Please turn on your JavaScript for this page to function normally.
Amazon multi-factor authentication for AWS accounts

An additional layer of protection is now available to protect your AWS account from unauthorized use. Once activated for your AWS account, the new Amazon Multi-Factor …

Microsoft IIS remotely exploitable vulnerability

According to an exploit posting on Milw0rm, there is a serious remotely exploitable vulnerability in the Microsoft’s IIS server. US Cert Vulnerability Note VU#276653 …

Security solution for Craigslist

Craigslist crime schemes steal millions of dollars each year, or worse, lead to violent crime. TrustMe prevents crime through its security solution for Craigslist buyers and …

IBM unveils public desktop cloud

The new IBM Smart Business Desktop on the IBM Cloud subscription service helps clients virtualize desktop computing resources, and provide a logical, rather than a physical, …

3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats Call for Papers

The 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10) announced a Call for Papers. Important dates Submissions due: Thursday, February 25, …

Security suite PenTBox 1.0.1 beta released

PenTBox is a security suite with programs like password crackers, Denial of Service testing tools, secure password generators, honeypots and much more. Programmed in Ruby, and …

The lifecycle of Web-based malware

According to the August edition of the MessageLabs Intelligence monthly report, it can be a costly exercise for the bad guys to produce new families of malware in order to …

Rogue software: BlockDefense

Here is the latest bogus antispyware that’s trying to get your money: BlockDefense. According to Lavasoft Affiliates, the last in a long stream of similar …

DDoS botnets for rent

Gunter Ollmann at Damballa’s blog says that if you are interested in renting a botnet, you just need to know how to search the Web. As unimmaginable (or unethical) as it …

Software for more secure enterprise mashups

The OpenAjax Alliance announced the approval and availability of OpenAjax Hub 2.0 as an industry standard for more secure Web 2.0 mashup applications. Advances in security in …

Skype users targeted by voice-recording Trojan

Trend Micro researches named TROJ_SPAYKE.C the new Trojan that can listen to and record calls you make using Skype (VoIP). The executable file installs DLL components that …

SAINT 7 released

SAINT offers an integration of vulnerability assessment and penetration testing tools. The SAINT product suite offers a complete solution to evaluate the threats to your …

Don't miss

Cybersecurity news