Help Net Security
Amazon multi-factor authentication for AWS accounts
An additional layer of protection is now available to protect your AWS account from unauthorized use. Once activated for your AWS account, the new Amazon Multi-Factor …
Microsoft IIS remotely exploitable vulnerability
According to an exploit posting on Milw0rm, there is a serious remotely exploitable vulnerability in the Microsoft’s IIS server. US Cert Vulnerability Note VU#276653 …
Security solution for Craigslist
Craigslist crime schemes steal millions of dollars each year, or worse, lead to violent crime. TrustMe prevents crime through its security solution for Craigslist buyers and …
IBM unveils public desktop cloud
The new IBM Smart Business Desktop on the IBM Cloud subscription service helps clients virtualize desktop computing resources, and provide a logical, rather than a physical, …
3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats Call for Papers
The 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10) announced a Call for Papers. Important dates Submissions due: Thursday, February 25, …
Security suite PenTBox 1.0.1 beta released
PenTBox is a security suite with programs like password crackers, Denial of Service testing tools, secure password generators, honeypots and much more. Programmed in Ruby, and …
The lifecycle of Web-based malware
According to the August edition of the MessageLabs Intelligence monthly report, it can be a costly exercise for the bad guys to produce new families of malware in order to …
Rogue software: BlockDefense
Here is the latest bogus antispyware that’s trying to get your money: BlockDefense. According to Lavasoft Affiliates, the last in a long stream of similar …
DDoS botnets for rent
Gunter Ollmann at Damballa’s blog says that if you are interested in renting a botnet, you just need to know how to search the Web. As unimmaginable (or unethical) as it …
Software for more secure enterprise mashups
The OpenAjax Alliance announced the approval and availability of OpenAjax Hub 2.0 as an industry standard for more secure Web 2.0 mashup applications. Advances in security in …
Skype users targeted by voice-recording Trojan
Trend Micro researches named TROJ_SPAYKE.C the new Trojan that can listen to and record calls you make using Skype (VoIP). The executable file installs DLL components that …
SAINT 7 released
SAINT offers an integration of vulnerability assessment and penetration testing tools. The SAINT product suite offers a complete solution to evaluate the threats to your …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics