Help Net Security
New book: “Fuzzing: Brute Force Vulnerability Discovery”
Fuzzing has evolved into one of today’s most effective approaches to test software security. To “fuzz,” you attach a program’s inputs to a source of …
Malicious tool Icepack installs malware through exploits
PandaLabs has discovered a new malicious tool that installs malware through exploits. This tool is called Icepack and is sold on the Internet for US$400. This tool joins …
New book: “Network Warrior”
Network managers looking to work smarter and improve their job performances will find the useful, real-world tools they need in Gary Donahue’s new book, Network Warrior …
Guide to Online Antivirus Solutions: NanoScan and TotalScan
Internet connections are getting faster every day, so online antivirus solutions have transformed from proof-of-concept into actual quality security services. I’ve been …
Email spam attachments decreasing
BitDefender labs have determined that the number of spam messages sent to recipients with PDF attachments has recently decreased. Their researchers believe this decrease can …
Uniloc security platform leverages power of Oracle Database 11g
Uniloc USA announced interoperability of the company’s flagship product lines, softANCHOR and netANCHOR, with Oracle Database 11g. Leveraging Oracle, the number one …
Threat Report: Record number of Web-borne attacks during 2007
Sophos has published new research into the first six months of cybercrime in 2007. The Sophos Security Threat Report examines existing and emerging security trends and has …
Very fast automatic spam tool sold for $450
PandaLabs has discovered XRumer, a tool designed to post spam and links pointing to web pages infected by malware on forums, websites, blogs, etc. It is sold in different …
Hot Summer Book Giveaway
This giveaway is made possible by the fine folks at Addison-Wesley Professional and Cisco Press. We are giving away one copy of each of these books: To try your luck send an …
New book “Virtual Honeypots: From Botnet Tracking to Intrusion Detection”
Honeypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. Now, …
HTTPS/SSL content filtering for SMB and education
Cymphonix announced the upcoming availability of Network Composer Version 8, the latest release of its award-winning secure web gateway appliance. The latest firmware …
DNS forgery pharming attack information
Trusteer announced today that its CTO and security researcher Amit Klein has cracked BIND’s random number generator and demonstrated a new attack affecting most Internet …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)