Deconstructing ColdFusion
In this video from OWASP AppSec Research 2010, Chris Eng from Veracode provides a practical guide for those doing penetration testing or code reviews on an application written …
BitDefender Total Security 2011 released
BitDefender announced the launch of Total Security 2011, which offers protection against viruses, spyware, phishing and identity theft attacks. It includes antivirus, firewall …
5 million domains serving malware via compromised Network Solutions widget
A recent rise in the number of Armorize’s customers’ sites getting flagged by their own drive-by downloads and zero-day malware threats detection service HackAlert …
Fake dislike button Facebook scam
Facebook users should be wary of the latest survey scam spreading virally across the network. There are a number of variations of this scam, which sees users unwillingly …
Who is the typical Russian hacker?
Security analyst Fyodor Yarochkin and a senior researcher from security firm Coseinc that calls himself “Le Grugq” have spent 6 months on various Russian web …
Security software market to grow 11% this year
Worldwide security software revenue is forecast to surpass $16.5 billion in 2010, an 11.3 percent increase from 2009 revenue of $14.8 billion, according to Gartner. Although …
Security information and event management platform
LogLogic 5 was released today. This is a product suite for centralizing and structuring IT data and its features are outlined below. Universal Collection Framework (UCF): The …
Security toolbox for .NET development and testing
In this video from OWASP AppSec Research 2010, Johan Lindfors and Dag K?¶nig from Microsoft talk about a security toolbox for .NET development and testing.
Week in review: Breaking SSL, geotagging risks and the first SMS Android Trojan
Here’s an overview of some of last week’s most interesting news, articles and videos: How to render SSL useless In this video from OWASP AppSec Research 2010, Ivan …
Geotagging risks and solutions
The ubiquitous automatic geotagging of pictures taken with smartphones and digital cameras and then posted on the Internet could prove to be a real security risk. Here’s …
Cisco IOS Software TCP DoS vulnerability
Cisco IOS Software Release, 15.1(2)T is affected by a DoS vulnerability during the TCP establishment phase. The vulnerability could cause embryonic TCP connections to remain …
Spamhaus disputes with Latvia’s top-level domain registry over blocked IP ranges
An email and open letter spat between anti-spam organization Spamhaus and NIC.LV, Latvia’s top-level domain registry has brought attention to the fact that .lv web …
Featured news
Resources
Don't miss
- The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance
- Over 3 million Fortune 500 employee accounts compromised since 2022
- CISOs and boards see things differently
- It’s time to secure the extended digital supply chain
- SysReptor: Open-source penetration testing reporting platform