Deep packet inspection – illegal or not?
Virgin Media’s plan to monitor traffic on its networks to assess the percentage and nature of illegal file-sharing may be soon hitting a roadblock, since Privacy …
Virus writers produce hardware damaging code?
BitDefender identified a new e-threat that combines the destructive behavior of a virus with the spreading mechanisms of a worm. There are two known variants of this virus, …
Devious ransom trojan takes data hostage
Taking data hostage is not a new invention in the world of cybercrime but a trojan currently infecting computers does it in a way that can leave the victim unaware that he has …
TechCrunch compromised by security exploit
Popular technology blog TechCrunch was compromised earlier today and their site was replaced by a message that links to a website offering assorted links to pirated material: …
Collection of penetration testing tools
Complemento is a collection of tools for penetration testing that has been included in BackTrack 4 Final LetDown is a TCP flooder that has an (experimental) userland TCP/IP …
Cybercrime increasing faster than company defenses
Cybercrime threats posed to targeted organizations are increasing faster than many organizations can combat them. Moreover, a new survey suggests the threat of cybercrime is …
Are online profiles a danger to privacy?
The rapid proliferation of the use of social networking sites among adults 45 and older increases the need for awareness and education surrounding identity theft stemming from …
New books: Beautiful Testing, Core Data, RESTful Java with JAX-RS
Beautiful Testing offers 23 essays from 27 leading testers and developers that illustrate the qualities and techniques that make testing an art. Through personal anecdotes, …
Data breach costs increase
The 2009 Ponemon Institute benchmark study examines the costs incurred by 45 organizations after experiencing a data breach. Results were not hypothetical responses; they …
Using spam to beat spam
How to make a full-proof spam filter that will not block any of the legitimate email? A team at the International Computer Science Institute in Berkeley, California, and the …
Blippy, a great service for phishers?
Blippy, a new service that lets you twitter (blipper?) your recent purchases made with a credit card of your choice, could be a valuable tool for cyber criminals, warns …
Cloud computing brings changing security risks
Cloud-based services are fast becoming established as a credible alternative to existing server-based IT solutions but organizations are failing to recognize the new security …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations