Help Net Security
Free cross site scripting security scanner
Acunetix today launched a free edition of its popular web vulnerability scanner, which allows companies to check for cross site scripting vulnerabilities in their websites at …
Practical 10 Minutes Security Audit: Oracle Case
This paper will show an extremely simple technique to quickly audit a software product in order to infer how trustworthy and secure it is. It will show you step by step how to …
Exploit auction company WabiSabiLabi speaks out at HITBSecConf2007
Roberto Preatoni, WabiSabiLabi’s Strategic Director (and founder of Zone-H defacement mirror) will hold a presentation entitled “WabiSabiLabi – The Exploit …
Video – how to build a laser espionage microphone
Update (February 2016): Multimedia file removed, as it was using Adobe Flash.
August a dead season for virus epidemics
August once again turned out to be “dead season” for virus epidemics in 2007. Since August 2003, when the Lovesan worm caused the biggest epidemic in history, the …
Log Management in PCI Compliance
Security professionals have come to realize that ensuring data security and integrity is critical to business continuity and risk mitigation. However, with increasing amounts …
Malicious toolbars top the list of most common malware
Panda Security informs that almost 28 percent of computers with installed protection scanned at the Infected or Not website (http://www.infectedornot.com) last week were …
Company wins important ruling for the anti-malware industry
Kaspersky Lab, a leading developer of secure content management solutions, announces that the United States District Court of Washington ruled in favor of Kaspersky Lab, …
Reducing Shoulder-surfing by Using Gaze-based Password Entry
Shoulder-surfing – using direct observation techniques, such as looking over someone’s shoulder, to get passwords, PINs and other sensitive personal information …
Weekly malware report: MSN Messenger and IRC worms
The most important malware samples analyzed by PandaLabs this week are the MSNHorn.A and Nugache.M worms, and the Legmir.ASG Trojan. MSNHorn.A spreads through MSN Messenger by …
Rihanna and Kelly Clarkson video emails spread a trojan horse
Sophos is warning internet users about the latest disguise being used by malware authors in their attempt to infect people’s PCs – an email claiming to point to …
Searching for evil
Computer security has recently imported a lot of ideas from economics, psychology and sociology, leading to fresh insights and new tools. I will describe one thread of …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits