modediphone.com is our new website :) Looks like UAEHackers.com but is dedicated to the iPhone and modding it! Arabic guides will be added soon inshallah :) For now, give the site a visit and give us some feedback! It has all your iPhone news, links and rss feeds in one convenient place.
iphone at uaehackers dawt com!
http://www.modediphone.com/
United Arab Emirate's site for security news, latest security blog posts, security podcasts, hardware hacks and security related links.
Sunday, December 28, 2008
Friday, December 26, 2008
Dubai Hacker , Dubai Sec.com and UAE Hacker.com are now our Domains :)
We have successfully acquired the following domains names:
- UAE Hackers .com
- UAE Hacker .com
- Dubai Hackers .com
- Dubai Hacker .com
- Dubai Con .com
- Dubai Sec .com
- UAE IT .com
- UAE WWW .com
- UAE GSM .com
We even have UAE RAK .com representing all the hackers from RAK (Ras Al Khaimah!)
Some of these domains already point to uaehackers.com while others are in the process of being ported :) DubaiHacker.com is an exception as it is a stand alone site that has nothing to do with security but rather the hacking involved is Life Hacking ;)
Thanks for all the loyal readers for supporting us so far and providing us with tips on stories and upcoming events in the UAE and the Middle East region :) Also, for supporting us by clicking our sponsors' ads.
If you are interested in buying any of the domains above, please let us know :) These domains are only sold to people who will provide them with a good home though :P
- UAE Hackers .com
- UAE Hacker .com
- Dubai Hackers .com
- Dubai Hacker .com
- Dubai Con .com
- Dubai Sec .com
- UAE IT .com
- UAE WWW .com
- UAE GSM .com
We even have UAE RAK .com representing all the hackers from RAK (Ras Al Khaimah!)
Some of these domains already point to uaehackers.com while others are in the process of being ported :) DubaiHacker.com is an exception as it is a stand alone site that has nothing to do with security but rather the hacking involved is Life Hacking ;)
Thanks for all the loyal readers for supporting us so far and providing us with tips on stories and upcoming events in the UAE and the Middle East region :) Also, for supporting us by clicking our sponsors' ads.
If you are interested in buying any of the domains above, please let us know :) These domains are only sold to people who will provide them with a good home though :P
Wednesday, December 24, 2008
Saturday, December 13, 2008
Top 9 IT security threats for 2009
Threat #1 Malicious Insiders (Rising Threat)
Threat #2 Malware (Steady Threat)
Threat #3 Exploited Vulnerabilities (Weakening Threat)
Threat #4 Social Engineering (Rising Threat)
Threat #5 Careless Employees (Rising Threat)
Threat #6 Reduced Budgets (Rising Threat)
Threat #7 Remote Workers & Road Warriors (Steady Threat)
Threat #8 Unstable 3rd Party Providers (Rising Threat)
Threat #9 Downloaded Software Including Open Source and P2P files (Steady Threat)
More details here:
Top 9 IT security threats for 2009
Threat #2 Malware (Steady Threat)
Threat #3 Exploited Vulnerabilities (Weakening Threat)
Threat #4 Social Engineering (Rising Threat)
Threat #5 Careless Employees (Rising Threat)
Threat #6 Reduced Budgets (Rising Threat)
Threat #7 Remote Workers & Road Warriors (Steady Threat)
Threat #8 Unstable 3rd Party Providers (Rising Threat)
Threat #9 Downloaded Software Including Open Source and P2P files (Steady Threat)
More details here:
Top 9 IT security threats for 2009
Google's Browser Security Handbook
A comprehensive, 60-page document meant to provide web application developers and information security researchers with a one-stop reference to several hundred key security properties and sometimes counterintuitive quirks in contemporary web browsers:
To start reading the hand book, head to:
Browser Security Handbook landing page
To start reading the hand book, head to:
Browser Security Handbook landing page
Thursday, December 11, 2008
Pirates of the Amazon - A taste of things to come?
There is a new FireFox add-on that adds a "Download 4 Free" button to the Amazon.com website. This a new method for making content available to end users and continues the trend of making content available to consumers through ad supported websites and services rather than the consumers paying for the content.
These sites like Pirate Bay are ad supported. Similar ways of making content available through alternative channels to consumers include attacks on iTunes with dTunes and on the App Store with AppShare.
For more on this visit:
http://ipodtouched.net/index.php?p=1563
Another trend is media streaming of content on ad supported sites. Hulu.com and NinjaVideo.com are just two examples of sites that do exactly that. More sites can be found on ovguide.com.
We at uaehackers.com do not endorse any of these sites but rather we shed a light on their existence so our readers are not kept in the dark about such emerging trends :)
Sunday, December 7, 2008
What is the Best Anti-Virus (AV)?
We get asked this question all the time! If anyone knows that you are a nerd or that you have anything to do with IT or security, this is the question they are going to ask you first.
So how do you answer such a question? The short answer is simply: It depends!
The long answer is: It depends on what system you are running and a whole other factors such as the user's nerdiness level and many other factors.
If the person asking the question is a nerd, then the answer is easy: Check out the latest academic or industry papers on the subject:
Here is an industry paper on the subject:
http://arstechnica.com/journals/microsoft.ars/2008/12/04/av-comparatives-november-2008-report-only-nod32-worthy
Here is an academic paper on the subject:
http://scissec.scis.ecu.edu.au/conferences/viewabstract.php?id=70&cf=2
One thing to keep in mind is that you have to check AV software evaluations frequently. This is because what happens to be the best software today might not be the best in year or so. So you have to keep yourself up-to-date all the time.
So how do you answer such a question? The short answer is simply: It depends!
The long answer is: It depends on what system you are running and a whole other factors such as the user's nerdiness level and many other factors.
If the person asking the question is a nerd, then the answer is easy: Check out the latest academic or industry papers on the subject:
Here is an industry paper on the subject:
http://arstechnica.com/journals/microsoft.ars/2008/12/04/av-comparatives-november-2008-report-only-nod32-worthy
Here is an academic paper on the subject:
http://scissec.scis.ecu.edu.au/conferences/viewabstract.php?id=70&cf=2
One thing to keep in mind is that you have to check AV software evaluations frequently. This is because what happens to be the best software today might not be the best in year or so. So you have to keep yourself up-to-date all the time.
Subscribe to:
Posts (Atom)
SecurityStreet:
PandaLabs Blog
Webroot Threat Blog
Daily Infosec News
HITBSecNews
Naked Security - Sophos
Taddong
Zone-H.org News
CGISecurity
ArsTechnica:
HACK A DAY
Help Net Sec
The Spanner
Middle East Technology News
CRIME
Selil Blog
HACKING IN THE NEWS
Special Defacements
The Certified Geek
DoS Files ≈ Packet Storm
E Hacking News
Banned in UAE:
The following websites are blocked by ISPs in UAE.
News ≈ Packet Storm
DARKNET
MySecured.com
All rights reserved.