Quantcast
Channel: Hack Planet » K.C.
Browsing all 8 articles
Browse latest View live

Cross Platform Trojan : Windows, Mac, Linux – Nobody is safe !

So finally a universal malware has showed up which acts on Windows, Mac and also linux !  The attack was first seen on a Columbian transport website which had been hacked by a third party. This malware...

View Article


Warning: Malware spreading through fake facebook “notifications”

Beware of emails saying that you have been tagged in a photo on facebook as they may be malware instead ! This is a result of a spam email campaign to spread malware. Once you click on the link...

View Article


Raspberri Pwn : Pen test for Raspberry Pi

Want to do penetration testing with your raspberry pi ? Raspberry Pwn Released by Pwnie Express, Security enthusiasts can now easily turn their Raspberry Pi into a full-featured security penetration...

View Article

Andrubis: Scan & analyze android apks

  Andrubis is the analysis of mobile malware, motivated by the rise of malware on android devices, especially smartphones and tablets. The report provided by Andrubis gives the human analyst insight...

View Article

Mobile Malware : Malware On The Go Part 2

Continued from my post Mobile Malware : Malware On The Go Part 1 So what can mobile malware do ? Malicious programs available on the official Android Market(now google play) became yet another headache...

View Article


Social Engineering : Hacking the human mind

Social Engineering is a term that has been popular amongst hackers since more than 30 years now. It can also be looked as the art to hack the human brain using flaws in human psychology. So what is...

View Article

zANTI : The power of Backtrack now on your android

Android Network Toolkit also known as zANTI is the most comprehensive and refined pentest tool for android by Zimperium. Zimperium is founded by white hat hacker Itzhack ‘Zuk’ Avraham and also have...

View Article

Cloud computing threats

Cloud computing is computing resources i.e. hardware and software that is delivered through a network. Cloud computing faces various threats like Ddos, data theft through hacked servers or Man in the...

View Article

Browsing all 8 articles
Browse latest View live