IT Security Training

Thursday, 16 June 2011

'Operation Malaysia' by Anonymous - Real Threats by Real Hackers



The news on 'Operation Malaysia' appeared on the front page of local Malaysian newspapers today. It caught the attention of many and was a hot topic over the internet.

Anonymous has been circulating their video titled 'Operation Malaysia' and its content reads;

"Greetings, Malaysia, We have seen the censorship taken by the Malaysian government, blocking sites like The Pirate Bay, and WikiLeaks. Malaysia is one of the world's strictest governments, even blocking out movies, and television shows. These acts of censorship are inexcusable. You are taking away a basic human right. The internet is here for freedom, without fear of government interference. Do not think that no one else notices. Your structured government has done the talking, and we hear loud and clear. Let this be an announcement to all your people. This is a sign, a warning, and an opportunity to listen to ideas above your own. In a way you are being stubborn. But how will this help anyone or your country. We fear that if you make further decisions to take away human freedom. We are obligated to act fast and have no mercy. For rules were meant to be broken. And corruption was meant to be washed away and forgiven. Now we will wash your corruption away so be prepared. Take this as a favour."

The cyberworld was never a safe place, and will definitely not be a 100% secure platform for everyone to use safely without any worries. Hackers are becoming diligent at trying to find ways to break into computer systems and this has been going on for years and the number of incidents are growing as the years goes by. Today, the damage done by cybercriminals has increased and they are not afraid anymore, forming into groups and announcing on their attacks.

The world uses the internet where almost every transaction you can think of is taken place. What can we expect in the future for our cyberworld? What do all of you think about 'Operation Malaysia'? Drop us your feedbacks and let us know!

Thursday, 9 June 2011

HackAway this June!

Hey everyone!

This month is an exciting month as there are four different workshops available! Yes, FOUR exciting topics!

The topics had been requested over and over again, so we decided, why not?

If you are interested to sign up, visit June's Hackaway

If you are wondering what Hackaway workshops are, a simple description of HackAway is a special tailor-made workshop which covers hands-on IT Security training for you to experience real-time practice and learn the security tips.

HackAway1 - Social Engineering – The Human Hacking

Date: June 14, 2011 (Tue)
Time: 9.00am-1.00pm

The participants will be exposed with the latest techniques used by the attacker to defeat human protection against any con-based attacks (cheating, acting/pretending). Social engineering have evolved to not only over phone & email.

For more information or registration, visit June's Hackaway - Social Engineering - The Human Hacking

HackAway2 - Malware Exposed

Date: June 18, 2011 (Sat)
Time: 9.00am-1.00pm

'Say Hi to Malware' will introduce various types of malware and its features (hands-on)

Dealing with Malware Incident will expose system / network admin on how to response towards malware cases (include end-users response)

Malware Analysis will share on how to setup lab environment & perform static + dynamic analysis

For more information or registration, visit June's Hackaway - Malware Exposed

HackAway3 - Memory Forensic

Date: June 25, 2011 (Sat)
Time: 9.00am-1.00pm

Memory Forensic has become a very popular incident handling / response procedure in the past few years. This is due to the wealth information hidden in memory/RAM.

In this workshop, participants will expose the method to acquire RAM contents, searching relevant evidences by analyzing the content (running processes, registry details, passwords and even to uncover rootkit).

Today, “Pull-the-plug” is no longer the ultimate solution to first responder.

For more information or registration, visit June's Hackaway - Memory Forensic

HackAway4 - Server Vulnerability Assessment & Penetration Testing

Date: June 30, 2011 (Thu)
Time: 9.00am-1.00pm

Participant will be exposed with a quick "hacker mindset" to be used for penetration testing.

The session will covered the need for reconnaissance, vulnerability scanning, penetration testing proof of concept, business impact demos (crucial steps in closing penetration testing exercise)

For more information or registration, visit June's Hackaway - Server Vulnerability Assessment & Penetration Testing

The fees for the workshop is RM 399.00, but register now to get Early Bird price at RM 99.00!

Grab you seat today as seats are limited to only 20!



Wednesday, 1 June 2011

Redeem your CEH T-Shirt and stand a chance to win an iPad 2!


To those redeeming your T-shirts, we have something else to add on to the fun! EC-Council Academy is giving out an iPad2 in ‘The Best CEH Picture Posting Competition’!

All you need to do is to snap a picture of yourself creatively, wearing your new ‘Certified Ethical Hacker’ T-shirt!

Next is to send the following to admin@eccouncilacademy.orgThis e-mail address is being protected from spambots. You need JavaScript enabled to view it

   1. Your picture,
   2. Name,
   3. Facebook username,
   4. Company,
   5. Designation and
   6. A short description on your picture, the scenery, or even on how you feel (Optional)

We will post your pictures into an album on our Facebook page, EC-Council Academy Malaysia upon receiving your picture. The picture with the most ‘Likes’ will bring home the iPad2, as simple as that! So make sure you collect your ‘Certified Ethical Hacker’ T-shirts as soon as possible to start working on your picture!

Get your friends, family & everyone you know to support by voting for your picture!

The last day for voting will be on July 15, 2011 at 12.00 p.m.

Happy voting!

And to those waiting to claim your ‘Certified Ethical Hacker’ T-shirt, we have good news for you! T-shirts are ready for collection!

Emails have been sent to successful applicants that followed the required steps.  The redemption method, either by postage or by collection will be based on the filled information in each individual’s redemption form.

Note:

    * Certified Ethical Hacker T-shirt is required for the participation of ‘The Best CEH Picture Posting Competition’
    * If you have not participated to redeem your ‘Certified Ethical Hacker’ T-shirt, please visit http://www.eccouncilacademy.org/tshirt