Please turn on your JavaScript for this page to function normally.
RSA Conference Europe 2009 launches registration grant programme

RSA Conference announced in partnership with Acumin Consulting, the launch of its new Registration Grant Programme for security practitioners who have lost their jobs amid the …

Amazon multi-factor authentication for AWS accounts

An additional layer of protection is now available to protect your AWS account from unauthorized use. Once activated for your AWS account, the new Amazon Multi-Factor …

Microsoft IIS remotely exploitable vulnerability

According to an exploit posting on Milw0rm, there is a serious remotely exploitable vulnerability in the Microsoft’s IIS server. US Cert Vulnerability Note VU#276653 …

Security solution for Craigslist

Craigslist crime schemes steal millions of dollars each year, or worse, lead to violent crime. TrustMe prevents crime through its security solution for Craigslist buyers and …

IBM unveils public desktop cloud

The new IBM Smart Business Desktop on the IBM Cloud subscription service helps clients virtualize desktop computing resources, and provide a logical, rather than a physical, …

3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats Call for Papers

The 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10) announced a Call for Papers. Important dates Submissions due: Thursday, February 25, …

Security suite PenTBox 1.0.1 beta released

PenTBox is a security suite with programs like password crackers, Denial of Service testing tools, secure password generators, honeypots and much more. Programmed in Ruby, and …

The lifecycle of Web-based malware

According to the August edition of the MessageLabs Intelligence monthly report, it can be a costly exercise for the bad guys to produce new families of malware in order to …

Rogue software: BlockDefense

Here is the latest bogus antispyware that’s trying to get your money: BlockDefense. According to Lavasoft Affiliates, the last in a long stream of similar …

DDoS botnets for rent

Gunter Ollmann at Damballa’s blog says that if you are interested in renting a botnet, you just need to know how to search the Web. As unimmaginable (or unethical) as it …

What do we know about the Conficker worm?

According to John Markoff, we know what the Conficker worm does and how it does it, but little else. Who made it? What purpose does or will the network of 5 million zombie …

Software for more secure enterprise mashups

The OpenAjax Alliance announced the approval and availability of OpenAjax Hub 2.0 as an industry standard for more secure Web 2.0 mashup applications. Advances in security in …

Don't miss

Cybersecurity news