Help Net Security
Top 20 virus list for July 2007
The activity of the botnet that was created in May via the Agent.bqs Trojan was only reaching its “design capacity” in June; by July it was in full swing. Another …
Watch the winning videos of college student security awareness contest
The EDUCAUSE/Internet2 Computer and Network Security Task Force, the National Cyber Security Alliance, and ResearchChannel have announced six winners of a computer security …
“Rough cut” of to-be-published book on Ajax security
Addison-Wesley released a “Rough Cut” of the forthcoming book Ajax Security. Rough Cuts, from Safari Books Online, allow readers to gain access to portions of a …
New application security software from SPI Dynamics
S.P.I. Dynamics announced WebInspect, according to the company, the first and only web application security assessment tool to be re-architected to thoroughly analyze …
iPods and other portable storage devices still a growing threat for data leakage
CREDANT Technologies released a survey of 323 directors, managers, CIOs, CEOS and others from the fields of IT, banking and finance, medicine, government, and education on the …
Roaming wireless spammer escapes cell-time
Sophos is reminding computer users about the importance of securing their wireless internet access following the sentencing of a man who sent pornographic spam while driving …
World’s first mobile WLAN analyzer for 802.11n networks
AirMagnet recently announced AirMagnet Laptop Analyzer 7.5, the industry’s first mobile WLAN analyzer to natively decode and analyze 802.11n Wi-Fi networks. AirMagnet …
Company’s sending spam from their domain and don’t even know it
BorderWare Security Network reported that email traffic from individual organizations has over 80% of their email sent from IP addresses outside of their domain. The majority …
New Linux and FreeBSD Mail Security betas
ESET Mail Security protects e-mail messages and e-mail gateway servers against known and unknown viruses, worms, Trojans, spyware, phishing, spam and other Internet threats. …
Quantitative Look at Penetration Testing
Since 2004 Matta has been running a project to test the technical competence of security consultants. With probably the largest collection of data on the methodology’s …
First WordPress worm
A researcher discovered seven new WordPress vulnerabilities which may lead to a successful blog compromise under appropriate circumstances. All of them are detailed on his …
New book: “Cross-Site Scripting Attacks: XSS Exploits and Attacks”
WhiteHat Security today announced the availability of Jeremiah Grossman’s book — Cross-Site Scripting Attacks: XSS Exploits and Attacks. The book offers a detailed …
Featured news
Resources
Don't miss
- CISA confirms exploitation of VMware ESXi flaw by ransomware attackers
- Why a decade-old EnCase driver still works as an EDR killer
- Smart glasses are back, privacy issues included
- Cybersecurity planning keeps moving toward whole-of-society models
- Major vulnerabilities found in Google Looker, putting self-hosted deployments at risk