Please turn on your JavaScript for this page to function normally.
Report: Windows 7 security

With the recent release of Windows 7, many individuals and businesses are questioning whether or not the new platform demonstrates any significant security improvements over …

General purpose fuzzing tool

Codenomicon released a general purpose fuzzing tool today for testing all communication interfaces. The new Traffic Capture Fuzzer loads threat vectors from sources like …

Week in review: Ubuntu security, first iPhone worm, social engineering in practice

Here is an overview of some of last week’s most interesting news, interviews and articles: Ask the social engineer: Practice One reader wrote in asking: “How can …

First iPhone worm discovered

Sophos reports that some Apple iPhone owners in Australia have seen their smartphones get infected by a worm that has changed their wallpaper to an image of 1980s pop musician …

Web application security testing tool Websecurify 0.4 RC1 released

Websecurify is a Web application security testing tool which automatically identifies vulnerabilities by using advanced scanning and fuzzing technologies. The key improvements …

Exploitation of online banking credentials on the rise

Within the last several months, the FBI has seen a significant increase in fraud involving the exploitation of valid online banking credentials belonging to small and medium …

Battle of the anti-virus: What is the best software?

AV-Comparatives.org recently released the results of a malware removal tests with which they evaluated 16 anti-virus software solutions: Avast Professional Edition 4.8 AVG …

Major vulnerability in SSL authentication

Marsh Ray and Steve Dispensa of PhoneFactor discovered a serious vulnerability in SSL, the most common data security protocol on the Internet. The SSL Authentication Gap …

Video: Web application scanning with credentials using Nessus

Learn how to configure Nessus to use credentials and login into a web application to scan with CGI generic tests.

EU leaders agree on Internet access safeguards

A user’s Internet access may be restricted, if necessary and proportionate, only after a fair and impartial procedure including the user’s right to be heard. …

Which country has the most bot-infected computers?

According to data compiled during October by PandaLabs, Spain tops the bot ranking with 44.49% of all computers infected by bots. These programs, once they have infected a …

IT professionals don’t use Facebook for work

79 percent of IT professionals use social networking sites such as Facebook and YouTube, while the rest do not use social networking sites at all, according to a recent …

Don't miss

Cybersecurity news