The Web Application Hacker’s Handbook, 2nd Edition
Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise …
The F-BOMB: A tiny $50 spying computer for DARPA
Everyone loves a cheap but effective solution, and DARPA – the US Department of Defense’s agency for developing new military technologies – is no exception. …
Keeping on top of financial malware
A lot of people are apprehensive about buying things and accessing their bank accounts online. It is an understandable fear, especially when one is aware that it takes just a …
Students used keyloggers on school computers, changed grades
Three Californian 16-year-olds have been arrested for having allegedly broken into their high school, stolen keys and tests, installed keyloggers onto teachers’ …
Bogus “browser update” pages deliver malware
Fake “browser update” pages are currently being used to deliver malware and redirect users to survey pages, warns GFI. Their malware researchers have recently …
Mobile security app combines antivirus, web and app protection
McAfee announced a new version of its Mobile Security software, providing smartphone and tablet owners with more controls to preserve their privacy and protection against …
Most disruptive and significant IT trends
451 Research, published an all-encompassing report highlighting the most disruptive and significant trends that the analyst firm expects to dominate and drive the enterprise …
Fingerprint security for Mac OS X
AuthenTec announced a new fingerprint security solution – including an Eikon fingerprint sensor and TrueSuite identity management software – for Mac computers …
New data encryption platform
CertiVox unveiled its PrivateSky Secure Information Exchange (SIX) platform. The service provides protection for email, files and other information sent via the cloud, through …
Security analysis tool Trisul 2.3 released
Trisul is a new kind of network monitor that supplements fine grained traffic metering with flows, packets, and alerts. You can carry out any kind of network and security …
Hacking and Securing iOS Applications
If you’re an app developer with a solid foundation in Objective-C, this book is an absolute must – chances are very high that your company’s iOS applications …
Week in review: “Frankenmalware”, Kelihos malware author revealed, and the tragic state of SCADA security
Here’s an overview of some of last week’s most interesting news: Tool used in Anonymous Megaupload campaign Looking at the LOIC downloads so far this year, …
Featured news
Resources
Don't miss
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount
- Shadow AI: New ideas emerge to tackle an old problem in new form
- AI chatbots are sliding toward a privacy crisis
- You can’t audit how AI thinks, but you can audit what it does