Kali Linux 2.0 Upgrade is Out

 Security  Comments Off on Kali Linux 2.0 Upgrade is Out
Aug 112015

Fall on your knees and kiss the earth in gratitude.

Folks, Kali Linux 2.0 has just been released.

In case you’ve just arrived from Mars or Uranus, Kali is the mother of Linux penetrating distributions.

So what’s new in Kali 2.0?

A lot of goodies in there, a lot! So continue reading!

Kali Linux 2.0 Upgrade is Out

New Features in Kali Linux 2.0

Continue reading »

Samsung, Google Vow to Fix Android Security Nightmare

 Android, Security  Comments Off on Samsung, Google Vow to Fix Android Security Nightmare
Aug 052015

Google Nexus 5Security has been a nightmare for hundreds of millions of Android device owners given the slow/nil issue of patches for even serious vulnerabilities.

But some relief is finally at hand for owners of Google and Samsung mobile devices.

Security – Samsung, Google Act

Anxious to counter widely held perceptions that Android mobile devices are not as secure as their iOS counterparts, Samsung and Google today separately announced major overhauls to their security update policies.

Samsung Electronics plans to implement a new Android security update process to fast track security patches over the air when security vulnerabilities are uncovered.

The goal is to send out security updates regularly about once per month.

The South Korean electronics giant said it’d disclose details about the new security update policies for specific models and timelines after talking to its carrier partners. Continue reading »

 Posted by at 8:06 pm

BackBox gets Upgraded to 4.3

 Linux, Security  Comments Off on BackBox gets Upgraded to 4.3
Aug 022015

Backbox 4.3The good folks at BackBox have put out an upgrade to their penetration testing distro Backbox Linux.

Release 4.3 of Backbox Linux features Linux Kernel 3.16 and Ruby 2.1.

For those unfamiliar with BackBox, think of it as a younger sibling to Kali Linux, the numero uno penetration testing distro.

BackBox has lesser number of tools than Kali but comes with a better user interface and includes the anonymizing software tor (with Kali, you have to install tor separately).

BackBox distro includes tools for information gathering, vulnerability assessment, exploitation, privilege escalation, maintaining access, malware analysis, forensic analysis, mobile analysis, social engineering and stress testing.

I recently installed BackBox 4.3 as a guest OS via VirtualBox, quickly updated it and happy to report that the upgrade works fine.

What’s new in Backbox 4.3

So you might ask what’s new in Backbox 4.3. Continue reading »

 Posted by at 10:48 pm  Tagged with:

Hail Mary! Kali Linux 2.0 Arriving on August 11

 Linux, Security  Comments Off on Hail Mary! Kali Linux 2.0 Arriving on August 11
Aug 022015

Kali Linux 2.0 Penetration Testing ToolsMark your calendar, sound the bugles and herald the dawn of a new era, my good friends.

The angels at Kali have announced D-Day for the newest version of the world’s ultimate Linux penetration testing distribution.

Folks, the spanking new Kali Linux 2.0 will debut on August 11, 2015.

Oh, what a milestone!

How many of you remember that the first version of Kali was born on May 26, 2006 (was that Backtrack 1.0?).

Kali Linux, as we now know it, first appeared on March 13, 2013.

Kali Linux 2.0 – New Stuff

So what should we expect from Kali Linux 2.0? Continue reading »

 Posted by at 12:43 am  Tagged with:

No Safe Havens – Malware Epidemic Reaches Linux

 Security  Comments Off on No Safe Havens – Malware Epidemic Reaches Linux
Jul 292015

Sophos Linux Anit-Virus ToolConventional wisdom would have us believe that Linux servers are a million times more secure than Windows servers.

On several occasions, I’ve come across tech magazine articles and blog posts that Linux servers do not need anti-virus software because Linux is free from the malware plague that has laid waste to Windows servers and desktops.

Alas, the truth is a different beast according to the security mavens at Sophos.

As we should have long realized, when humans enter the picture there are no safe havens anywhere

Linux Servers – Malware Epidemic

A recent Sophos study of 178,000 newly-infected web servers has brought out some extremely distressing facts about Linux. Continue reading »

 Posted by at 2:01 pm

How to Verify md5, sha1 and sha256 Checksum on Mac

 Apple, Security  Comments Off on How to Verify md5, sha1 and sha256 Checksum on Mac
Jul 202015

How to Verify Checksum on MacWhen we download or exchange a file, we need to be sure of the integrity of the file we have downloaded or exchanged.

By integrity, we mean checking if the file was corrupted or tampered with during download.

To ensure that the iso or any other file we downloaded is the same file as the one at the source, we do a Checksum verification.

Think of Checksum as a digital signature (comprising of a long string of numbers) used to verify the integrity of a downloaded file.

Checksum Verification

Here’s how to do a Checksum verification when you download a file to your MacBook, Mac Mini or iMac.

Major sites in the open source universe provide the md5 or shasum as a string of numbers when you download an OS like Ubuntu or an application. Copy the md5 or shasum number to a notepad so that you can compare it with the Checksum you generate.

Load up the terminal and run the md5 or shasum commands to verify the Checksums of your download. Continue reading »

 Posted by at 11:40 am