Help Net Security
New book: “Cross-Site Scripting Attacks: XSS Exploits and Attacks”
WhiteHat Security today announced the availability of Jeremiah Grossman’s book — Cross-Site Scripting Attacks: XSS Exploits and Attacks. The book offers a detailed …
First NIST certification for encrypting hard drive
Seagate announced that the National Institute of Standards and Technology (NIST), the U.S. federal agency focused on promoting product innovation by establishing technical …
VoIP-to-Data exploit to be presented at Black Hat USA 2007
Sipera VIPER Lab will demonstrate a VoIP exploit that allows hackers to take control and delete or steal data from a laptop running an enterprise VoIP softphone, at the Black …
When trojans go phishing 500,000 get infected
Finjan released a report detailing how new Crimeware is being used to steal banking customer data from infected PCs. During July 2007, Finjan has identified 58 criminals using …
Trend Micro goes the Software-as-a-Service with SecureCloud
Trend Micro announced immediate availability of SecureCloud, their complete Software-as-a-Service Security platform offering its industry leading threat protection solutions …
Manage Your Passwords with 1Passwd
Nowadays everyone has too many passwords to remember. People either use easy to remember passwords or even worse, the same password for multiple accounts. 1Passwd makes things …
Testing a Bluetooth worm on Nokia E90 Communicator
Mikko H. Hypp?¶nen, F-Secure’s Chief Research Officer will be delivering presentations on the current state of mobile malware this week in Black Hat Briefings and next …
The Story of DEFCON
Jeff Moss aka Dark Tangent, the founder of DEFCON and Black Hat, tells the history of the largest hacker conference and how it all got started. Find out more about the early …
Virus plays on Super Mario Bros nostalgia
Sophos is warning of a new mass-mailing worm that is capitalising on users’ enthusiasm for Nintendo’s iconic character, Mario. Once they open the email, recipients …
50% of organisations not coping with image-based spam
A survey by PineApp of 400 medium to large organisations in the UK has found that whilst 97% have anti-spam solutions, half of the respondents complained that they were not …
ScanSafe’s threat report for June 2007
Here is a copy of ScanSafe’s latest Threat Report (June 07). Click on the icons for larger images.
Panda Software no more
News from the Panda headquarters:Panda has changed name and brand. This change represents the attitude and response of Panda Software to the new malware dynamic, where threat …
Featured news
Resources
Don't miss
- Chinese cyber spies used Claude AI to automate 90% of their attack campaign, Anthropic claims
- A suspected Fortinet FortiWeb zero-day is actively exploited, researchers warn
- Why your security strategy is failing before it even starts
- Protecting mobile privacy in real time with predictive adversarial defense
- Los Alamos researchers warn AI may upend national security