Fake Stuxnet removal tool wreaks havoc
The Stuxtnet Trojan hit the headlines pretty hard, and people around the world feared that their system was compromised, too. Among the legitimate Stuxnet removal tools that …
Sensitive prisoner data found discarded in dumpster
When a homeless couple went searching for recyclable things in a gas station dumpster in California last week, they probably didn’t expect to find files containing …
Pentagon to aid DHS in case of cyber attack on domestic soil
It is a well know fact that the U.S. Department of Defense is forbidden to deploy military units within the nation’s boarders for law enforcement purposes. The only …
Integrating Hydra with Nessus
The video below shows you how to integrate custom username and password dictionaries with Hydra to your Nessus scans.
Apple updates Java for Mac OS X 10.5 and 10.6
The latest Java updates from Apple deliver improved reliability, security, and compatibility. Java for Mac OS X 10.5 Update 8 supersedes all previous updates of Java for Mac …
FBI warns businesses about corporate account take overs
The FBI has issued a fraud advisory to warn businesses about the various bank fraud scams currently employed. Created by financial institutions, industry trade associations, …
The rise of the insider threat
The bank insider threat is on the rise. Patrick Romain, head of solutions in Barclays Information Security Group, calls it a “power threat” – obviously …
IBM improves cloud security
IBM unveiled a new security initiative focused on making cloud computing safer. IBM aims to help both users and providers of cloud computing more easily navigate security …
Global e-crime gang transitions to crimeware
The world’s most prolific phishing gang has completed a transition from using conventional phishing to massively propagating stealthy password-stealing crimeware that …
IEEE 802.16m approved as IMT-Advanced technology
The WiMAX Forum today recognizes the decision within the International Telecommunication Union (ITU) approving the “WirelessMAN-Advanced” technology of IEEE …
Metasploit Framework 3.5.0 comes with over 600 exploits
The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration …
Apache 2.2.17 fixes vulnerabilities
The Apache HTTP Server Project released version 2.2.17 that fixes three security vulnerabilities. expat DoS A buffer over-read flaw was found in the bundled expat library. An …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility