Please turn on your JavaScript for this page to function normally.
Deconstructing ColdFusion

In this video from OWASP AppSec Research 2010, Chris Eng from Veracode provides a practical guide for those doing penetration testing or code reviews on an application written …

BitDefender Total Security 2011 released

BitDefender announced the launch of Total Security 2011, which offers protection against viruses, spyware, phishing and identity theft attacks. It includes antivirus, firewall …

5 million domains serving malware via compromised Network Solutions widget

A recent rise in the number of Armorize’s customers’ sites getting flagged by their own drive-by downloads and zero-day malware threats detection service HackAlert …

Fake dislike button Facebook scam

Facebook users should be wary of the latest survey scam spreading virally across the network. There are a number of variations of this scam, which sees users unwillingly …

Who is the typical Russian hacker?

Security analyst Fyodor Yarochkin and a senior researcher from security firm Coseinc that calls himself “Le Grugq” have spent 6 months on various Russian web …

Security software market to grow 11% this year

Worldwide security software revenue is forecast to surpass $16.5 billion in 2010, an 11.3 percent increase from 2009 revenue of $14.8 billion, according to Gartner. Although …

Security information and event management platform

LogLogic 5 was released today. This is a product suite for centralizing and structuring IT data and its features are outlined below. Universal Collection Framework (UCF): The …

Security toolbox for .NET development and testing

In this video from OWASP AppSec Research 2010, Johan Lindfors and Dag K?¶nig from Microsoft talk about a security toolbox for .NET development and testing.

Week in review: Breaking SSL, geotagging risks and the first SMS Android Trojan

Here’s an overview of some of last week’s most interesting news, articles and videos: How to render SSL useless In this video from OWASP AppSec Research 2010, Ivan …

Geotagging risks and solutions

The ubiquitous automatic geotagging of pictures taken with smartphones and digital cameras and then posted on the Internet could prove to be a real security risk. Here’s …

Cisco IOS Software TCP DoS vulnerability

Cisco IOS Software Release, 15.1(2)T is affected by a DoS vulnerability during the TCP establishment phase. The vulnerability could cause embryonic TCP connections to remain …

Spamhaus disputes with Latvia’s top-level domain registry over blocked IP ranges

An email and open letter spat between anti-spam organization Spamhaus and NIC.LV, Latvia’s top-level domain registry has brought attention to the fact that .lv web …

Don't miss

Cybersecurity news