Please turn on your JavaScript for this page to function normally.
Largest security conference and hands-on training in India

Securitybyte and OWASP India are hosting India’s largest information security event in New Delhi at the Crowne Plaza Hotel on Nov 17th – Nov 20th 2009. The …

Ask the social engineer: Practice

One reader wrote in asking: “How can one practice social engineering before using it in the wild?” Answering is Chris “loganWHD” Hadnagy, the lead …

Embracing tokenization: Payment without pain

Today, it’s expected that merchants accept electronic payments. It’s more than expected that those payments are secure. No data leaks or breaches of any kind. The …

Discover security flaws in source code with Graudit

Graudit is a simple script and signature sets that allows you to find potential security flaws in source code using the GNU utility grep. Graudit supports scanning code …

Find potential exploit conditions in Microsoft Office documents

OfficeCat is a command line utility developed by the Sourcefire VRT that can be used to process Microsoft Office Documents to determine the presence of potential exploit …

Trojans dominate BitDefender’s top 10 e-threats list

The top spot on BitDefender’s top 10 e-threats list for October is once again Trojan.Clicker.CM, which is mostly present on websites hosting illegal applications such as …

Top causes of identity fraud

Identity fraud increased substantially in 2008, reversing a four-year trend of decreasing incidents. Researchers say identity fraud increased by 22 percent last year and they …

Global security best practices

The latest Microsoft Security Intelligence Report shares security best practices from countries that have consistently exhibited low malware infection. These best practices …

Worm infections in the enterprise rose by nearly 100%

The latest Microsoft Security Intelligence Report (SIRv7), which indicates that worm infections in the enterprise rose by nearly 100 percent during the first half of 2009 over …

Record levels of spam, malware and Web-based threats

The number of new file-sharing sites hosting unauthorized, copyrighted content skyrocketed over the last three months, according to McAfee’s latest report. It also shows …

Week in review: Malicious email attachments, phishing trends, China’s cyber army and Halloween attacks

Here is an overview of some of last week’s most interesting news, interviews and articles: Q&A: Malware threats, Windows 7 and cyber crime Bo Olsen is a malware …

Facebook hit by phishing scam and banking Trojan combo

Facebook users should be on the lookout for an email threat that is posing as a message from Facebook administrators. The message contains both a phishing scam and a notorious …

Don't miss

Cybersecurity news