Pentagon to aid DHS in case of cyber attack on domestic soil
It is a well know fact that the U.S. Department of Defense is forbidden to deploy military units within the nation’s boarders for law enforcement purposes. The only …
Integrating Hydra with Nessus
The video below shows you how to integrate custom username and password dictionaries with Hydra to your Nessus scans.
Apple updates Java for Mac OS X 10.5 and 10.6
The latest Java updates from Apple deliver improved reliability, security, and compatibility. Java for Mac OS X 10.5 Update 8 supersedes all previous updates of Java for Mac …
FBI warns businesses about corporate account take overs
The FBI has issued a fraud advisory to warn businesses about the various bank fraud scams currently employed. Created by financial institutions, industry trade associations, …
The rise of the insider threat
The bank insider threat is on the rise. Patrick Romain, head of solutions in Barclays Information Security Group, calls it a “power threat” – obviously …
IBM improves cloud security
IBM unveiled a new security initiative focused on making cloud computing safer. IBM aims to help both users and providers of cloud computing more easily navigate security …
Global e-crime gang transitions to crimeware
The world’s most prolific phishing gang has completed a transition from using conventional phishing to massively propagating stealthy password-stealing crimeware that …
IEEE 802.16m approved as IMT-Advanced technology
The WiMAX Forum today recognizes the decision within the International Telecommunication Union (ITU) approving the “WirelessMAN-Advanced” technology of IEEE …
Metasploit Framework 3.5.0 comes with over 600 exploits
The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration …
Apache 2.2.17 fixes vulnerabilities
The Apache HTTP Server Project released version 2.2.17 that fixes three security vulnerabilities. expat DoS A buffer over-read flaw was found in the bundled expat library. An …
Spam and virus trends according to Google
Postini – the spam engine that powers Google’s e-mail security and archiving services – handles some 3 billion e-mails per day, so it’s fair to say …
The Zeus malware R&D program
Trusteer captured and analyzed a new version (2.1) of the Zeus financial malware and found that it has added sophisticated new mechanisms to commit online fraud and remain the …
Featured news
Resources
Don't miss
- Attackers target retailers’ gift card systems using cloud-only techniques
- Attackers turn trusted OAuth apps into cloud backdoors
- Life, death, and online identity: What happens to your online accounts after death?
- OpenFGA: The open-source engine redefining access control
- For blind people, staying safe online means working around the tools designed to help