z RSA Factorization Attack Using Fermat's Algorithm By packetstormsecurity.com Published On :: Thu, 05 Apr 2018 20:22:20 GMT Script that performs RSA factorization attack using Fermat's algorithm. Full Article
z Amazon's Rekognition Software Can Now Spot Fear By packetstormsecurity.com Published On :: Thu, 15 Aug 2019 16:15:39 GMT Full Article headline amazon science
z Brain Hack Devices Must Be Scrutinized, Say Top Scientists By packetstormsecurity.com Published On :: Mon, 09 Sep 2019 23:41:11 GMT Full Article headline hacker science
z Pandemic Declared As COVID-19 Blazes Across Globe By packetstormsecurity.com Published On :: Thu, 12 Mar 2020 13:12:47 GMT Full Article headline government virus science
z AI Cannot Be Recognized As An Inventor, US Rules By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:28:43 GMT Full Article headline government usa science
z Alleged Ponzi Mastermind Stanford Pwned In Antigua By packetstormsecurity.com Published On :: Tue, 05 Jan 2010 22:12:00 GMT Full Article caribbean
z Switzerland Files Criminal Complaint Over Crypto Spying Scandal By packetstormsecurity.com Published On :: Sun, 01 Mar 2020 15:40:28 GMT Full Article headline government privacy cyberwar germany spyware cryptography switzerland cia
z Zero Day Initiative Advisory 11-109 By packetstormsecurity.com Published On :: Tue, 22 Mar 2011 20:31:31 GMT Zero Day Initiative Advisory 11-109 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari on the iPhone. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the support for parsing Office files. When handling the OfficeArtMetafileHeader the process trusts the cbSize field and performs arithmetic on it before making an allocation. As the result is not checked for overflow, the subsequent allocation can be undersized. Later when copying into this buffer, memory can be corrupted leading to arbitrary code execution under the context of the mobile user on the iPhone. Full Article
z Facebook Emails Seem To Show Zuck Knew Of Privacy Issues By packetstormsecurity.com Published On :: Thu, 13 Jun 2019 16:06:51 GMT Full Article headline privacy email data loss facebook
z URLCrazy Domain Name Typo Tool 0.7.1 By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 18:22:22 GMT URLCrazy is a tool that can generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage. It generates 15 types of domain variants, knows over 8000 common misspellings, supports multiple keyboard layouts, can check if a typo is a valid domain, tests if domain typos are in use, and estimates the popularity of a typo. Full Article
z What makes a successful free zone? By www.fdiintelligence.com Published On :: Thu, 17 Oct 2019 11:00:38 +0000 Dr Samir Hamrouni, CEO of the World Free Zones Organization, outlines the attributes that are essential to flourishing free zones. Full Article
z fDi’s Global Free Zones of the Year 2019 – the winners By www.fdiintelligence.com Published On :: Mon, 14 Oct 2019 08:40:15 +0000 The UAE's DMCC takes home the top prize in fDi’s Global Free Zones of the Year for a fifth consecutive year. Full Article
z Lazarus Pivots To Linux Attacks Through Dacls Trojan By packetstormsecurity.com Published On :: Tue, 17 Dec 2019 15:36:58 GMT Full Article headline malware linux trojan backdoor
z Zen Load Balancer 3.10.1 Directory Traversal By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:32:15 GMT This Metasploit module exploits an authenticated directory traversal vulnerability in Zen Load Balancer version 3.10.1. The flaw exists in index.cgi not properly handling the filelog= parameter which allows a malicious actor to load arbitrary file path. Full Article
z Wireshark Analyzer 2.4.4 By packetstormsecurity.com Published On :: Fri, 12 Jan 2018 01:31:15 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
z Wireshark Analyzer 2.4.5 By packetstormsecurity.com Published On :: Mon, 26 Feb 2018 16:42:25 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
z Wireshark Analyzer 2.4.6 By packetstormsecurity.com Published On :: Tue, 03 Apr 2018 23:03:33 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
z Wireshark Analyzer 2.6.0 By packetstormsecurity.com Published On :: Wed, 25 Apr 2018 00:56:47 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
z Wireshark Analyzer 2.6.1 By packetstormsecurity.com Published On :: Wed, 23 May 2018 07:18:41 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
z Wireshark Analyzer 2.6.2 By packetstormsecurity.com Published On :: Thu, 19 Jul 2018 01:55:38 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
z Wireshark Analyzer 2.6.3 By packetstormsecurity.com Published On :: Fri, 31 Aug 2018 00:54:53 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
z Wireshark Analyzer 2.6.4 By packetstormsecurity.com Published On :: Fri, 12 Oct 2018 00:48:56 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
z Wireshark Analyzer 2.6.5 By packetstormsecurity.com Published On :: Thu, 29 Nov 2018 02:32:44 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
z Wireshark Analyzer 2.6.6 By packetstormsecurity.com Published On :: Tue, 08 Jan 2019 22:52:39 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
z Wireshark Analyzer 2.6.7 By packetstormsecurity.com Published On :: Thu, 28 Feb 2019 02:46:43 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
z Wireshark Analyzer 3.0.0 By packetstormsecurity.com Published On :: Thu, 28 Feb 2019 21:42:50 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
z Wireshark Analyzer 3.0.1 By packetstormsecurity.com Published On :: Tue, 09 Apr 2019 18:15:14 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
z Wireshark Analyzer 3.0.2 By packetstormsecurity.com Published On :: Thu, 23 May 2019 16:41:32 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
z Wireshark Analyzer 3.0.3 By packetstormsecurity.com Published On :: Thu, 18 Jul 2019 19:03:58 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
z Wireshark Analyzer 3.0.4 By packetstormsecurity.com Published On :: Thu, 12 Sep 2019 14:40:35 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
z Wireshark Analyzer 3.0.5 By packetstormsecurity.com Published On :: Fri, 20 Sep 2019 22:18:32 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
z Wireshark Analyzer 3.0.6 By packetstormsecurity.com Published On :: Wed, 23 Oct 2019 20:16:50 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
z Wireshark Analyzer 3.0.7 By packetstormsecurity.com Published On :: Wed, 04 Dec 2019 23:38:08 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
z Wireshark Analyzer 3.2.0 By packetstormsecurity.com Published On :: Wed, 18 Dec 2019 22:32:09 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
z Wireshark Analyzer 3.2.1 By packetstormsecurity.com Published On :: Thu, 16 Jan 2020 16:48:51 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
z Wireshark Analyzer 3.2.2 By packetstormsecurity.com Published On :: Fri, 28 Feb 2020 07:27:45 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
z Wireshark Analyzer 3.2.3 By packetstormsecurity.com Published On :: Thu, 09 Apr 2020 15:00:54 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
z Iran Seizes 1,000 Bitcoin Mining Machines After Power Spike By packetstormsecurity.com Published On :: Fri, 28 Jun 2019 15:12:07 GMT Full Article headline iran cryptography
z Iran Targets Mideast Oil With ZeroCleare Wiper Malware By packetstormsecurity.com Published On :: Wed, 04 Dec 2019 23:47:11 GMT Full Article headline malware cyberwar iran
z How to Recognize a Suspicious Email By feeds.techsoup.org Published On :: Fri, 13 Oct 2017 23:23:30 GMT As champions of National Cyber Security Awareness Month (NCSAM), we're kicking off our first week with a focus on email. Read on for facts and tips on email security from the National Cyber Security Alliance. Across the world, 269 billion emails are sent every day. It's estimated that the average business user will receive 96 emails per day by 2019 (source: Radicati). Given our reliance on the medium, it's no surprise that email is one of cybercriminals' favorite methods of attack. According to the National Cyber Security Alliance, 85 percent of U.S. organizations have experienced a phishing attack and 30 percent of people have opened a phishing email. There are simple steps you can take to ensure that you don't become a victim of a cyberattack. Somewhat like a poker tell, suspicious emails contain hints that the sender isn't who they claim to be. Watch this video to learn how to spot email scams. The Facts About Email Scams Suspicious emails engage in "spoofing," a type of scam in which attackers impersonate a trustworthy entity to make it more likely that the recipient will open and act on the email. Spoofed emails typically employ one of two tactics: Phishing, the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money) for