Please turn on your JavaScript for this page to function normally.
New malware exploits iPhone craze

Secure Computing warns that email spam, indicating that the recipient has won a new iPhone, is directing users to a malware hosting website. The have discovered a website that …

Apache Prefork MPM Vulnerabilities

This case study is a result of source code analysis of Apache httpd server MPM modules. The main goal of this document is to show what may be done by an attacker who has the …

Authentication and encryption solution for Seagate 5400 Momentus FDE.2 drives

After two years of development SECUDE is pleased to announce the official release of FinallySecure 1.0 which provides total Data-at-Rest security for new hardware based Full …

Viruses that start music in Windows Media Player and read the infected text

This week’s PandaLabs malware report looks at three new malicious codes designed to compromise the security of computers: two worms and a Trojan. Gronev.A is a worm with …

New addition to the FlowThrough security processor family

Hifn announced the full availability and production of the 8450, the newest member to the company’s FlowThrough security processor family. Hifn’s FlowThrough …

Taking Ownership of the Trusted Platform Module Chip on Intel Macs

I have been following the works of Trusted Computing Group (TCG) since their inception. The body, successor to the Trusted Computing Platform Alliance started by such giants …

Relaxation of PCI DSS is no surprise

The recent ease in requirements for UK retailers attempting to comply with the Payment Card Industry Data Security Standards (PCI DSS) did not surprise application security …

Why PCI isn’t enough to ensure data security today?

Ounce Labs thinks it’s critical for consumers to know that, in many instances, their credit card data is still not secure:   ” Compliance statistics are …

Elcomsoft System Recovery helps when you get locked out of Windows

Elcomsoft has released the Basic version of Elcomsoft System Recovery, an easy-to-use boot-disk application that makes it simple to access your Windows computer if …

New crimeware targeting companies

The new variant, “Prg”, researched by Finjan’s Malicious Code Research Center (MCRC) and also noted by Don Jackson of managed security specialist …

Cisco IOS Exploitation Techniques

It’s been almost two years since Michael Lynn first demonstrated a reliable code execution exploit on Cisco IOS at Black Hat 2005. Although his presentation received a …

MPack mass hacking tool – work in progress video

This video demonstrates how a system is compromised by a malicious IFRAME and how the MPack gang has accomplished this on literally thousands of websites (mostly Italian) …

Don't miss

Cybersecurity news