Slow HTTP DoS vulnerability test tool
Slow HTTP DoS attacks rely on the fact that the HTTP protocol, by design, requires requests to be completely received by the server before they are processed. If an HTTP …
VMware acquires PacketMotion
PacketMotion has been acquired by VMware. Terms of the acquisition were not disclosed. PacketMotion’s PacketSentry UAM solution has been extensively deployed in support …
Disaster preparedness tips for computers
ISACA offers tips to the public and businesses to protect their computers, information and systems during a natural disaster. “Ensuring personal and employee safety is …
PBConnex: Full-disk encryption with pre-boot networking
WinMagic launched SecureDoc with PBConnex, a full-disk encryption solution with pre-boot networking. PBConnex, an extension to SecureDoc, fully integrates network support …
CSA releases Cloud Controls Matrix 1.2
The Cloud Security Alliance (CSA) launched revision 1.2 of the Cloud Controls Matrix (CCM), available for free here. The CCM is designed to provide fundamental security …
Week in review: Digital forensics, new Facebook Privacy Settings and RSA phishing email found
Here’s an overview of some of last week’s most interesting news, articles and videos: Chinese mobile phone monitoring service found What do you think cyber crooks …
Is this the phishing email that caused the RSA breach?
“I forward this file to you for review. Please open and view it,” says simply the email that is thought to have been the means of deploying the backdoor that …
Illegal keygen for well-known AV solution leads to infection
An illegal key generator for the recently released latest version of the TrustPort Internet Security solution brings big trouble to unsuspecting users, warns BitDefender. …
Bitcoin mining botnet also used for DDoS attacks
A recently discovered P2P Bitcoin mining botnet has acquired DDoS capabilities, warns Kaspersky Lab expert Tillmann Werner. It’s main reason of existence has so far been …
Microsoft updates free security tools
Microsoft enhanced three of its free Security Development Lifecycle (SDL) tools – Threat Modeling, MiniFuzz, and RegExFuzz. Threat Modeling Tool 3.1.8 The Threat …
The Basics of Digital Forensics
The Basics of Digital Forensics will provide a foundation for people new to the digital forensics field. This book will teach people how to conduct examinations by discussing …
Cisco Certified Technician: New entry-level certification
Cisco introduced the Cisco Certified Technician (CCT) to its Career Certification Program. The CCT training and certification programs are designed for technicians who perform …
Featured news
Sponsored
Don't miss
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days
- SSHamble: Open-source security testing of SSH services
- Traceeshark: Open-source plugin for Wireshark