RSA Conference Europe 2009 launches registration grant programme
RSA Conference announced in partnership with Acumin Consulting, the launch of its new Registration Grant Programme for security practitioners who have lost their jobs amid the …
Amazon multi-factor authentication for AWS accounts
An additional layer of protection is now available to protect your AWS account from unauthorized use. Once activated for your AWS account, the new Amazon Multi-Factor …
Microsoft IIS remotely exploitable vulnerability
According to an exploit posting on Milw0rm, there is a serious remotely exploitable vulnerability in the Microsoft’s IIS server. US Cert Vulnerability Note VU#276653 …
Security solution for Craigslist
Craigslist crime schemes steal millions of dollars each year, or worse, lead to violent crime. TrustMe prevents crime through its security solution for Craigslist buyers and …
IBM unveils public desktop cloud
The new IBM Smart Business Desktop on the IBM Cloud subscription service helps clients virtualize desktop computing resources, and provide a logical, rather than a physical, …
3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats Call for Papers
The 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10) announced a Call for Papers. Important dates Submissions due: Thursday, February 25, …
Security suite PenTBox 1.0.1 beta released
PenTBox is a security suite with programs like password crackers, Denial of Service testing tools, secure password generators, honeypots and much more. Programmed in Ruby, and …
The lifecycle of Web-based malware
According to the August edition of the MessageLabs Intelligence monthly report, it can be a costly exercise for the bad guys to produce new families of malware in order to …
Rogue software: BlockDefense
Here is the latest bogus antispyware that’s trying to get your money: BlockDefense. According to Lavasoft Affiliates, the last in a long stream of similar …
DDoS botnets for rent
Gunter Ollmann at Damballa’s blog says that if you are interested in renting a botnet, you just need to know how to search the Web. As unimmaginable (or unethical) as it …
What do we know about the Conficker worm?
According to John Markoff, we know what the Conficker worm does and how it does it, but little else. Who made it? What purpose does or will the network of 5 million zombie …
Software for more secure enterprise mashups
The OpenAjax Alliance announced the approval and availability of OpenAjax Hub 2.0 as an industry standard for more secure Web 2.0 mashup applications. Advances in security in …