malicious reasons. Spreading malware by getting the user to open malicious email attachments or click on malicious links. Practical Tips on Spotting Suspicious Emails Look carefully at the email and ask yourself the following questions: Do you know or recognize the "from" address or contact's name? Does the message contain incorrect grammar or misspelled words? Does the message ask you to take action on something you didn't request, such as "click on this link to pick the new phone you requested"? If the answer to the first is no, or the answer to the second or third above is yes: Don't click on links. Instead, hover your cursor over links to determine if the address is unknown, suspicious, or misleading: for example, www.microsoft.com.maliciousdomain.it. Don't open any attachments the email contains. If you suspect a work email is a phishing attack, immediately report it to your IT administrator so they can alert your fellow coworkers of the attempted attack. If it's a personal email, most email service providers provide a mechanism to report that. Check out this example from Gmail. Additional Cybersecurity Resources Want to learn more about cybersecurity and how you can keep your data safe? Read our latest blog post about the Equifax breach. Need a little inspiration? Find out how TechSoup and Symantec are making a difference in the lives of at-risk teens. Get more security tips from the National Cyber Security Alliance. National Cyber Security Alliance Month — observed every October — was created as a collaborative effort between government and industry to ensure all Americans have the resources they need to stay safer and more secure online. Find out how you can get involved. Image: National Cyber Security Alliance spanhidden Full Article security communications
z Free zones offer safe haven to investors By www.fdiintelligence.com Published On :: Tue, 17 Dec 2019 10:14:37 +0000 The chief executive of Ras Al Khaimah Economic Zone (RAKEZ), shares his views over the perks of free zones in emerging markets. Full Article
z Tanzanian tourism boom undermined by investor concerns By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:27:06 +0000 Tanzania's economy is booming and its tourism sector is thriving. However, concerns about the president's strong-arm tactics and delays in the completion of key infrastructure projects are threatening this growth. Full Article
z How the Suez Canal Economic Zone is aiding Egypt's economic resurgence By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:13:41 +0000 Combining a strategic location with an investor-friendly environment, Egypt is ensuring its Suez Canal Economic Zone is primed for foreign investment. Full Article
z Hackers Target Remote Workers With Fake Zoom Downloader By packetstormsecurity.com Published On :: Mon, 04 May 2020 15:37:16 GMT Full Article headline hacker privacy malware fraud
z fDi's European Cities and Regions of the Future 2020/21 - FDI Strategy: London and Glasgow take major prizes By www.fdiintelligence.com Published On :: Mon, 10 Feb 2020 16:22:35 +0000 London is crowned best major city in Europe in fDi's FDI Strategy category, with Glasgow, Vilnius, Reykjavik and Galway also winning out. Full Article
z Spotlight: Serbian free zones By www.fdiintelligence.com Published On :: Thu, 20 Feb 2020 16:04:00 +0000 Serbia’s 15 free zones are driving forward an ongoing flurry of foreign investment in the country’s buoyant manufacturing scene, especially in automotives. Full Article
z US Congress: Spying Law Is Flawed, Open To Abuse, And Lacking In Accountability - So Let's Reauthorize It By packetstormsecurity.com Published On :: Fri, 13 Mar 2020 14:49:20 GMT Full Article headline government privacy usa phone spyware nsa
z Booz Allen Analyzed 200+ Russian Hacking Operations By packetstormsecurity.com Published On :: Fri, 27 Mar 2020 12:52:45 GMT Full Article headline government russia cyberwar spyware
z Roaring Trade In Zero-Days Means More Vulns Are Falling Into The Hands Of State Spies By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:36:16 GMT Full Article headline hacker government cyberwar spyware zero day
z A Dozen Nation Backed APTs Tap COVID-19 To Cover Spy Attacks By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 14:32:06 GMT Full Article headline hacker government malware virus cyberwar spyware phish