Help Net Security
Free Web application security assessment
The Cenzic HealthCheck program is offering the first 500 SMBs a free application vulnerability assessment performed by Cenzic Web security experts using the companies …
Report: Windows 7 security
With the recent release of Windows 7, many individuals and businesses are questioning whether or not the new platform demonstrates any significant security improvements over …
General purpose fuzzing tool
Codenomicon released a general purpose fuzzing tool today for testing all communication interfaces. The new Traffic Capture Fuzzer loads threat vectors from sources like …
Week in review: Ubuntu security, first iPhone worm, social engineering in practice
Here is an overview of some of last week’s most interesting news, interviews and articles: Ask the social engineer: Practice One reader wrote in asking: “How can …
First iPhone worm discovered
Sophos reports that some Apple iPhone owners in Australia have seen their smartphones get infected by a worm that has changed their wallpaper to an image of 1980s pop musician …
Web application security testing tool Websecurify 0.4 RC1 released
Websecurify is a Web application security testing tool which automatically identifies vulnerabilities by using advanced scanning and fuzzing technologies. The key improvements …
Exploitation of online banking credentials on the rise
Within the last several months, the FBI has seen a significant increase in fraud involving the exploitation of valid online banking credentials belonging to small and medium …
Battle of the anti-virus: What is the best software?
AV-Comparatives.org recently released the results of a malware removal tests with which they evaluated 16 anti-virus software solutions: Avast Professional Edition 4.8 AVG …
Major vulnerability in SSL authentication
Marsh Ray and Steve Dispensa of PhoneFactor discovered a serious vulnerability in SSL, the most common data security protocol on the Internet. The SSL Authentication Gap …
Video: Web application scanning with credentials using Nessus
Learn how to configure Nessus to use credentials and login into a web application to scan with CGI generic tests.
EU leaders agree on Internet access safeguards
A user’s Internet access may be restricted, if necessary and proportionate, only after a fair and impartial procedure including the user’s right to be heard. …
Which country has the most bot-infected computers?
According to data compiled during October by PandaLabs, Spain tops the bot ranking with 44.49% of all computers infected by bots. These programs, once they have infected a …