Please turn on your JavaScript for this page to function normally.
Infrastructure fingerprinting via XSS

Yokoso! is an infrastructure fingerprinting system delivered via XSS attack. This project contains two different parts; the fingerprints and modules for the various browser …

Sourcefire iPhone application

A new free Sourcefire VRT iPhone application is available now from the App Store. This app features three real-time Sourcefire news feeds, including VRT Updates, VRT Top 10 …

New patent for encryption key generation method

The United States Patent and Trademark Office has granted Authernative a patent for an encryption key generation method. The newly issued US Patent No. 7,577,987 titled …

Carrier grade IPsec toolkit

SafeNet announced version 5 of QuickSec , a carrier grade IPsec toolkit that offers true multi-core support, integrated with Cavium Networks OCTEON Multi-core MIPS64 …

New book: “Mac OS X Snow Leopard: The Missing Manual”

For three consecutive years, one of the most popular computer books in the U.S. has been David Pogue’s Mac OS X: The Missing Manual. And now the beast is back. The new …

Amazon Relational Database Service enters public beta

The public beta of Amazon Relational Database Service (Amazon RDS), a new web service that makes it easy to set up, operate, and scale relational databases in the cloud. …

One-credential system for physical access control

CertiPath introduced architecture and operational systems for federated physical access control (PACS), leveraging high-assurance credentials. The concept demonstrates the …

Identify and classify malware samples with YARA

YARA is a tool aimed at helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families based on textual or …

BlackBerry spy software

Retina-X Studios released Mobile Spy for BlackBerry devices. Mobile Spy runs in total stealth mode and no mentions of the program are shown inside the BlackBerry. After the …

Malware and poor passwords ranked as greatest threats

Today’s IT security and authentication professionals have less confidence and greater security concerns for their organizations than last year, according to a recent …

Week in review: RSA Conference, Web application security, fuzzing, Metasploit, and more

Here is an overview of some of last week’s most interesting news, interviews and articles: Anti-phishing coalition deploys real-time education program The APWG and …

Zipped Trojan in email attachment leads to further infection

Here is the proof you should never open attachments from anyone you don’t know or don’t trust: TrendLabs discovered spam emails professing to be from LSM Company, …

Don't miss

Cybersecurity news