Please turn on your JavaScript for this page to function normally.
OpenBSD headman believes contractor tried to insert backdoors

Following last week’s accusation by a former government contractor that the FBI has implemented backdoors into the encryption software used by OpenBSD, Theo de Raadt, …

Fake iTunes e-mail leads to drive-by download

E-mails purportedly coming from iTunes and bearing “iTunes account may be suspended” in the subject line have been hitting inboxes in the last few days. …

“Evil” URL shortener initiates DDoS attacks

Can you believe that clicking on a shortened link can make you an involuntary and unknowing participant in a DDoS attack on a website? Ben Schmidt, a self-styled …

Win a copy of Practical Lock Picking!

We are giving away two copies of “Practical Lock Picking“. For the first time, Deviant Ollam, one of the security industry’s best-known lockpicking teachers, …

Tips for creating a strong password

To ensure consumers stay safe online and enjoy this holiday season, Check Point outlines practical tips for creating a strong password. Choose a password that is at least 8 to …

Threat modeling best practices

In the video below, Robert Zigweid, senior security consultant at IOActive, talks about threat modeling best practices. The video was recorded at the OWASP AppSec USA 2010 …

Highest profile software failures of 2010

SQS Software Quality Systems compiled a list of the worst software failures of 2010 that have damaged reputations, impacted negatively on finances and caused stress to users. …

Passwords are the weakest link in online security

A ZoneAlarm survey showed that 79% of consumers use risky password construction practices, such as including personal information and words. The survey also revealed that 26% …

The shape of security and compliance in 2011

With increasingly stringent compliance mandates, a flurry of vendor consolidation, demands for audit reporting, and a spike in complex security breaches, 2010 has been a …

Rapid7 releases NeXpose 4.10

Rapid7 announced NeXpose 4.10, the latest version of its vulnerability management solution, providing enterprise customers with visibility and actionable intelligence for …

Worm blocks access to Facebook

A relatively new worm that Symantec named W32.Yimfoca presents a very interesting and never before seen modus operandi. A variant of the worm spreads via Yahoo! Messenger and, …

How can independent media and human rights sites defend themselves from DDoS attacks?

Thanks to the attacks executed by hacktivist group Anonymous against sites of companies that have (in their eyes) wronged WikiLeaks, the DDoS attack has once again become a …

Don't miss

Cybersecurity news