eco

.NET Instrumentation Via MSIL Bytecode Injection

Whitepaper from Phrack called .NET Instrumentation via MSIL bytecode injection.




eco

DevSecOps: A Secured Approach

Whitepaper called DevSecOps: A Secure Approach.




eco

Packet Storm Exploit 2013-0827-1 - Oracle Java ByteComponentRaster.verify() Memory Corruption

The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.




eco

Packet Storm Advisory 2013-0827-1 - Oracle Java ByteComponentRaster.verify()

The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program.




eco

16 DDoS Attacks Take Place Every 60 Seconds, Rates Reach 622 Gbps





eco

Dovecot 2.3 Denial Of Service

Dovecot version 2.3 suffers from multiple denial of service conditions. Included in this archive is the advisory as well as patches to address the issue.






eco

vaxdeco.zip

A VAX decoy script to grab some accunts.




eco

Hashcat Advanced Password Recovery 4.0.0 Binary Release

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release..




eco

Hashcat Advanced Password Recovery 4.0.0 Source Code

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release.




eco

Hashcat Advanced Password Recovery 4.0.1 Binary Release

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release.




eco

Hashcat Advanced Password Recovery 4.0.1 Source Code

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release.




eco

Hashcat Advanced Password Recovery 4.1.0 Binary Release

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release.




eco

Hashcat Advanced Password Recovery 4.1.0 Source Code

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release.




eco

Hashcat Advanced Password Recovery 4.2.0 Binary Release

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release.




eco

Hashcat Advanced Password Recovery 4.2.0 Source Code

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release.




eco

Hashcat Advanced Password Recovery 4.2.1 Binary Release

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release.




eco

Hashcat Advanced Password Recovery 4.2.1 Source Code

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release.




eco

Hashcat Advanced Password Recovery 5.0.0 Binary Release

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release.




eco

Hashcat Advanced Password Recovery 5.0.0 Source Code

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release.




eco

Hashcat Advanced Password Recovery 5.1.0 Binary Release

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release.




eco

Hashcat Advanced Password Recovery 5.1.0 Source Code

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release.




eco

Ecommerce Systempay 1.0 Brute Force

Ecommerce Systempay version 1.0 suffers from a production key brute forcing vulnerability.







eco

Island Economies of the Future 2019/20 – the results

Cyprus is ranked first in fDi’s Island Economies of the Future rankings, followed by the Dominican Republic and Sri Lanka. Cathy Mullan and Naomi Davies detail the results.




eco

Russia most diversified commodity economy for the fourth year

Russia remains fDi’s most diversified commodity economy, while second ranked Brazil has displaced Ukraine into third place. Cathy Mullan reports.




eco

Wireless Decoder 1.0

Wireless Decoder is an application that demonstrates how to recover wireless passwords on Vista/Win7/Win8. Comes with source and the binary.




eco

How to Recognize a Suspicious Email


As champions of National Cyber Security Awareness Month (NCSAM), we're kicking off our first week with a focus on email. Read on for facts and tips on email security from the National Cyber Security Alliance.

Across the world, 269 billion emails are sent every day. It's estimated that the average business user will receive 96 emails per day by 2019 (source: Radicati).

Given our reliance on the medium, it's no surprise that email is one of cybercriminals' favorite methods of attack. According to the National Cyber Security Alliance, 85 percent of U.S. organizations have experienced a phishing attack and 30 percent of people have opened a phishing email.

There are simple steps you can take to ensure that you don't become a victim of a cyberattack. Somewhat like a poker tell, suspicious emails contain hints that the sender isn't who they claim to be.

Watch this video to learn how to spot email scams.

The Facts About Email Scams

  • Suspicious emails engage in "spoofing," a type of scam in which attackers impersonate a trustworthy entity to make it more likely that the recipient will open and act on the email.
  • Spoofed emails typically employ one of two tactics:
    • Phishing, the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money) for malicious reasons.
    • Spreading malware by getting the user to open malicious email attachments or click on malicious links.

