90% of public websites are vulnerable to attack
WhiteHat Security released the fourth installment of the WhiteHat Website Security Statistics Report, which calls out the top 10 most prevalent vulnerabilities and provides a …
Automated system lock down tool for Oracle Enterprise Linux
Trusted Computer Solutions announced that it has become a member of the Oracle PartnerNetwork and now offers organizations that have invested in Oracle Enterprise Linux …
New Mac OS X software: Norton AntiVirus Dual Protection for Mac
Symantec announced the new Norton AntiVirus Dual Protection for Mac, featuring vulnerability protection technology and antivirus for Mac users running Boot Camp or Windows …
Secure360 conference to focus on key security issues
Security professionals in the Upper Midwest can learn what’s new in “Evolving Security Threats and Practical Solutions” at the 2008 Secure 360 Conference on …
Microsoft acquires rootkit detection provider
Microsoft Corp. announced it has acquired Maryland-based Komoku Inc., a provider of advanced rootkit security detection solutions. Microsoft expects to add Komoku’s …
Don’t sign your refund check over to malware writers
With tax season coming down to the wire, most American households are preparing to fire up their web browsers in order to use one of the main online tax preparation software …
Weekly report on viruses and intruders
Among the thousands of malicious codes that have appeared this week, the present PandaLabs report focuses on the Bankolimb.AF Trojan and the Autorun.RS worm. When it is run, …
VeriSign introduces security upgrades to its Project Titan
VeriSign announced an expansion of its Project Titan initiative to include additional security upgrades aimed at strengthening its global Internet infrastructure. When it …
Malware prevention for Skype
FaceTime Communications announced enhancements to its Greynet Enterprise Manager including detection of malicious URLs entering the enterprise network via Skype instant …
Howard A. Schmidt named (ISC)2 Security Strategist
(ISC)2 announced that information security industry veteran Prof. Howard A. Schmidt, CISSP, has been named (ISC)2 Security Strategist by the board of directors, a role that …
Red Hat Certificate System source code released
Red Hat has just released all of the source code to Red Hat Certificate System. Much of the technology in Red Hat Certificate System was already open source, including the …
Man admits to writing anime trojan horse
Masato Nakatsuji, the 24-year-old who in January became the first ever virus writer to be arrested in Japan, admitted in Kyoto District Court that he created a Trojan horse …
Featured news
Resources
Don't miss
- Commix: Open-source OS command injection exploitation tool
- Review: The Chief AI Officer’s Handbook
- How QR code attacks work and how to protect yourself
- MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)
- OSPS Baseline: Practical security best practices for open source software projects