Multiple vulnerabilities in popular Web servers
When a file is created on a Windows system, a DOS-compatible 8.3 short file name (hereafter referred to as ‘8.3 alias’) is generated for backwards compatibility …
Automated malware analysis platform
HBGary released Responder Professional 2.0, a Windows physical memory and automated malware analysis platform that analyzes all programs in memory including malware to obtain …
Beyond the cloud: Common Assurance Metric
The Common Assurance Metric (CAM) launched today is a global initiative that aims to produce objective quantifiable metrics, to assure Information Security maturity in cloud, …
Phishing site spoofing secure login page
A phishing site masquerading as the secure login page of CenturyLink, the fourth largest local exchange telephone carrier in the US in terms of access lines, has been …
Zero-day vulnerabilities on the market
Zero-day vulnerabilities have become prized possessions to attackers and defenders alike. As the recent China-Google attack demonstrated, they are the basis on which most of …
Rogue software details: AntiSpyware
AntiSpyware is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Sensitive information retrieved from P2P networks
Security researchers Larry Pesce and Mick Douglas demonstrated on Friday – at this year’s ShmooCon security conference in Washington, D.C – the amazing …
Biggest Chinese hacker training site taken down
Black Hawk Safety Net, the biggest Chinese hacker training site, has been shut down by the police. The tally is: three people arrested; nine Web servers, five computers and …
Safer surfing mobile social networks
ENISA (the European Network and Information Security Agency) today presents a new report on accessing social networks over mobile phones which points out the risks and threats …
Week in review: cloud computing security, black hat hacking, identity theft
Here’s an overview of some of last week’s most interesting news, reviews and articles: Cloud computing not as safe as they want you to think Cloud computing has …
Can you trust Chinese computer equipment?
Steven J. Vaughan-Nichols, a blogger for IT World, raised the question, but before answering it, let’s take a look at the current backdrop that should affect the …
Infected Firefox add-ons pulled off official site
Two infected Firefox add-ons managed to avoid detection and were put online, available to download, on Firefox’s official add-on download site. The one thing that …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations