Please turn on your JavaScript for this page to function normally.
ttyutils: Terminal session hijacking toolkit 2.0.13 released

Ttyutils is Unix/Linux terminal session hijacking toolkit. It is also a customizable and extendible platform. By creating a pseudo terminal to run a program, ttyutils can …

China on the rise as overall spam and virus levels decline

The level of spam and viruses has dropped for the second month running, as the US and Brazil continue to be the primary sources, according to Network Box. Network Box’s …

Cybercriminals use Trojans and money mules to loot online bank accounts

Finjan unveiled new research which uncovered new techniques used by cybercriminals to rob online bank accounts. The techniques described in this report looks like the start of …

Message Labs’ September 2009 threat statistics

MessageLabs released it’s Intelligence monthly report for September 2009, and threat statistics are the following: Spam 86.4% in September – 1 in 1.2 emails (a …

Video: Intelligence and forensics application Maltego

Maltego is an open source intelligence and forensics application. It will offer you timous mining and gathering of information as well as the representation of this …

Enterprises prefer outside experts for security audits

How often to audit or not to audit – and whether these audits should be conducted using internal staff or outside experts – were topics addressed in a series of …

Airoscript 2.2 now available

Airoscript is a text-user-interface for aircrack-ng and a great companion for Wi-Fi pentesting. Various attacks are available, such as fragmentation attack, fakeauth, …

Virtualize your database infrastructure

xkoto announced GRIDSCALE 5.1, the latest release of its active-active solution for IBM DB2. It features a new cluster management system that improves the performance of …

Splunk 4.0.4 released

Splunk released Splunk 4.0.4 which improves an organization’s ability to manage, secure and audit their entire IT infrastructure. Resolved general issues This release …

Outsourcing tech jobs has a negative impact on network security?

In an intriguing juxtaposition of perception and reality, findings from a new survey suggest that America’s enterprise network administrators/IT executives have extra …

Tor Navigator 0.0.2 alpha released

Tor Navigator is a Web browser dedicated to the Tor network, which allows people and groups to improve their privacy on the Internet by hiding their IP address through a …

Companies slow to implement Web filtering and monitoring

It is estimated that nearly 90 percent of all data breaches involve insider negligence, yet the results of survey announced by GFI Software revealed that nearly half of SMBs …

Don't miss

Cybersecurity news