Open source forensic framework
Mobius Forensic Toolkit is an open source forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing …
2009 in threats: Fake security software, search engines and social networks
The latest State of the Internet 2009 report by CA states that the most notable 2009 online threats were rogue/fake security software, major search engines, social networks …
Metasploit Framework 3.3.2 released
The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration …
SQL injection attack claims 132,000+
A large scale SQL injection attack has injected a malicious iframe on tens of thousands of susceptible websites. ScanSafe reports that the injected iframe loads malicious …
Zbot Trojan uses Amazon cloud
There is a new variant of the Zeus/Zbot Trojan out there that takes advantage of Amazon’s EC2 services for command and control purposes of the botnet. CA’s threat …
Snort Alert Monitor 0.6.0 released
Snort Alert Monitor works in conjunction with Snort and provides much better reporting and real-time statistics that aren’t available with Snort alone. New in Snort …
The security nightmare formula
According to the Cisco 2009 Annual Security Report, small errors on the part of computer users or their IT departments may not wreak havoc on their own, but in combination, …
iptables 1.4.6 released
iptables is the userspace command line program used to configure the Linux 2.4.x and 2.6.x IPv4 packet filtering ruleset. It is targeted towards system administrators. …
E-card malware scam
Red Condor issued a warning about a new e-Card spam campaign that appears to come from American Greetings’ BlueMountain.com. The email, with the subject line “You …
Threats and threat technologies in 2010
Trend Micro released a report titled “The Future of Threats and Threat Technologies”, in which they analyzed the current situation and made some predictions for …
Top 10 botnets and their impact
Every day, approximately 89.5 billion unsolicited messages (i.e. spam) are sent by computers that have been compromised and are part of a botnet. Botnets – apart from …
Global IT-related risk framework
ISACA released Risk IT, the first global IT-related risk framework to provide a comprehensive view of the business risks associated with IT initiatives. Available as a free …
Featured news
Resources
Don't miss
- Sensitive data of Eurail, Interrail travelers compromised in data breach
- PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)
- Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses
- LinkedIn wants to make verification a portable trust signal
- QR codes are getting colorful, fancy, and dangerous