Browser Exploitation Framework LiveCD
The Browser Exploitation Framework (BeEF) is a penetration testing tool that focuses on the web browser. BeEF allows penetration testers to assess the actual security posture …
Tokenless authentication comes to the cloud
SecurEnvoy has partnered with PasswordBank to bring the leading tokenless two-factor authentication capabilities to the PasswordBank identity management offering. Customers …
Increase in targeted spam and phishing attacks via e-mail
The threat level in the field of e-mail security increased in 2012 and will continue to do so in 2013 – despite the fact that spam levels decreased by 53% in 2012 as …
Automotive black box protects cyber data
The U.S. government rulemaking proposal seeks to mandate an automotive black box / Event Data Recorder (EDR) that you cannot turn-off, disable, or remove. You vehicle may …
Mac Kung Fu, 2nd Edition: Tips, Tricks, Hints, and Hacks
Get over 400 quick and easy tips, tricks, hints and hacks in Mac Kung Fu, Second Edition. Exploit secret settings and hidden apps, push built-in tools to the limit, radically …
Week in review: Java 0-day wreaking havoc, hiding messages in Skype silences, Apple prevents popular app scam tactic
Here’s an overview of some of last week’s most interesting news and articles: Hiding secret messages in Skype silences A group of researchers from the Institute of …
IBM tops U.S. patent list for 2012
IBM received a record 6,478 patents in 2012 for inventions that will enable fundamental advancements across key domains including analytics, Big Data, cybersecurity, cloud, …
Disable Java! Recent 0-day exploit is included in exploit kits
The Java zero-day that has recently been spotted being exploited in the wild has turned into big, big news as a number of popular exploit kits have been fitted with the …
Fake LinkedIn notifications lead to phishing and malware
LinkedIn users are once again targeted with a massive and widespread spam campaign that takes the form of a notification about a supposedly received message from a potential …
Spoofed Google Chrome update page serves malware
Malware peddlers are taking advantage of yesterday’s release of the latest version of Google Chrome and have already set up a spoofed page of the initial rollout page in …
Data breaches erode trust in business
Recurring data breaches over the past five years have undermined public trust in the ability of both private firms and Government organisations to safeguard personal …
Enterprise DIY data erasure
Kroll Ontrack launched Ontrack Eraser 4.0, an enterprise data eraser solution, complete with expanded drive wiping capacity, VMware eraser capabilities and new reporting and …
Featured news
Resources
Don't miss
- Vulnerable firmware for Gigabyte motherboards could allow bootkit installation
- AsyncRAT evolves as ESET tracks its most popular malware forks
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine