United Arab Emirate's site for security news, latest security blog posts, security podcasts, hardware hacks and security related links.

Sunday, December 28, 2008

Mod Ed iPhone.com - UAE Hackers' guide to everything iPhone

modediphone.com is our new website :) Looks like UAEHackers.com but is dedicated to the iPhone and modding it! Arabic guides will be added soon inshallah :) For now, give the site a visit and give us some feedback! It has all your iPhone news, links and rss feeds in one convenient place.

iphone at uaehackers dawt com!

http://www.modediphone.com/

Friday, December 26, 2008

Dubai Hacker , Dubai Sec.com and UAE Hacker.com are now our Domains :)

We have successfully acquired the following domains names:

- UAE Hackers .com
- UAE Hacker .com
- Dubai Hackers .com
- Dubai Hacker .com
- Dubai Con .com
- Dubai Sec .com
- UAE IT .com
- UAE WWW .com
- UAE GSM .com

We even have UAE RAK .com representing all the hackers from RAK (Ras Al Khaimah!)



Some of these domains already point to uaehackers.com while others are in the process of being ported :) DubaiHacker.com is an exception as it is a stand alone site that has nothing to do with security but rather the hacking involved is Life Hacking ;)

Thanks for all the loyal readers for supporting us so far and providing us with tips on stories and upcoming events in the UAE and the Middle East region :) Also, for supporting us by clicking our sponsors' ads.

If you are interested in buying any of the domains above, please let us know :) These domains are only sold to people who will provide them with a good home though :P

Saturday, December 13, 2008

Top 9 IT security threats for 2009

Threat #1 Malicious Insiders (Rising Threat)

Threat #2 Malware (Steady Threat)

Threat #3 Exploited Vulnerabilities (Weakening Threat)

Threat #4 Social Engineering (Rising Threat)

Threat #5 Careless Employees (Rising Threat)

Threat #6 Reduced Budgets (Rising Threat)

Threat #7 Remote Workers & Road Warriors (Steady Threat)

Threat #8 Unstable 3rd Party Providers (Rising Threat)

Threat #9 Downloaded Software Including Open Source and P2P files (Steady Threat)

More details here:
Top 9 IT security threats for 2009

Google's Browser Security Handbook

A comprehensive, 60-page document meant to provide web application developers and information security researchers with a one-stop reference to several hundred key security properties and sometimes counterintuitive quirks in contemporary web browsers:
To start reading the hand book, head to:
Browser Security Handbook landing page

Thursday, December 11, 2008

Pirates of the Amazon - A taste of things to come?



There is a new FireFox add-on that adds a "Download 4 Free" button to the Amazon.com website. This a new method for making content available to end users and continues the trend of making content available to consumers through ad supported websites and services rather than the consumers paying for the content.

These sites like Pirate Bay are ad supported. Similar ways of making content available through alternative channels to consumers include attacks on iTunes with dTunes and on the App Store with AppShare.

For more on this visit:
http://ipodtouched.net/index.php?p=1563

Another trend is media streaming of content on ad supported sites. Hulu.com and NinjaVideo.com are just two examples of sites that do exactly that. More sites can be found on ovguide.com.

We at uaehackers.com do not endorse any of these sites but rather we shed a light on their existence so our readers are not kept in the dark about such emerging trends :)

Sunday, December 7, 2008

What is the Best Anti-Virus (AV)?

We get asked this question all the time! If anyone knows that you are a nerd or that you have anything to do with IT or security, this is the question they are going to ask you first.

So how do you answer such a question? The short answer is simply: It depends!

The long answer is: It depends on what system you are running and a whole other factors such as the user's nerdiness level and many other factors.

If the person asking the question is a nerd, then the answer is easy: Check out the latest academic or industry papers on the subject:

Here is an industry paper on the subject:
http://arstechnica.com/journals/microsoft.ars/2008/12/04/av-comparatives-november-2008-report-only-nod32-worthy

Here is an academic paper on the subject:
http://scissec.scis.ecu.edu.au/conferences/viewabstract.php?id=70&cf=2

One thing to keep in mind is that you have to check AV software evaluations frequently. This is because what happens to be the best software today might not be the best in year or so. So you have to keep yourself up-to-date all the time.

NEWS FEEDS:

SecurityStreet:

PandaLabs Blog

Webroot Threat Blog

Daily Infosec News

HITBSecNews

Naked Security - Sophos

Taddong

Zone-H.org News

CGISecurity

ArsTechnica:

HACK A DAY

Help Net Sec

The Spanner

Middle East Technology News

Selil Blog

HACKING IN THE NEWS

HACKING NEWS TICKER

Loading...

Special Defacements

The Certified Geek

DoS Files ≈ Packet Storm

E Hacking News

Banned in UAE:

The following websites are blocked by ISPs in UAE.

News ≈ Packet Storm

DARKNET

MySecured.com

Copyright © 2008-2009 UAE Hackers.com .
All rights reserved.