Pwn2Own 2012: Changed rules, bigger prizes, no more mobile hacks
Pwn2Own, one of the most anticipated hacking contests that takes place each year at the CanSecWest conference in Vancouver, British Columbia, is set to unfold under …
Kelihos malware author, botnet herder named by Microsoft
Microsoft has named a new defendant in the ongoing Kelihos case. His name is Andrey N. Sabelnikov, of St. Petersburg, Russian Federation, and is believed to have written the …
Unique Web malware hosts increase
The proper security tools can prevent infection or stop outbreaks, mitigate or reduce losses from malicious events, and even decrease legal liability. These products can also …
Interactive networking stack debugger
The new P+ 1000 embedded packet debugger provides ability to control and interact with networking designs and is priced for the individual engineer. It offers packet-by-packet …
Network Security First-Step, 2nd Edition
With the proliferation of security threats, many people and companies are looking for ways to increase the security of their networks and data. Before you can effectively …
Researchers demonstrate tragic state of SCADA security
Since the discovery of Stuxnet, we’ve been hearing from a variety of researchers about security vulnerabilities in SCADA computer systems. While some researchers such as …
Online reputation manager suspected of Illegal code injection
For individuals and companies that have a bad online reputation, online reputation management (ORM) services might sound like a good investment. Such services are not illegal, …
Secure collaboration for iPad and iPhone
WatchDox, a provider of secure document access and collaboration solutions, today announced that its users can now securely view and make annotations to documents directly on …
Advanced malware protection with Sourcefire FireAMP
Sourcefire introduced FireAMP advanced malware protection, a malware discovery and analysis solution that analyzes and blocks malware by utilizing big data analytics. Designed …
Tax-themed spam delivers malware
The US Internal Revenue Service kicked off the 2012 tax filing season on January 4, and malware peddlers haven’t waited much to begin targeting users with tax-themed …
DreamHost hacker accessed pool of unencrypted passwords
DreamHost, one of the world’s most popular and well-known web hosting providers, has sent a warning out to its customers saying that one of their databases containing …
Tool used in Anonymous Megaupload campaign
Once again, Anonymous is using the low orbit ion canon (LOIC) to DDoS websites. This tool was developed by white hat hackers to stress test websites. Not surprisingly, the …
Featured news
Resources
Don't miss
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground
- Open source has a malware problem, and it’s getting worse