Please turn on your JavaScript for this page to function normally.
New book: “Hacking: The Next Generation”

With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers …

Analysis of 1 billion spam messages

Project Honey Pot, an international community of web and email administrators that joined their forces to track and stop online fraud and abuse, has decided it was time to …

High-performing DNS caching software

Secure64 Software released Secure64 DNS Cache, a high-performing DNS caching solution that offers the protection against cache poisoning attacks. “Continually rising …

Fake DHL delivery notice preys upon holiday shoppers

Holidays, a time for giving and receiving. You ordered stuff online, and are waiting for it to be delivered. You get an email. It’s from DHL (or so it seems). You open …

A closer look at Spyware Terminator 2.6.5.111

Spyware Terminator is a free spyware remover that monitors your computer for both known and unknown spyware. The known spyware can be detected and identified during the scan, …

Top 10 security predictions for 2010

Michael Sutton, VP of security research at Zscaler outlined the following security predictions for 2010. Apple is forced to climb the security learning curve Apple has for …

Rogue software details: InternetSecurity2010

InternetSecurity2010 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

The future of spam: 2010 and beyond

The economics behind spam dictate that 2010 will be another active year for spammers. The distribution of spam emails is set to continue as long as distribution channels …

U.S. and Russia discuss cyberwarfare

The United States and Russia have made the first tentative steps towards an agreement regarding the hardening of Internet security and restricting the use of cyberspace for …

Interactive packet manipulation tool

Scapy is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match …

Threat alert: Fake Flash greeting card

Cisco Security Intelligence Operations has detected serious activity related to spam e-mail messages that claim to contain a greeting card. The text in the spam message …

Malware in rich media and content

Cybercriminals most commonly used PDF and Shockwave Flash rich-media formats during the first half of 2009. In their State of the Internet 2009 report, CA discusses how …

Don't miss

Cybersecurity news