Help Net Security
Company’s sending spam from their domain and don’t even know it
BorderWare Security Network reported that email traffic from individual organizations has over 80% of their email sent from IP addresses outside of their domain. The majority …
New Linux and FreeBSD Mail Security betas
ESET Mail Security protects e-mail messages and e-mail gateway servers against known and unknown viruses, worms, Trojans, spyware, phishing, spam and other Internet threats. …
Quantitative Look at Penetration Testing
Since 2004 Matta has been running a project to test the technical competence of security consultants. With probably the largest collection of data on the methodology’s …
First WordPress worm
A researcher discovered seven new WordPress vulnerabilities which may lead to a successful blog compromise under appropriate circumstances. All of them are detailed on his …
New book: “Cross-Site Scripting Attacks: XSS Exploits and Attacks”
WhiteHat Security today announced the availability of Jeremiah Grossman’s book — Cross-Site Scripting Attacks: XSS Exploits and Attacks. The book offers a detailed …
First NIST certification for encrypting hard drive
Seagate announced that the National Institute of Standards and Technology (NIST), the U.S. federal agency focused on promoting product innovation by establishing technical …
VoIP-to-Data exploit to be presented at Black Hat USA 2007
Sipera VIPER Lab will demonstrate a VoIP exploit that allows hackers to take control and delete or steal data from a laptop running an enterprise VoIP softphone, at the Black …
When trojans go phishing 500,000 get infected
Finjan released a report detailing how new Crimeware is being used to steal banking customer data from infected PCs. During July 2007, Finjan has identified 58 criminals using …
Trend Micro goes the Software-as-a-Service with SecureCloud
Trend Micro announced immediate availability of SecureCloud, their complete Software-as-a-Service Security platform offering its industry leading threat protection solutions …
Manage Your Passwords with 1Passwd
Nowadays everyone has too many passwords to remember. People either use easy to remember passwords or even worse, the same password for multiple accounts. 1Passwd makes things …
Testing a Bluetooth worm on Nokia E90 Communicator
Mikko H. Hypp?¶nen, F-Secure’s Chief Research Officer will be delivering presentations on the current state of mobile malware this week in Black Hat Briefings and next …
The Story of DEFCON
Jeff Moss aka Dark Tangent, the founder of DEFCON and Black Hat, tells the history of the largest hacker conference and how it all got started. Find out more about the early …
Featured news
Resources
Don't miss
- Hackers used Cisco zero-day to plant rootkits on network switches (CVE-2025-20352)
- Microsoft revokes 200 certs used to sign malicious Teams installers
- A new approach to blockchain spam: Local reputation over global rules
- SAP zero-day wake-up call: Why ERP systems need a unified defense
- “Perfect” Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)