Help Net Security
Security fix in Ruby on Rails 2.3.5
Ruby on Rails 2.3.5 was released over the weekend which provides several bug-fixes and one security fix. It should be fully compatible with all prior 2.3.x releases and can be …
Visualize network packets with Pkviz
Pkviz is a tool for plotting and cycling through and animating a series of network packets captured by tcpdump. What makes it unique is that the packets’ structure is …
Privacy and security: A fine balancing act
ENISA has just published a seven minute video overview of the recent NIS Summer School 2009. The short documentary follows up on the topic of this year’s event – …
Staying ahead of the cybercriminal
There has been a lot of talk this year about the increasing sophistication of cybercrime threat – even going so far as to claim that virus creation has moved into the …
Week in review: IE vulnerabilities, iPhone anti-virus and security threats for 2010
Here’s an overview of some of last week’s most interesting news, interviews and articles: Workers stealing data for competitive edge 85% of people admit they know …
Invasive vs. non invasive web application security scan
When evaluating an automated web application security tool, such as Acunetix WVS, the first two questions that typically one would ask are “Does this tool perform an …
Online banking security risks through European eID cards
A new paper by the European Network and Information Security Agency (ENISA) focuses on authentication risks with European eID Cards. It analyzes 7 vulnerabilities, identifies …
(IN)SECURE Magazine on the Amazon Kindle
Amazon’s coveted Kindle e-reader just got a firmware update that among other things, gives users the ability to read native PDF files. Naturally we had to investigate …
Aggressive malware attack disguised as Flash player upgrade
Red Condor issued a warning about the latest spam campaign that contains a phishing ploy and a malware threat. The email requests that recipients click on a link in the body …
Mobile data security doubts
A survey of 104 enterprise mobility professionals showed that more than two thirds of European organizations surveyed are not fully aware what sensitive data is stored within …
Online financial security threats: What can we expect in 2010?
Ori Eisen, Chief Innovation Officer at 41st Parameter, highlights the top five financial security threats which emerged as the biggest money makers for fraudsters and where he …
New risk management ISO standard
The new ISO standard for effective management of risk ISO 31000 provides principles, framework and a process for managing any form of risk in a transparent, systematic and …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online