Please turn on your JavaScript for this page to function normally.
Understanding social engineering

At the heart of many of the malicious ploys that we see online is one underlying concept: social engineering. Deceptive social engineering tactics are interwoven throughout …

1 in 4 kids have tried hacking

Despite 78% agreeing that it is wrong, 1 in 4 of UK’s children have tried their hand at hacking into others’ Facebook accounts mostly by surreptitiously using the …

Rogue software details: Antivirus 7

Antivirus 7 is a rogue security application. In order to remove it, find out what files to look for below. Known system changes: Files c:\Desktop\Antivirus7.lnk …

Enterprise 2.0 privacy concerns in Europe

Transparent access to people and information is Enterprise 2.0’s great promise. It’s tempered, however, by a privacy risk that is especially sensitive in the …

Cloud-based rapid disaster recovery

Unitrends unveiled its Vault2Cloud disaster recovery service, monitored and managed through a simple, easy-to-use Web 2.0-based user interface. Vault2Cloud solves many of the …

Video: Nessus scan through a meterpreter session

Run a Nessus scan through a compromised host:

New release of RSA Data Loss Prevention Suite

With more than 70 new features for scanning, workflow, reporting, and global content processing, version 8.0 of the RSA Data Loss Prevention (DLP) Suite is engineered to allow …

Virtual PC Hypervisor vulnerability remains unpatched

Core Security issued an advisory disclosing a vulnerability that could affect large numbers of organizations and consumers using Microsoft’s Virtual PC virtualization …

FBI: Online fraud loss was $559 million in 2009

Online crime complaints increased substantially once again last year, according to a report about fraudulent activity on the Internet from the Internet Crime Complaint Center …

Intel launches its most secure data center processor

Combining security, performance and energy efficiency, Intel launched the Intel Xeon Processor 5600 series which deliver two new security features — Intel Advanced …

Six common virtualization security risks and how to combat them

Through 2012, 60 percent of virtualized servers will be less secure than the physical servers they replace, according to Gartner. Although they expect this figure to fall to …

Implement the SSH-2 protocol in pure Java

Ganymed SSH-2 for Java is a library which implements the SSH-2 protocol in pure Java (tested on J2SE 1.4.2 and 5.0). It allows one to connect to SSH servers from within Java …

Don't miss

Cybersecurity news