Please turn on your JavaScript for this page to function normally.
Hackers insert footage of nuclear explosion into webcam

Czech hackers managed to get access to a webcam and insert realistic footage of nuclear explosion. The incident was broadcasted on the Czech TV programme Panorama on Sunday. …

The Exploit Development Process

Alexander Sotirov is a Vulnerability Researcher at Determina Inc. In this video, made at Black Hat Europe, he discusses on a general note how exploit writers develop exploits.

Reactions to the HP acquisition of SPI Dynamics

Here are a couple of quotes found while traversing today’s media releases regarding the HP’s acquisition of SPI Dynamics. Microsoft to follow? “This is the …

Break a security product beta and win prizes

BitDefender is inviting the public to test BitDefender Total Security 2008, the flagship product of the company’s upcoming family of Internet security products. Among …

Internet security forecast revisited

McAfee just revisited its top ten predictions for security threats in 2007. Their research shows that threats including data-thieving phishing Web sites are on the rise, as …

Capabilities and weaknesses of token-based authentication

From Martin McKeay’s blog: As most security professionals know, passwords are a losing proposition. We use them because the capability comes with your operating system, …

HP to acquire web application security expert

HP today announced that it has signed a definitive agreement to acquire SPI Dynamics, Inc., a provider of web application security assessment software and services, to further …

Business model based on the malicious MPack tool

PandaLabs has discovered the new 0.90 version of the malicious tool Mpack, available for US$1000 on the Web. This application could be defined as “a kit for installing …

Lock Down Your Mac with DoorStop X

When it comes to security, Mac OS X has proved on numerous occasions that it is quite safe, right out of the box. However, that doesn’t mean it cannot use additional …

A closer look at Tor privacy tool

Tor is a tool that can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol. This is a graphical …

Fast-moving web threat spreads around the world

Security researchers at Trend Micro reported an accelerating infection in Italy of seemingly legitimate web pages loaded with malicious code that could plant a keylogger to …

Monitoring all local and privileged user access to database

Tizor Systems announced Mantra V5.4 with Enterprise Local Audit Architecture, the most complete solution for monitoring all local and privileged user access to databases. …

Don't miss

Cybersecurity news