Normally when one thinks of MiTM (Man In The Middle) attacks over wireless802.11 protocols, thoughts of ARP Poisoning and Wifi-Pineapples come to mind. Traditionally these attacks were conducted against laptops using embedded wireless functionality. Now that most mobile phones and tablet devices have Wifi capabilities in addition to access to their cellular networks, they have added themselves to the list of potential victims.
Archive for December 2012
The natural calamities do often cause losses in many ways including ruining the infrastructure of any business organization and huge data loss. Hence you could see disasters like snowstorms, earthquakes and hurricanes destroying the corporate facilities and data centers to a great extent. Therefore businesses today feel the need of having a tangible disaster recovery plan to deal with any such situation.
The new Mac computer users might believe that Apple systems are safe and have no errors, while breaking into them is almost impossible. If they take a few minutes to learn about them, they can easily figure out that hacking the Mac OS is not such a hard task and there are plenty of related past records. Even Apple announced this kind of problem in 2008, when it suggested advanced security programs to be installed on its products. With more than three hundred times less viruses than Windows, Mac OS X can still be threatened.
Sandcat Browser is a freeware portable pen-test oriented multi-tabbed web browser with extensions support developed by the Syhunt team, the same creators of the Syhunt Web Application Security Scanner. The Sandcat Browser is built on top of Chromium, the same engine that powers the Google Chrome browser, and uses the Lua language to provide extensions and scripting support.