insurance after hacking
Sony Corp. Chairman Howard Stringer apologized and offered U.S. users of its PlayStation Network and Qriocity online services a year of free identity-theft protection after the system was crippled by hackers.Japan's biggest consumer-electronics exporter...
Labels:
News
Apple Supplier Foxconn Forces employees to Sign No Suicide Pact

Apple’s iPhone and iPad supplier Foxconn forced its employees to sign a ‘no suicide’ pact after a series of suicides by employees in Foxconn factories across China.The new revelation is a part of a report released by The Centre for Research on Multinational...
Labels:
News
Google, Facebook Both Looking To Team Up With Skype

Facebook and Google are both reportedly trying to strike a deal with popular VoIP service provider Skype.Sources have told Reuters that Facebook CEO Mark Zuckerberg is mulling an all-out acquisition of the company while another source revealed that the...
Labels:
News
Why Standard & Pro iPhone 5 Handsets Don't Make Sense

Last week, a blog reported that Apple may be releasing two versions of the iPhone 5, one which may be billed as a "standard" one while the other will be presented as the "pro" one.The author of the post on iPhoneDownloadBlog, Alex, quotes anonymous sources...
Labels:
News
Hackers May Have Stolen Details Of 1.25m LastPass Accounts

LastPass, a company that allows its users to manage their passwords online, has revealed that it has detected anomalous traffic at its data center which might be due to hackers.The company said on its website: "We know roughly the amount of data transferred...
Labels:
News
Amazon iPad 2 Tablet Rival Is Real : Taiwan Sources

Amazon is indeed looking to build a credible iPad 2 competitor according to "upstream" sources based in Taiwan who normally receive orders well in advance for components.Digitimes notes that Quanta computer, one of the biggest OEMs from the island, received...
Labels:
News
Sony Nearly Ready To Resume PlayStation Network Services

Sony will begin resuming some PlayStation Network services this week following a massive outage caused by an attack on the company’s servers.According to a press release on the PlayStation blog, the company is gearing up to resume some of the features...
Labels:
News
BackTrack 5 Release

The BackTrack Dev team has worked furiously in the past months on BackTrack 5, code name “revolution”. Today, we are proud to release our work to the public, and then rest for a couple of weeks.This new revision has been built from scratch, and boasts...
Labels:
News
How to Remove Google Redirect Virus 2010-2011?
Google redirect virus is one of the mechanical disorders created in the computers, laptops which directly attack the users Google search main page, leaving the user to redirect and get into wrong malicious programs.This annoying virus is specially promoted...
Labels:
Article
Russian pres fumes at mystery DDoS hack
Russian president Dmitry Medvedev has denounced online vandals who launched an attack against the site that hosts his blog.The denial of service assault on the LiveJournal site on Wednesday was both “outrageous and illegal” the Russian politician fumed...
Labels:
News
Feds defend Twitter dragnet on WikiLeaks
Federal prosecutors on Friday defended their attempts to access the Twitter records of three WikiLeaks supporters, arguing their claims that the dragnet violates their constitutional rights should be rejected.In a 19-page filing in federal court, prosecutors...
Labels:
News
Snortalog Snort Log Summarizer 2.4.3
Snortalog is a powerful Perl script that summarizes Snort logs, making it easy to view any network attacks detected by Snort. It can generate charts in HTML, PDF, and text output. It works with all versions of Snort, and can analyze logs in three formats:...
Labels:
Tools
PHP DoS/DDoS (Denial Of Service) Script

This script enables you to launch a DoS attack from your server (using that nice high bandwidth connection provided by your hosting provider) to bring your victims server/PC to its knees.This script should be used responsibly, I did not create it, im...
Labels:
Tools
Havij v1.14 Advanced SQL Injection

Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page. It can take advantage of a vulnerable web application. By using this software user can perform back-end database...
Labels:
Tools
DVWA Web Hacking

Damn Vulnerable Web Application (DVWA) is a collection of web hacking tool based on PHP / mySQL. DVWA may be an option for beginners to learn web hacking web hacking techniques from scratch. Various techniques web hacking attacks can be obtained from...
Labels:
Tools
Armitage

Armitage is a graphical cyber attack management tool for Metasploit that visualizes your targets, recommends exploits, and exposes the advanced capabilities of the framework. Armitage aims to make Metasploit usable for security practitioners who understand...
Labels:
Tools
Hexjector

Hexjector is an Opensource,Cross Platform PHP script to automate Site Pentest for SQL Injection Vulnerabilties.Features :1.Check for SQL Injection Vulnerablities.2.Pentest SQL Injection Vulnerablities.3.Web Application Firewall Detector.4.Scan For Admin...
Labels:
Tools
Wireless Hacking Tools 2011

Wireless Hacking Tools 2011 | 156.63 MBWiPhire is a Bash script aimed at making the Wireless Hacking process a lot easier. This script was written on Backtrack 4 and designed to be used with Backtrack 4. This script was also designed to be used with...
Labels:
Tools
Remote Administrator with ProRat

Prorat is one of RAT (Remote Administration Tools) are widely used to take over the computer system. Tool made by PRO Group, a group of Turkish hackers community, can be used as a tool Hacking computers in a network. Use of Prorat quite simple, you simply...
Labels:
Tools