Hacking and Security Articles
Defcon 21 - The Secret Life of SIM Cards
So guys while going through some videos tumbled upon this one. Its really informative covering the aspect of SIM exploitation which has many dimensions and is often neglected by us. It gives an insight about the working, communication creation of a SIM programm. Done with some really easy code(only ... continue reading
Basics of Intrusion Detection Systems
Intrusion detection encompasses a range of security techniques designed to detect (and report) malicious system and network activity or to record evidence of intrusion. To understand intrusion detection one must fully understand what intrusion is. Webster's dictionary defines an intrusi... continue reading
Phone Phreaking - Now & Then
The article presented here is about the various methods of phone phreaking as one of the early manifestations of hacking into systems. Phreaking as we know it, is defined as playing , experimenting and exploiting the telephone network.
Who are phone phreaks?
A phone phreak is generally... continue reading
[TED] NSA is spying on us... but there are others
Another very interesting video from TED in which James Lyne reminds us that it's not only the NSA that's watching us, but ever-more-sophisticated cybercriminals, who exploit both weak code and trusting human nature.
In that video you will see, for instance, the XSS attack that you can better unders... continue reading
[TED] How the NSA betrayed the world's trust
In this video from TED you will see what governments are doing to spy on us...
Privacy researcher Christopher Soghoian is somehow showing us the first reason why we need to understand how any device we use work.
Lack of knowledge is our biggest enemy.... continue reading