Fwsnort: Application layer IDS/IPS with iptables
Fwsnort parses the rules files included in the Snort intrusion detection system and builds an equivalent iptables ruleset for as many rules as possible. Fwsnort utilizes the …
Spam moving to social networks and mobile
Following the recent news on global spam levels falling, Jamie Tomasello, Abuse Operations Manager at Cloudmark, outlines her thoughts on why spammers are moving from email to …
Protect USB devices against malicious content
Trend Micro announced the latest version of its USB Security product, designed to protect USB storage devices against malicious content in files that are often transferred by …
Deploy, maintain and manage data security protection
WinMagic released SecureDoc 5, the full-disk encryption solution that allows organizations to integrate data protection with existing security policies to protect sensitive …
Week in review: Phishing, Kneber botnet and Microsoft vulnerabilities
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Adobe PDF format riddled with exploitable features Adobe’s PDF …
Trend Micro protects Android devices
Trend Micro announced Mobile Security which protects digital files and secures banking transactions on Android devices by identifying and stopping online threats. Key Features …
Who profits on vulnerabilities for sale?
The number of software vulnerabilities discovered during 2010 may be smaller than that of those discovered the previous year, but they still bring money to its discoverers. …
50,000 stolen iTunes accounts for sale in China
Some 50,000 iTunes accounts – each associated with an active credit card and some guaranteed to work for at least 12 hours before getting deactivated – are …
Mac App Store already cracked
The Mac App Store debuted yesterday, and it seems that a flaw has been found that allows you to get paid applications for free. Logan of AppInstect published a tutorial on how …
My first status scam spreads virally on Facebook
Sophos is warning Facebook users about the latest survey scam which is spreading virally across the social network. Messages claiming to share the users’ first ever …
New line of Samsung DIY video security and surveillance systems
Samsung announced a new line of security products for home and SMB use. Available in 4-, 8-, or 16-Channels, the systems include a DVR with storage capacities ranging from 500 …
Microsoft to patch three vulnerabilities in Windows
Next week’s January’s security bulletins will contain two bulletins addressing three vulnerabilities in Windows. As usual, the bulletin release is scheduled for …
Featured news
Resources
Don't miss
- Salesforce Gainsight compromise: Early findings and customer guidance
- Research shows identity document checks are missing key signals
- How one quick AI check can leak your company’s secrets
- Salesforce investigates new incident echoing Salesloft Drift compromise
- Security gap in Perplexity’s Comet browser exposed users to system-level attacks