Practical Tips on Spotting Suspicious Emails

  • Look carefully at the email and ask yourself the following questions:
    • Do you know or recognize the "from" address or contact's name?
    • Does the message contain incorrect grammar or misspelled words?
    • Does the message ask you to take action on something you didn't request, such as "click on this link to pick the new phone you requested"?
  • If the answer to the first is no, or the answer to the second or third above is yes:
    • Don't click on links. Instead, hover your cursor over links to determine if the address is unknown, suspicious, or misleading: for example, www.microsoft.com.maliciousdomain.it. Don't open any attachments the email contains.
    • If you suspect a work email is a phishing attack, immediately report it to your IT administrator so they can alert your fellow coworkers of the attempted attack. If it's a personal email, most email service providers provide a mechanism to report that. Check out this example from Gmail.

Additional Cybersecurity Resources

  • Want to learn more about cybersecurity and how you can keep your data safe? Read our latest blog post about the Equifax breach.
  • Need a little inspiration? Find out how TechSoup and Symantec are making a difference in the lives of at-risk teens.
  • Get more security tips from the National Cyber Security Alliance. National Cyber Security Alliance Month — observed every October — was created as a collaborative effort between government and industry to ensure all Americans have the resources they need to stay safer and more secure online. Find out how you can get involved.

Image: National Cyber Security Alliance




eco

Egypt planning minister strives for sustainable economic growth

Egypt is well on the way to establishing a diversified economy, claims Hala El Saeed, minister of planning and economic development 




eco

How the Suez Canal Economic Zone is aiding Egypt's economic resurgence

Combining a strategic location with an investor-friendly environment, Egypt is ensuring its Suez Canal Economic Zone is primed for foreign investment. 






eco

A European draw: Eco Equity breaks new ground in medicinal cannabis

Eco Equity is one of only a few Europe-based investors in medicinal cannabis from Africa and the Caribbean, an area in which the UK is missing an opportunity, according to CEO Jon-Paul Doran.




eco

Coronavirus set to shock Middle East's most fragile economies

The pandemic is likely to hit the Middle East’s more fragile countries hardest.




eco

Chinese investment to Europe at record high

Sino-European foreign direct investment is converging, according to data from fDi Markets.




eco

View from the Americas: the evolving political economy of FDI

We are currently in a state of heightened business and economic disruption and sociopolitical activism, which only looks set to intensify. 




eco

Will FDI screening become the new norm?

The trend towards the vetting of foreign investment, especially projects that involve advanced technology and national data or pose potential security threats, is on the rise. David Gabathuler and Matthew T West give a trans-Atlantic perspective.




eco

Free economic zones showcase Belarus's skills and stability

Besides perks such as tax breaks, Belarus’s six free economic zones offer investors convenient logistics and, for companies from neighbouring Ukraine and Russia, a geopolitical safe place to do business. Wendy Atkins reports.





eco

Remote Chinese region looks to set new clean-power record

A sparsely populated Chinese province that’s home to the headwaters of the Yangtze and Yellow rivers is attempting to set a new record for clean energy use, serving as a test bed for the entire country.




eco

US wind farm activity by Fortune 500 breaks records

The American Wind Energy Association (AWEA) has released data for Q2, indicating activity rose to new heights in the wind development sector.




eco

A modern Cinderella story: California’s record on wholesale distributed generation leaves much room for improvement

California, long a progressive leader on renewable energy and climate change mitigation, has neglected a key market segment for renewable energy: the “community-scale,” or “wholesale distributed generation” (DG), market. This market segment is defined as projects below 20 megawatts that connect to the distribution grid and export power to the grid for sale.




eco

DOE: U.S. onshore wind projects achieving record capacity, employment

The U.S. land-based wind industry installed 7,588 MW of capacity last year, bringing the overall utility-scale total to more than 96 GW. 




eco

World’s largest utility joins EWF’s energy blockchain ecosystem

Last week, the Energy Web Foundation (EWF) announced it had officially signed more than 100 affiliates in an effort to become the world’s largest blockchain ecosystem.




eco

Idaho Power sets goal for 100-percent clean energy by 2045; signs record-low solar PPA

Idaho Power unveiled a goal Tuesday to provide 100-percent clean energy by 2045 on the heels of an announcement that it will purchase 120-MW of solar energy through a PPA with Jackpot Holdings at a price of less than US $0.022 cents per kWh.