Gawker and Gizmodo visitors preyed on by malicious ads
It was only last month that the New York Times was tricked into featuring on their website a malvertisement that took over the visitors’ browser and tried to make them …
Serious cyber attacks on the horizon
A report prepared recently by James A. Lewis, of the Center for Strategic and International Studies, used the recent cyber attacks that targeted the US and South Korea as a …
Infrastructure fingerprinting via XSS
Yokoso! is an infrastructure fingerprinting system delivered via XSS attack. This project contains two different parts; the fingerprints and modules for the various browser …
Sourcefire iPhone application
A new free Sourcefire VRT iPhone application is available now from the App Store. This app features three real-time Sourcefire news feeds, including VRT Updates, VRT Top 10 …
New patent for encryption key generation method
The United States Patent and Trademark Office has granted Authernative a patent for an encryption key generation method. The newly issued US Patent No. 7,577,987 titled …
Carrier grade IPsec toolkit
SafeNet announced version 5 of QuickSec , a carrier grade IPsec toolkit that offers true multi-core support, integrated with Cavium Networks OCTEON Multi-core MIPS64 …
New book: “Mac OS X Snow Leopard: The Missing Manual”
For three consecutive years, one of the most popular computer books in the U.S. has been David Pogue’s Mac OS X: The Missing Manual. And now the beast is back. The new …
Amazon Relational Database Service enters public beta
The public beta of Amazon Relational Database Service (Amazon RDS), a new web service that makes it easy to set up, operate, and scale relational databases in the cloud. …
One-credential system for physical access control
CertiPath introduced architecture and operational systems for federated physical access control (PACS), leveraging high-assurance credentials. The concept demonstrates the …
Identify and classify malware samples with YARA
YARA is a tool aimed at helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families based on textual or …
BlackBerry spy software
Retina-X Studios released Mobile Spy for BlackBerry devices. Mobile Spy runs in total stealth mode and no mentions of the program are shown inside the BlackBerry. After the …
Malware and poor passwords ranked as greatest threats
Today’s IT security and authentication professionals have less confidence and greater security concerns for their organizations than last year, according to a recent …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage