Largest simulated cyber attack to date
In order to test the National Cyber Incident Response Plan and the new National Cybersecurity and Communications Integration Center, the DHS will hold the largest simulated …
CompTIA A+ certification exam to include Windows 7 content
CompTIA will update its flagship CompTIA A+ certification exams with new content related to the Windows 7 operating system beginning in January 2011. Windows 7 content will be …
U.S. drafts bill proposing easier Internet wiretapping
As criminals and terrorists are progressively ditching phone communication in favor of the online kind, U.S. law enforcement and national security agencies are worried about …
Spamhaus launches whitelist service
The Spamhaus Project has released the Spamhaus Whitelist which allows Internet mail servers to separate incoming email traffic into 3 categories: Good, Bad and Unknown, …
Fake LinkedIn spam attack
Starting on Monday, cyber criminals sent spam email messages targeting the LinkedIn social media community. Victims are emailed an alert link with a fictitious social media …
Manual SQL Injection demonstration using DVWA
Scripts are nice, but they will fail eventually. But, that doesn’t mean the flaw is not exploitable. Eventually you will need to turn to manual techniques to verify a …
Google warns Gmail users on spying attempts from China
Recently, a number of users have been witnessing a glaring red banner popping up when they accessed their Gmail account, saying “Warning: We believe your account was …
ZeuS tries to bypass two-factor authentication
Since more and more financial institutions and companies are beginning to use mobile text messages in order to provide two-factor authentication to its users, it was just a …
As the PCI deadline looms, merchants should avoid quick fix measures
On Thursday 30 September 2010, the latest PCI DSS deadline kicks in, requiring all level one merchants (those processing more than six million transactions per year) to adhere …
USB drive identifies and extracts data, leaving no footprint
Harris Corporation introduced a highly customizable USB thumb drive that quickly extracts targeted data from computers. The device – called BlackJack – is designed …
60% of organizations suffered $2 million losses for Web 2.0 security issues
While organizations see the potential value of Web 2.0 tools, decision makers continue to debate whether or how to allow employee usage of the technology in the workplace. A …
Free malicious PDF analysis e-book
Didier Stevens, the hacker who became a synonym for malicious PDFs, released a free e-book. It’s a chapter he wrote as co-author of a malware analysis book. For more …
Featured news
Resources
Don't miss
- Salesforce Gainsight compromise: Early findings and customer guidance
- Research shows identity document checks are missing key signals
- How one quick AI check can leak your company’s secrets
- Salesforce investigates new incident echoing Salesloft Drift compromise
- Security gap in Perplexity’s Comet browser exposed users to system-level attacks