Please turn on your JavaScript for this page to function normally.
Gawker and Gizmodo visitors preyed on by malicious ads

It was only last month that the New York Times was tricked into featuring on their website a malvertisement that took over the visitors’ browser and tried to make them …

Serious cyber attacks on the horizon

A report prepared recently by James A. Lewis, of the Center for Strategic and International Studies, used the recent cyber attacks that targeted the US and South Korea as a …

Infrastructure fingerprinting via XSS

Yokoso! is an infrastructure fingerprinting system delivered via XSS attack. This project contains two different parts; the fingerprints and modules for the various browser …

Sourcefire iPhone application

A new free Sourcefire VRT iPhone application is available now from the App Store. This app features three real-time Sourcefire news feeds, including VRT Updates, VRT Top 10 …

New patent for encryption key generation method

The United States Patent and Trademark Office has granted Authernative a patent for an encryption key generation method. The newly issued US Patent No. 7,577,987 titled …

Carrier grade IPsec toolkit

SafeNet announced version 5 of QuickSec , a carrier grade IPsec toolkit that offers true multi-core support, integrated with Cavium Networks OCTEON Multi-core MIPS64 …

New book: “Mac OS X Snow Leopard: The Missing Manual”

For three consecutive years, one of the most popular computer books in the U.S. has been David Pogue’s Mac OS X: The Missing Manual. And now the beast is back. The new …

Amazon Relational Database Service enters public beta

The public beta of Amazon Relational Database Service (Amazon RDS), a new web service that makes it easy to set up, operate, and scale relational databases in the cloud. …

One-credential system for physical access control

CertiPath introduced architecture and operational systems for federated physical access control (PACS), leveraging high-assurance credentials. The concept demonstrates the …

Identify and classify malware samples with YARA

YARA is a tool aimed at helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families based on textual or …

BlackBerry spy software

Retina-X Studios released Mobile Spy for BlackBerry devices. Mobile Spy runs in total stealth mode and no mentions of the program are shown inside the BlackBerry. After the …

Malware and poor passwords ranked as greatest threats

Today’s IT security and authentication professionals have less confidence and greater security concerns for their organizations than last year, according to a recent …

Don't miss

Cybersecurity news