Help Net Security
Infrastructure fingerprinting via XSS
Yokoso! is an infrastructure fingerprinting system delivered via XSS attack. This project contains two different parts; the fingerprints and modules for the various browser …
Sourcefire iPhone application
A new free Sourcefire VRT iPhone application is available now from the App Store. This app features three real-time Sourcefire news feeds, including VRT Updates, VRT Top 10 …
New patent for encryption key generation method
The United States Patent and Trademark Office has granted Authernative a patent for an encryption key generation method. The newly issued US Patent No. 7,577,987 titled …
Carrier grade IPsec toolkit
SafeNet announced version 5 of QuickSec , a carrier grade IPsec toolkit that offers true multi-core support, integrated with Cavium Networks OCTEON Multi-core MIPS64 …
New book: “Mac OS X Snow Leopard: The Missing Manual”
For three consecutive years, one of the most popular computer books in the U.S. has been David Pogue’s Mac OS X: The Missing Manual. And now the beast is back. The new …
Amazon Relational Database Service enters public beta
The public beta of Amazon Relational Database Service (Amazon RDS), a new web service that makes it easy to set up, operate, and scale relational databases in the cloud. …
One-credential system for physical access control
CertiPath introduced architecture and operational systems for federated physical access control (PACS), leveraging high-assurance credentials. The concept demonstrates the …
Identify and classify malware samples with YARA
YARA is a tool aimed at helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families based on textual or …
BlackBerry spy software
Retina-X Studios released Mobile Spy for BlackBerry devices. Mobile Spy runs in total stealth mode and no mentions of the program are shown inside the BlackBerry. After the …
Malware and poor passwords ranked as greatest threats
Today’s IT security and authentication professionals have less confidence and greater security concerns for their organizations than last year, according to a recent …
Week in review: RSA Conference, Web application security, fuzzing, Metasploit, and more
Here is an overview of some of last week’s most interesting news, interviews and articles: Anti-phishing coalition deploys real-time education program The APWG and …
Zipped Trojan in email attachment leads to further infection
Here is the proof you should never open attachments from anyone you don’t know or don’t trust: TrendLabs discovered spam emails professing to be from LSM Company, …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations