Research and analysis of stealth Master Boot Record rootkit
In 2005 Derek Soeder and Ryan Permeh, researchers from eEye Digital Security, presented eEye BootRoot. The technique used in their project wasn’t new and had been …
Top threats and security trends for 2008
Security experts at AVG published their analysis of 2007’s top viruses, Internet hacks and exploits, and reveal their forecast for the top security threats facing …
Looking back at 2007’s top viruses
Viruses made up some 15 percent of the threat landscape in 2007. According to AVG global security strategist Larry Bridwell, the 10 viruses exhibiting the most staying power …
NetSecurity opens state-of-the-art computer forensics lab
NetSecurity Corporation announced the launch of NetSecurity Forensic Labs, a state-of-the-art secure facility offering computer forensics investigation, electronic discovery, …
Test the security of your PC with F-Secure’s online Health Check
F-Secure Health Check enables Internet users to perform a comprehensive over-the-web check on the overall security status of their PC, including the operating system, web …
Free version of BinarySEC web application firewall
BinarySEC is a web application software firewall, that learns legitimate traffic of any website or web application running on Apache and blocks suspicious traffic. BinarySEC …
Year-end email threats trend report
Commtouch just released its 2007 Q4 Email Threats Trend Report, based on the automated analysis of billions of email messages weekly. The report examines recent trends in …
Yahoo! Mail rolls out new spam defense system
Yahoo! is tightening up their spam controls with a significant new defense system. They are now rejecting e-mail coming from zombie computers and identifying them with …
Fresh from CES – Firestick Pico ultra-portable security USB device
Yoggie Security Systems has introduced a unique, ultra-portable USB key-sized hardware-based firewall solution to protect PCs from malicious attacks. The Firestick Pico places …
New book: “Linux Networking Cookbook”
The recipes in her book focus on connectivity: firewalls, wireless access points, secure remote administration, remote helpdesk, remote access for users, Virtual Private …
Fresh from CES – Maxtor BlackArmor hardware encrypted storage solution
At CES, Seagate Technology introduced Maxtor BlackArmor encrypting storage solution that provides AES government-grade encryption protection against unauthorized access to …
Firefox basic authentication spoofing details and video
Researcher Aviv Raff found out that Mozilla Firefox allows spoofing the information presented in the basic authentication dialog box. This can allow an attacker to conduct …
Featured news
Resources
Don't miss
- Vulnerable firmware for Gigabyte motherboards could allow bootkit installation
- AsyncRAT evolves as ESET tracks its most popular malware forks
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine