Skip to main content

Feed aggregator

Important OpenSSL Patch – 6 More Vulnerabilities

Ethical Hacking News - Fri, 06/06/2014 - 18:30
So after the Heartbleed vulnerability in OpenSSL that turned the World upside down, there has a been a lot of focus on the codebase and the manner in which it was written. They’ve raised a bunch of money, an audit is underway and there has even been a fairly serious branch named LibreSSL (who are [...] The post Important OpenSSL Patch...

Read the full post at

Five proofreading tools to make your work more professional

News for IT professionals - Thu, 05/06/2014 - 23:03
Mistakes in your writing make you look careless or clueless -- neither of which is good for your professional image. Luckily, plenty of apps are available to help you clean up your work.
Categories: Technical Feeds

The Craving For Bigger Screen Smartphones Is Coming From Emotional Needs - CrazyEngineers

Technical Google News - Thu, 05/06/2014 - 22:26

Indian Express

The Craving For Bigger Screen Smartphones Is Coming From Emotional Needs
Researchers at the Penn State University have found that the obsession of the general populace for bigger phone size may just well be for emotional reasons more than practical ones. The study conducted on 130 participants concluded that people using ...
Emotional reasons and not practical ones influence people to buy bigger ...Deccan Chronicle

all 34 news articles »
Categories: Technical Feeds

Is BYOD here to stay? Maybe it's just a phase you're going through

News for IT professionals - Thu, 05/06/2014 - 15:01
BYOD may not be a certainty for enterprise, as figures reveal the proportion of companies supporting the trend is tailing off.
Categories: Technical Feeds

OWASP NINJA-PingU – High Performance Large Scale Network Scanner

Ethical Hacking News - Wed, 04/06/2014 - 21:02
NINJA-PingU (NINJA-PingU Is Not Just A Ping Utility) is a free open-source high performance network scanner tool for large scale analysis. It has been designed with performance as its primary goal and developed as a framework to allow easy plugin integration. Essentially it’s a high performance, large scale network scanner, the likes of...

Read the full post at

Spotify Hacked – Rolls Out New Android App

Ethical Hacking News - Mon, 02/06/2014 - 19:54
So it looks like Spotify was hacked, or at least suffered some kind of breach – they claim user data for only one user was accessed and no payment details or password information was leaked. So it doesn’t seem to serious, but Spotify are reacting responsibly (which is good to see), disclosing the breach and [...] The post Spotify...

Read the full post at

Bro – Passive Open-Source Network Traffic Analyzer

Ethical Hacking News - Fri, 30/05/2014 - 14:51
While focusing on network security monitoring, Bro provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Bro has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many...

Read the full post at

Microsoft Surface: Nice hardware, but where's the roadmap?

News for IT professionals - Thu, 29/05/2014 - 18:59
Surface Pro 3 is a step in the right direction say tech chiefs, but more work is still needed says TechRepublic's CIO Jury.
Categories: Technical Feeds

Pirated ‘Watch Dogs’ Game Made A Bitcoin Mining Botnet

Ethical Hacking News - Wed, 28/05/2014 - 20:56
Pretty smart idea this one, we wrote about Yahoo! spreading Bitcoin mining malware back in January, but we haven’t really seen any of that type of activity since then. But this, this is a much better target audience – gamers with high powered GPUs! Especially as this is one of most hyped ‘next-gen’ games for [...] The post...

Read the full post at

10 worst practices that are likely to break QuickBooks

News for IT professionals - Wed, 28/05/2014 - 01:52
It's not hard to make QuickBooks fail, break, and refuse to work as reliably as it should. Here are a few common mistakes that can send it off the rails.
Categories: Technical Feeds

Overcome the language barrier with these five free translation apps

News for IT professionals - Tue, 27/05/2014 - 21:19
Language translation tools have come a long way, offering various input methods and support for dozens of languages.
Categories: Technical Feeds

Moscrack – Cluster Cracking Tool For WPA Keys

Ethical Hacking News - Mon, 26/05/2014 - 17:06
Moscrack is a PERL application designed to facilitate cracking WPA keys in parallel on a group of computers. This is accomplished by use of either Mosix clustering software, SSH or RSH access to a number of nodes. With Moscrack’s new plugin framework, hash cracking has become possible. SHA256/512, DES, MD5 and *Blowfish Unix password hashes...

Read the full post at

10 things you can do right now to save money on your enterprise systems

News for IT professionals - Fri, 23/05/2014 - 01:18
The burden of supporting enterprise IT infrastructure can be significant. Here are several things to consider as you look at ways to reduce the cost.
Categories: Technical Feeds

eBay Hacked – 128 Million Users To Reset Passwords

Ethical Hacking News - Thu, 22/05/2014 - 16:54
The big news this week is that the massive online auction site eBay has been hacked, the compromise appears to have taken place a few months around February/March but has only come to light recently when employee login credentials were used. This is 3 times bigger than the massive 42 Million passwords leaked by Cupid [...] The post eBay Hacked...

Read the full post at

Streamline your documentation efforts with the help of these five apps

News for IT professionals - Wed, 21/05/2014 - 02:35
If you fail to document your systems or projects, you (or those who inherit your work) are likely to regret it. Luckily, plenty of apps are available to simplify the task.
Categories: Technical Feeds

Hook Analyser 3.1 – Malware Analysis Tool

Ethical Hacking News - Tue, 20/05/2014 - 15:42
Hook Analyser is a freeware application which allows an investigator/analyst to perform “static & run-time / dynamic” analysis of suspicious applications, also gather (analyse & co-related) threat intelligence related information (or data) from various open sources on the Internet. Essentially it’s a malware analysis...

Read the full post at

10 things you need to know about using Word fields

News for IT professionals - Sat, 17/05/2014 - 01:36
Fields are among Word's most powerful and versatile features, capable of generating and displaying all kinds of useful information with little (or no) effort on your part.
Categories: Technical Feeds

Five free apps to help you feel at home in an unfamiliar city

News for IT professionals - Thu, 15/05/2014 - 01:43
Business travel has gotten more convenient and less stressful thanks to apps like these.
Categories: Technical Feeds

Getting to know you: The race to build a better virtual assistant

News for IT professionals - Wed, 14/05/2014 - 18:33
Speech recognition company Nuance is working on a project that could allow virtual assistants to know what you want before you've asked for it.
Categories: Technical Feeds
Syndicate content