Nmap 5.20 released
Nmap is a free and open source utility for network exploration or security auditing. Nmap 5.20 offers more than 150 significant improvements: 30+ new Nmap Scripting Engine …
Analysis of 32 million breached passwords
Imperva released a study analyzing 32 million passwords exposed in the Rockyou.com breach. The data provides a unique glimpse into the way that users select passwords and an …
Mac OS X Snow Leopard common criteria certification
Atsec information security announced the successful common criteria certification of Mac OS X Snow Leopard at EAL 3 (augmented for flaw remediation) with the Controlled Access …
Fear of stealth hackers
One of the biggest fears that software companies have is that someday hackers will manage to steal the source code of their products and modify it so that they can secretly …
Critical Shockwave Player vulnerabilities patched
Critical vulnerabilities have been identified in Adobe Shockwave Player 11.5.2.602 and earlier versions, on the Windows and Macintosh operating systems. The vulnerabilities …
Hiding from Google
Worried about Google tracking your online activity? Not satisfied with Tor’s speed? A (partial) solution to your problem has been set up by Moxie Marlinspike, a hacker …
Networks Solutions breached, hundreds of sites defaced
Network Solutions, the well-known U.S. hosting provider and domain registrar that manages over 6.6 million domain names, confirmed on Tuesday that their servers have been …
4,500 USBs left at dry cleaners
A survey reveals that in the last year, 4500 memory sticks have been forgotten in people’s pockets as they take their clothes to be washed at the local dry cleaners. …
Google petitions for a EU security and privacy committee
As one of the reasons behind its practice of keeping users’ IP addresses and search histories Google mentions their use as tools for combating attacks such as the one …
Virus signature checksum risks
The notion of virus signatures is very easy for laymen to grasp if they stick to this analogy: anti-virus solutions detecting malware trying to pass itself as an innocuous …
FBI Director to chronicle the evolution of cyber threats at RSA Conference 2010
Robert Mueller, Director of the Federal Bureau of Investigation, will deliver a keynote address at RSA Conference 2010. Mueller’s keynote will detail cyber threats …
Rogue software details: ArmorDefender
ArmorDefender is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Featured news
Resources
Don't miss
- Why we must go beyond tooling and CVEs to illuminate security blind spots
- Making security and development co-owners of DevSecOps
- Review: Passwork 7.0, self-hosted password manager for business
- What a mature OT security program looks like in practice
- Machine unlearning gets a practical privacy upgrade