New book: Managed Code Rootkits
Imagine being able to change the languages for the applications that a computer is running and taking control over it. That is exactly what managed code rootkits can do when …
New e-mail security service from Barracuda
Barracuda Networks launched their new Email Security Service, a cloud-based e-mail filtering service which offers: Dual protection points – Onsite and cloud-based threat …
GFI MailSecurity 2011 released
GFI Software launched a new version of its multiple antivirus email security software, GFI MailSecurity which boosts malware detection using sandbox technology and, for …
WikiLeaks booted from Amazon, Assange to be arrested soon
While a “hacktivist” that goes by the handle of The Jester has claimed responsibility for the DDoS attack aimed at the WikiLeaks’ page via his Twitter …
The golden hour of phishing attacks
Trusteer conducted research into the attack potency and time-to-infection of email phishing attacks. One of their findings was that 50 per cent of phishing victims’ …
ProFTPD.org main FTP server compromised
A warning has been issued by the developers of ProFTPD, the popular FTP server software, about a compromise of the main distribution server of the software project that …
Phishers exploit Facebook features
Phishing e-mails supposedly coming from the Facebook Security Team with account deactivation warnings have been hitting inboxes around the world. The targeted users are led to …
Chrome sandboxes Flash Player
It’s good news for Windows users – Chrome developers have added a Flash Player sandbox to the development channel of the browser, adding to the already present …
The impact of online shopping on corporate networks
With 88 percent of retailers offering aggressive online discounts on Cyber Monday, over 70 million Americans were expected to shop online from work. A survey from Ipswitch …
Mac forensics software gathers social networking evidence
MacForensicsLab Social Agent 1.0 is designed to get evidence from chats, private messages, and blog activity on Facebook (and other) social networking websites. Social Agent …
Exploit kit with integrated AV checker
The latest version of the relatively new “Siberia Exploits Kit” has an interesting feature that must make it pretty popular among criminals – a built in AV …
WikiLeaks and Assange under attack
While WikiLeaks’ site is still being bombarded with requests at a speed of 10 gigabits per second – making access to it very difficult and at moments even …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility