CyberWar

Si Vis Pacem, Para Bellum

By

Age of Context: Mobile, Sensors, Data and the Future of Privacy

In 2006, co-authors Robert Scoble and Shel Israel wrote Naked Conversations, a book that persuaded businesses to embrace what we now call social media. Six years later they have teamed up again to report that social media is but one of five converging forces that promise to change virtually every aspect of our lives. You know these other forces already: mobile, data, sensors and location-based technology. Combined with social media they form a new generation of personalized technology that knows us better than our closest friends. Armed with that knowledge our personal devices can anticipate what we’ll need next and serve us better than a butler or an executive assistant. The resulting convergent superforce is so powerful that it is ushering in a era the authors call the Age of Context. In this new era, our devices know when to wake us up early because it snowed last night; they contact the people we are supposed to meet with to warn them we’re running late. They even find content worth watching on television. They also promise to cure cancer and make it harder for terrorists to do their damage. Astoundingly, in the coming age you may only receive ads you want to see. Scoble and Israel have spent more than a year researching this book. They report what they have learned from interviewing more than a hundred pioneers of the new technology and by examining hundreds of contextual products. What does it all mean? How will it change society in the future? The authors are unabashed tech enthusiasts, but as they write, an elephant sits in the living room of our book and it is called privacy. We are entering a time when our technology serves us best because it watches us; collecting data on what we do, who we speak with, what we look at. There is no doubt about it: Big Data is watching you. The time to lament the loss of privacy is over. The authors argue that the time is right to demand options that enable people to reclaim some portions of that privacy.

By

The Silent Intelligence – The Internet of Things

The Silent Intelligence is a book about the Internet of Things phenomenon. In it we talk about the history, trends, technology ecosystem and the future of the Internet of Things, Connected Cities, Connected Homes, Connected Health and Connected Cars. We also discuss the most promising areas for entrepreneurs and venture investors. We share exciting stories and unique opinions of over 30 industry veterans, experts and visionaries from Google, Ericcson, AT&T, Qualcomm, Accenture, SAP, MIT, EcoLife Foundation and many others.

We called this book The Silent Intelligence because most of the activity and growth in the space has so far been happening outside of mainstream visibility. We hope that our book will help executives, entrepreneurs, investors and everybody else better understand the opportunities and challenges of the Internet of Things and will get them as excited about the upcoming possibilities as we are.

By

WHATSAPP LAW

WHATSAPP LAW

Today is the age of mobile applications. Various mobile applications of different nature and character are being used by mobile users across the world. One of the most important and popular mobile application is WhatsApp messenger. The advent and the increase growth of WhatsApp messenger has shown not just the popularity of the mobile app but has also given rise to various legal policy and regulatory issues pertaining to use of WhatsApp. A lot of people use WhatsApp in a for granted manner, without understanding the legal ramifications of the use of WhatsApp. However the increase usage of WhatsApp, in different parts of the world, has given rise to various legal and policy considerations and issues which require further discussion as time passes by.
Read More

By

Gray Hat C#: Creating and Automating Security Tools

Learn to use C#'s powerful set of core libraries to automate tedious yet important tasks like performing vulnerability scans, malware analysis, and incident response. With some help from Mono, you can write your own practical security tools that will run on Mac, Linux, and even mobile devices.

Following a crash course in C# and some of its advanced features, you'll learn how to:Write fuzzers that use the HTTP and XML libraries to scan for SQL and XSS injectionGenerate shellcode in Metasploit to create cross-platform and cross-architecture payloadsAutomate Nessus, OpenVAS, and sqlmap to scan for vulnerabilities and exploit SQL injectionsWrite a .NET decompiler for Mac and LinuxParse and read offline registry hives to dump system informationAutomate the security tools Arachni and Metasploit using their MSGPACK RPCs
Read More

By

Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment―that is, reconnaissance―is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data.
Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence. You will also learn how to secure your information online to prevent it being discovered by these reconnaissance methods.
Hacking Web Intelligence is an in-depth technical reference covering the methods and techniques you need to unearth open source information from the Internet and utilize it for the purpose of targeted attack during a security assessment. This book will introduce you to many new and leading-edge reconnaissance, information gathering, and open source intelligence methods and techniques, including metadata extraction tools, advanced search engines, advanced browsers, power searching methods, online anonymity tools such as TOR and i2p, OSINT tools such as Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, Social Network Analysis (SNA), Darkweb/Deepweb, data visualization, and much more.Provides a holistic approach to OSINT and Web recon, showing you how to fit all the data together into actionable intelligenceFocuses on hands-on tools such as TOR, i2p, Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, FOCA, EXIF, Metagoofil, MAT, and many moreCovers key technical topics such as metadata searching, advanced browsers and power searching, online anonymity, Darkweb / Deepweb, Social Network Analysis (SNA), and how to manage, analyze, and visualize the data you gatherIncludes hands-on technical examples and case studies, as well as a Python chapter that shows you how to create your own information-gathering tools and modify existing APIs