Network and security analysis with Trisul
Trisul is a new kind of network monitor that supplements fine grained traffic metering with flows, packets, and alerts. You can carry out any kind of network and security …
eFront multiple vulnerabilities
Multiple vulnerabilities have been reported in eFront, according to Secunia. These can be exploited by malicious users to conduct SQL injection attacks and compromise a …
Irresponsible IT disposal methods
Although data security is the primary concern when decommissioning IT equipment, only 61 per cent of companies currently data wipe all of their redundant computers, according …
ICSA Labs tests products against larger malware set
ICSA Labs, an independent division of Verizon, is now testing products in its Anti-Virus program against virus samples from not only the WildList (a database of real-world …
Week in review: U.S. government satellites hacked, Halloween threats and the m00p gang investigation
Here’s an overview of some of last week’s most interesting new, podcasts and articles: Microsoft puts vulnerability exploitation into context Recently Microsoft …
New Facebook security features
Facebook will be adding two new security features that will allow users to regain control of their account if it gets hijacked and to use a unique password for different third …
Duqu not developed by Stuxnet author
The Dell SecureWorks Counter Threat Unit (CTU) research team has been analyzing the Duqu trojan which received a great deal of attention because it is similar to the infamous …
Cyber crooks migrate to “ce.ms” free domains
Online scammers and malware peddlers often exhibit locust-like behavior as they migrate from one type of free domains to another in order to evade detection by spam filters …
Combating Halloween malware threats
GFI Software released tips for spotting and combating malware attacks and threats in the run up to Halloween. Halloween has now become firmly established as a family event in …
Facebook spammers trick users into sharing anti-CSRF tokens
Facebook spammers have already used a number of different approaches to make users inadvertently propagate their scams, and most of them fall into the social engineering …
Endpoint Protector 4 released
CoSoSys released a new version of their flagship device control and data loss prevention solution, Endpoint Protector. Offering enhanced protection, increased effectiveness …
National-scale iris and fingerprint identification
Neurotechnology announced MegaMatcher Accelerator 4.0, the latest update of the company’s multi-biometric software and hardware solution for high-volume, high-speed …
Featured news
Resources
Don't miss
- LLMs are automating the human part of romance scams
- Superagent: Open-source framework for guardrails around agentic AI
- Security chaos engineering matters when nothing is broken
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible