Gawker Media breach claimed by Gnosis

The credit for the breach of Gawker Media has been claimed by a group that goes by the name of Gnosis, and was apparently a way to get back at the company, its staff and its …

Using social networks safely

Everyone uses social networks like Facebook, Twitter or LinkedIn. Although these fantastic sites do have their upside, they also open users up to more computer viruses and …

First credit card with password generator

Gemalto launched the first credit card to combine one-time password security capabilities with standard payment. This innovation allows banks to provide a single card that …

One in five card holders use birth date as PIN

Remembering passwords may seem the biggest problem you have when managing your e-mail or social network account, but that’s only because you don’t really believe …

RSYaba: Modular brute force attacker

RSYaba allows you to run brute force attacks against various services in a similar way to Hydra and Medusa. The tool is written in Ruby so modifying the scripts is a lot …

Five tips for safe computer use

Panda Security released a list of the top five tips that computer users should follow to ensure a safe and secure online experience. With the exponential growth of social …

Integrating Hydra with Nessus

The video below shows you how to integrate custom username and password dictionaries with Hydra to your Nessus scans.