Internet worms record rapid global growth
Major security developments in 2009 included Conficker, the most damaging networking worm for years. Conficker spread fast in computers using the Windows XP operating system …
Most dangerous web domains
Africa’s Cameroon (.cm) has overthrown Hong Kong (.hk) as the Web’s riskiest domain, according to McAfee’s third annual Mapping the Mal Web report, released …
Spam ring leader fined $16 million
Lance Atkinson, the Australia-based New Zealander that has been found guilty of organizing a spam ring along with American accomplice Jody Smith, has been fined with more that …
Freeware version of GFI EndPointSecurity
Endpoint security threats are constantly evolving and critical data is lost due to non-existent or ineffective security practices. The proliferation of high capacity thumb …
Break Microsoft BitLocker encryption
Passware created the first commercially available software to break Microsoft BitLocker hard drive encryption. BitLocker is an advanced, full-disk protection feature available …
FreeBSD bug grants root access to unprivileged users
A FreeBSD exploit that grants OS root access to unprivileged users was published yesterday on the Full Disclosure mailing list by Nikolaos Rangos, a German researcher that has …
Scam victim psychology: What makes you vulnerable?
“Understanding scam victims: seven principles for systems security” is a paper by Frank Stajano, an associate professor with the Computer Laboratory of the …
DNS rebinding exploit how to
The DNS rebinding exploit has caused much confusion. In this video, Robert “RSnake” Hansen explains how hackers can take advantage of this attack and why the …
Rogue security software database
Rogue security applications, often referred to as scareware, are rising at a rapid rate, posing one of today’s greatest security challenges to computer users. Taking the …
Kaspersky releases Password Manager
Every day an active user will encounter a large number of online services and programs which require authorization. In order to access email, instant messaging services, …
Wireless network detector Kismet 2009-11-R1 released
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) …
Clientless SSL VPN products break browser security mechanisms
Clientless SSL VPN products from multiple vendors put users at risk of a variety of web-based attacks because they “break fundamental browser security mechanisms”. …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations