How To Hijack Fast Food Drive-Thru Frequencies
This is an article I found on the Phone Losers site I thought I would…
Google Helps Find Webcam’s
The below lines can be placed into Google to find hidden cams on the net.…
Trojan software has been found in ATMs located in Eastern Europe
This is Great, I want one of these cards and a list of ATM’s. http://www.sophos.com/blogs/gc/g/2009/03/18/details-diebold-atm-trojan-horse-case/…
DUKPT Overview and Transaction notes
Hi, I was asked on another post relating to DUKPT to provide some backgound. Given…
SQL Injection Cheat Sheets
From Pentestmonkey.net, this is a great list of SQL Injection cheat sheets. Oracle MSSQL MySQL…
Secure Application Development links
Hi, I have been putting some secure application development documents together recently and have found…
Internet Banking Security Assessment Considerations
I was asked some time ago to provide a list of things which may be…
Mobile Banking Security and Risk Assessment Considerations
When considering Mobile Banking security and the associated risks, an assessment approach depends greatly on…