Help Net Security
Trojans dominate the threat landscape
As in recent months, Trojans dominated the threat landscape in November, according to GFI Software. Their data revealed that seven of the top 10 malware threats were …
Run Nmap on Android
Droidmap is an Android application for root users that implements some functions of Nmap in a GUI. This program comes with installer scripts for the installation of the …
Scammers preying on those wanting to adopt
The IC3 received information from law enforcement and complaints filed with the IC3 concerning an adoption scam. The scam is an attempt to collect personal information and …
Learn Cisco networking while playing a game
The Cisco CCENT Mind Share Game is a multimedia PC game that helps users acquire knowledge necessary for success on CCENT and CCNA exams. Featuring more than 75 stages, the …
Nessus in the cloud
The Nessus vulnerability scanner features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of an …
Win a copy of Ninja Hacking!
We are giving away two copies of “Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques“. Throw traditional pen testing methods out the window …
WordPress Comment Rating plugin CSRF vulnerability
A vulnerability has been reported in the Comment Rating plugin for WordPress, which can be exploited by malicious people to conduct cross-site request forgery attacks, …
QuickTime 7.6.9 fixes security issues
Here is the security content related to QuickTime 7.6.9, available for download here. A local user may have access to sensitive information A filesystem permission issue …
Zeus targets major retailers
Trusteer recently discovered a Zeus botnet that is targeting credit card accounts of major retailers including Macy’s and Nordstrom just as the holiday gift buying …
Increased collaboration on cybercrime syndicate crackdowns
As 2010 comes to a close, information security companies are trying to predict the amount of problems we’ll have to deal with next year. Below is a list of 5 security …
Avoid the phishing net
Phishing, the process of attempting to acquire sensitive information by masquerading as a legitimate and trustworthy company via online means, used to just be a problem for …
CORE IMPACT Pro 11 now detects and exploits network router vulnerabilities
Core Security Technologies introduced the latest version of its automated penetration testing solution, CORE IMPACT Pro 11. CORE IMPACT Pro enables users to conduct real-world …
Featured news
Resources
Don't miss
- When trusted AI connections turn hostile
- Identifying risky candidates: Practical steps for security leaders
- Humanoid robot found vulnerable to Bluetooth hack, data leaks to China
- F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info
- Microsoft patches three zero-days actively exploited by attackers