Phishing requires more effort than you might think
When it comes to setting up phishing pages, there are some phishers that make the extra effort. Take those behind the fake Orkut login pages, for example. Symantec has been …
IT pros expect network threats to increase as budgets decline
Of the 100-plus netForensics survey respondents, 85% believe their organization’s security environment will grow more complex over the next 24 months, leading to …
How consumers influence data loss and breaches
Cisco announced the results of a survey exploring the security implications of social networking and the use of personal devices in the enterprise. One of the most striking …
Rogue software details: Sysinternals Antivirus
Sysinternals Antivirus is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
New book: Network Flow Analysis
Network flow analysis is the art of studying high volume network traffic. Rather than capture every single packet, flow analysis allows network administrators to selectively …
WhiteHat Sentinel: SaaS website vulnerability management
WhiteHat Security updated WhiteHat Sentinel, its software-as-a-service (SaaS) website vulnerability management offering, including new User and Role Management options, …
Social networking “Bill of Rights” released
A little over a month ago, the Electronic Frontier Foundation offered their suggestions about what a social networking “bill of rights” should contain. Last week …
Firefox 3.6.4 fixes several security issues
Mozilla released Firefox 3.6.4 that fixes several security issues as well as stability issues. User tracking across sites using Math.random() Security researcher Amit Klein …
Secure social media management
Cyveillance announced the availability of Secure Social Media Management, which provides organizations with professional review and consultation of social media policies and …
Twilight app turns mobile phones into zombies
While not the first one who has thought of demonstrating the ability of using an application to create a botnet of Android-running mobile devices, researcher Jon …
Basic TCP/IP analysis
Hansang Bae leads the Network/Application Performance Engineering Team with direct responsibility for Packet Capture Infrastructure at Citi. In the video below he discusses …
How much is Facebook data worth?
Facebook has over 400 million active users. Can you even imagine how much freely given, highly accurate user data is stored on each of those accounts? The marketing industry …
Featured news
Resources
Don't miss
- It’s time to secure the extended digital supply chain
- SysReptor: Open-source penetration testing reporting platform
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)