“Rough cut” of to-be-published book on Ajax security
Addison-Wesley released a “Rough Cut” of the forthcoming book Ajax Security. Rough Cuts, from Safari Books Online, allow readers to gain access to portions of a …
New application security software from SPI Dynamics
S.P.I. Dynamics announced WebInspect, according to the company, the first and only web application security assessment tool to be re-architected to thoroughly analyze …
iPods and other portable storage devices still a growing threat for data leakage
CREDANT Technologies released a survey of 323 directors, managers, CIOs, CEOS and others from the fields of IT, banking and finance, medicine, government, and education on the …
Roaming wireless spammer escapes cell-time
Sophos is reminding computer users about the importance of securing their wireless internet access following the sentencing of a man who sent pornographic spam while driving …
World’s first mobile WLAN analyzer for 802.11n networks
AirMagnet recently announced AirMagnet Laptop Analyzer 7.5, the industry’s first mobile WLAN analyzer to natively decode and analyze 802.11n Wi-Fi networks. AirMagnet …
Company’s sending spam from their domain and don’t even know it
BorderWare Security Network reported that email traffic from individual organizations has over 80% of their email sent from IP addresses outside of their domain. The majority …
New Linux and FreeBSD Mail Security betas
ESET Mail Security protects e-mail messages and e-mail gateway servers against known and unknown viruses, worms, Trojans, spyware, phishing, spam and other Internet threats. …
First WordPress worm
A researcher discovered seven new WordPress vulnerabilities which may lead to a successful blog compromise under appropriate circumstances. All of them are detailed on his …
New book: “Cross-Site Scripting Attacks: XSS Exploits and Attacks”
WhiteHat Security today announced the availability of Jeremiah Grossman’s book — Cross-Site Scripting Attacks: XSS Exploits and Attacks. The book offers a detailed …
First NIST certification for encrypting hard drive
Seagate announced that the National Institute of Standards and Technology (NIST), the U.S. federal agency focused on promoting product innovation by establishing technical …
VoIP-to-Data exploit to be presented at Black Hat USA 2007
Sipera VIPER Lab will demonstrate a VoIP exploit that allows hackers to take control and delete or steal data from a laptop running an enterprise VoIP softphone, at the Black …
When trojans go phishing 500,000 get infected
Finjan released a report detailing how new Crimeware is being used to steal banking customer data from infected PCs. During July 2007, Finjan has identified 58 criminals using …
Featured news
Resources
Don't miss
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics
- How to use Hide My Email to protect your inbox from spam
- Zyxel CPE devices under attack via critical vulnerability without a patch (CVE-2024-40891)
- DeepSeek’s popularity exploited by malware peddlers, scammers