Week in review: RSA Conference, Web application security, fuzzing, Metasploit, and more
Here is an overview of some of last week’s most interesting news, interviews and articles: Anti-phishing coalition deploys real-time education program The APWG and …
Zipped Trojan in email attachment leads to further infection
Here is the proof you should never open attachments from anyone you don’t know or don’t trust: TrendLabs discovered spam emails professing to be from LSM Company, …
New version of Owl security-enhanced operating system
Openwall GNU/*/Linux (or Owl for short) is a free security-enhanced operating system with Linux and GNU software as its core, compatible with other major distributions of …
RSnake releases “Detecting Malice” e-book
World-renowned security expert Robert Hansen aka RSnake relesed a 300+ pages technical PDF book titled Detecting Malice. The material is intended for anyone that maintains, …
TippingPoint delivers new intrusion prevention system platform
TippingPoint announced the TippingPoint N-Platform, a new intrusion prevention system (IPS) platform with a Threat Suppression Engine (TSE) that adds capacity for deep packet …
Cain & Abel 4.9.35 now available
Cain & Abel is a password recovery tool for Microsoft operating systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted …
Controlled access Web portals now prime target of cybercriminals
As news of the Guardian web site hack broke on Sunday, identity information on consumers and companies continues to be a prime target for criminal hackers. “As we …
Video: Online privacy – Industry self-regulation in practice
In this video, Aleecia M. McDonald speaks about industry self-regulation for online privacy. What is the user burden if people read online privacy policies? How long would it …
Nigeria shuts down 800 scam websites
The Nigerian Economic and Financial Crimes Commission has shut down no fewer than 800 scam websites and arrested members of 18 syndicates behind the fraudulent scheme in a …
Suspected European cyber pirates denied Internet access without court order
The verdict is in: Europeans can be cut off the Internet for persistent file-sharing, and it can be done without a court order. According to ISPreview, the decision comes as a …
Snort 2.8.5.1 released
Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol …
96 percent of Americans in favor of video surveillance to counteract terrorism
A recent Harris Poll survey indicates that 96 percent of U.S. citizens feel the federal government and law enforcement agencies should be able to use video surveillance in an …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage