Please turn on your JavaScript for this page to function normally.
Exploitation of online banking credentials on the rise

Within the last several months, the FBI has seen a significant increase in fraud involving the exploitation of valid online banking credentials belonging to small and medium …

Battle of the anti-virus: What is the best software?

AV-Comparatives.org recently released the results of a malware removal tests with which they evaluated 16 anti-virus software solutions: Avast Professional Edition 4.8 AVG …

Major vulnerability in SSL authentication

Marsh Ray and Steve Dispensa of PhoneFactor discovered a serious vulnerability in SSL, the most common data security protocol on the Internet. The SSL Authentication Gap …

Video: Web application scanning with credentials using Nessus

Learn how to configure Nessus to use credentials and login into a web application to scan with CGI generic tests.

EU leaders agree on Internet access safeguards

A user’s Internet access may be restricted, if necessary and proportionate, only after a fair and impartial procedure including the user’s right to be heard. …

Which country has the most bot-infected computers?

According to data compiled during October by PandaLabs, Spain tops the bot ranking with 44.49% of all computers infected by bots. These programs, once they have infected a …

IT professionals don’t use Facebook for work

79 percent of IT professionals use social networking sites such as Facebook and YouTube, while the rest do not use social networking sites at all, according to a recent …

Largest security conference and hands-on training in India

Securitybyte and OWASP India are hosting India’s largest information security event in New Delhi at the Crowne Plaza Hotel on Nov 17th – Nov 20th 2009. The …

Ask the social engineer: Practice

One reader wrote in asking: “How can one practice social engineering before using it in the wild?” Answering is Chris “loganWHD” Hadnagy, the lead …

Embracing tokenization: Payment without pain

Today, it’s expected that merchants accept electronic payments. It’s more than expected that those payments are secure. No data leaks or breaches of any kind. The …

Discover security flaws in source code with Graudit

Graudit is a simple script and signature sets that allows you to find potential security flaws in source code using the GNU utility grep. Graudit supports scanning code …

Find potential exploit conditions in Microsoft Office documents

OfficeCat is a command line utility developed by the Sourcefire VRT that can be used to process Microsoft Office Documents to determine the presence of potential exploit …

Cybersecurity news