Video: Web application scanning with credentials using Nessus
Learn how to configure Nessus to use credentials and login into a web application to scan with CGI generic tests.
Google Dashboard: What does Google know about you?
You’ve been using Gmail for ages. Every location you needed to find, every trip you organized – Google Maps was there for you. Most searches you ever started …
Backdoor access for millions of Facebook and MySpace accounts
Yvo Schaap, a young Dutch application developer on Facebook, stumbled on a back door into any user account that accesses the application he’s working on. He discovered …
EU leaders agree on Internet access safeguards
A user’s Internet access may be restricted, if necessary and proportionate, only after a fair and impartial procedure including the user’s right to be heard. …
Which country has the most bot-infected computers?
According to data compiled during October by PandaLabs, Spain tops the bot ranking with 44.49% of all computers infected by bots. These programs, once they have infected a …
Mac malware disguised as game
Symantec shared an uncommon Mac malware type on one of their official blogs: a combination of malware and a game similar to the once popular Space Invaders. They detected the …
Intelligence agency hit by DoS attacks
According to The Local, Sweden is seeing her share of cyber disruptions and attacks this last few days. First a technical error blocked access to hundreds of Swedish websites …
IT professionals don’t use Facebook for work
79 percent of IT professionals use social networking sites such as Facebook and YouTube, while the rest do not use social networking sites at all, according to a recent …
Largest security conference and hands-on training in India
Securitybyte and OWASP India are hosting India’s largest information security event in New Delhi at the Crowne Plaza Hotel on Nov 17th – Nov 20th 2009. The …
Malware writers target online gamers
Online games have been spared so far from massive amounts of malware, but things seem to change lately, as more and more malware writers concentrate their efforts on writing …
Windows 7 vulnerable to most viruses
Windows 7 was touted as a big improvement on Vista, security aspect included. The Sophos team wanted to test that assertion, so they installed a full release copy of the new …
Hacked iPhones held hostage
Dutch T-mobile customers that use jailbroken iPhones got a nasty surprise yesterday. A “message” popped up on their screen claiming that their iPhone’s been …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)