hakin9_2010_02_27.pdf

(12174 KB) Pobierz
429832160 UNPDF
429832160.002.png
429832160.003.png
Secure 2010
Some people say 2010 will be the year of security. After the
world’s economic crisis and growing possibilities that appear in
the times of cloud computing and virtualization, companies and
enterprises computers and data are put at risk.
It not only concerns business – it affects individual users as
well. Attacks on Twitter and other portals recently have shown us
that nothing is safe, even though they do not contain any secret
data or sensitive information. Why are they attacked? To show
the security gaps? Give a proof of their power and unlimited
possibilities? Either way, those things are happening.
Recent attacks have shown that the security field needs to
evolve much faster than all other branches of technology. We
at hakin9 magazine are striving to give you the most recent
information and solutions that can keep your private computer
and data safe.
In this issue we focus on exploits and exploitation methods
that you may come across: mobile exploits, Null pointer
dereferences. You will find articles on movement on the mobile
exploit front, privacy keeping & exploitation methods, methods
of secrecy, manipulating the network with PacketFu and much
more.
As usual Julian Evans, our IT security expert discusses
malware trends expected in 2010 and Matthew Jonkman provide
a great emerging threats section!
As an addition you can read book and tool reviews -this time
even more than usual.
Enjoy!
hakin9 team
429832160.004.png
429832160.005.png
429832160.001.png
Zgłoś jeśli naruszono regulamin