Help Net Security
Customized webinjects for Zeus and SpyEye Trojans on sale
Criminals are now selling customized webinjects that are priced per feature. For example, one seller offers a webinject for Zeus/SpyEye that contains the automatic transfer …
Virtualization critical for disaster recovery
A BUMI survey, which polled CEOs, business owners and IT professionals at small- to mid-sized firms, found that 98 percent of respondents felt that more than one day to …
FIPS-validated mobile VPN for iPhone and iPad
Columbitech announced the availability of the enterprise-grade mVPN Secure Browser 5.0, which supports the iPhone, iPad and iPod Touch. The browser provides secure access to …
Windows 8 marks the beginning of the WinRT era
Windows 8 marks the beginning of the new WinRT (Windows Runtime) computing era and the beginning of the end of the WinNT era, according to Gartner. The combination of the …
Microsoft survey exposes online bullying threat
More than half (54 percent) of children around the world worry about being bullied online, according to a new global survey released today by Microsoft. Conducted in 25 …
Splunk App for Active Directory released
Splunk announced the Splunk App for Active Directory which helps enable organizations to avoid service outages and provides proactive management and compliance reporting of …
Bitdefender unveils new generation of products
Bitdefender launched Bitdefender 2013, improving and adding a whole arsenal of features to keep users safe. Bitdefender Safepay brings online banking and shopping to a whole …
Zeus malware strain infecting 1 in 50 PCs
ThreatMetrix Labs came across a new variant of the P2P version of the Zeus Trojan. One of the main changes to this variant is the way it encrypts its configuration file …
DroidSheep: Android tool for session hijacking
DroidSheep is a simple Android tool for web session hijacking (sidejacking). It listens for HTTP packets sent via a wireless (802.11) network connection and extracts the …
MI5 describes astonishing level of cyber attacks
MI5 has admitted that it is working to counter astonishing levels of cyber-attacks on UK industry. Head of MI5, Jonathan Evans, commented that vulnerabilities on the internet …
Video: Attacking XML preprocessing
Documenting more than a year of research in XML technologies, this talk by Nicolas Grégoire at Hack in The Box 2012 Amsterdam details security implications of the XML format …
Network Forensics: Tracking Hackers Through Cyberspace
Learn to recognize hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious email attachments from …
Featured news
Resources
Don't miss
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks
- Key tips to stay safe from deepfake and AI threats
- UK retailers under cyber attack: Co-op member data compromised
- How CISOs can talk cybersecurity so it makes sense to executives