Please turn on your JavaScript for this page to function normally.
“Rough cut” of to-be-published book on Ajax security

Addison-Wesley released a “Rough Cut” of the forthcoming book Ajax Security. Rough Cuts, from Safari Books Online, allow readers to gain access to portions of a …

New application security software from SPI Dynamics

S.P.I. Dynamics announced WebInspect, according to the company, the first and only web application security assessment tool to be re-architected to thoroughly analyze …

iPods and other portable storage devices still a growing threat for data leakage

CREDANT Technologies released a survey of 323 directors, managers, CIOs, CEOS and others from the fields of IT, banking and finance, medicine, government, and education on the …

Roaming wireless spammer escapes cell-time

Sophos is reminding computer users about the importance of securing their wireless internet access following the sentencing of a man who sent pornographic spam while driving …

World’s first mobile WLAN analyzer for 802.11n networks

AirMagnet recently announced AirMagnet Laptop Analyzer 7.5, the industry’s first mobile WLAN analyzer to natively decode and analyze 802.11n Wi-Fi networks. AirMagnet …

Company’s sending spam from their domain and don’t even know it

BorderWare Security Network reported that email traffic from individual organizations has over 80% of their email sent from IP addresses outside of their domain. The majority …

New Linux and FreeBSD Mail Security betas

ESET Mail Security protects e-mail messages and e-mail gateway servers against known and unknown viruses, worms, Trojans, spyware, phishing, spam and other Internet threats. …

First WordPress worm

A researcher discovered seven new WordPress vulnerabilities which may lead to a successful blog compromise under appropriate circumstances. All of them are detailed on his …

New book: “Cross-Site Scripting Attacks: XSS Exploits and Attacks”

WhiteHat Security today announced the availability of Jeremiah Grossman’s book — Cross-Site Scripting Attacks: XSS Exploits and Attacks. The book offers a detailed …

First NIST certification for encrypting hard drive

Seagate announced that the National Institute of Standards and Technology (NIST), the U.S. federal agency focused on promoting product innovation by establishing technical …

VoIP-to-Data exploit to be presented at Black Hat USA 2007

Sipera VIPER Lab will demonstrate a VoIP exploit that allows hackers to take control and delete or steal data from a laptop running an enterprise VoIP softphone, at the Black …

When trojans go phishing 500,000 get infected

Finjan released a report detailing how new Crimeware is being used to steal banking customer data from infected PCs. During July 2007, Finjan has identified 58 criminals using …

Don't miss

Cybersecurity news