New Security Checks and Features Added to Acunetix Web Vulnerability Scanner
We are pleased to announce an updated build of Acunetix Web Vulnerability Scanner 8 (WVS 8). The new build 20120613 offers a number of new security checks, new scanner funtionalities, improvements and...
View ArticleSpamvertised ‘Your Amazon.com order confirmation’ emails serving client-side...
By Dancho Danchev Everyone uses Amazon! At least that’s what the cybercriminals are hoping. Cybercriminals are currently spamvertising millions of emails impersonating Amazon.com Inc. in an attempt to...
View ArticleThree Keys to Landing Your Dream DFIR Job
If you’re reading this blog, you know the truth: Digital Forensics & Incident Response (DFIR) is a great field! The work is fun, the challenges keep things interesting and the career outlook is...
View ArticleThe Unit
The open secret of successful, focused national security and infrastrucure within Israel, and the companies created by the Unit's veterans.
View ArticleFrench Version of Veracode “Free Wi-Fi” Infographic
document.write(unescape("%3Ciframe src='http://www.facebook.com/plugins/like.php?href=" + document.URL +...
View ArticleNitrozac and Snaggy: Bradbury, Tribute
via the comic genius of Nitrozac and Snaggy at The Joy of Tech™
View ArticleHere’s Office 2013, on Windows 8 and RT! Today’s (belated) #ITBW for +...
Here's Office 2013, on Windows 8 and RT!Today's (belated) #ITBW for +Computerworld by +Richi Jennings...$MSFTHere's Office 2013, on Windows 8 and RT!
View ArticleHacking and securing the iPhone, iPad and iPod Touch: iOS features
Diana Kelley (Partner, SecurityCurve) gives a presentation at InfoSec World Conference to outline the background of the iOS and speak on security of iOS devices Hello and welcome! I’ll talk a little...
View Article‘State-sponsored attackers’ using IE zero-day to hijack GMail accounts
Microsoft’s advisory speaks of “active attacks” and follows a separate note from Google that references the IE flaw “being actively exploited in the wild for targeted attacks.”
View ArticleUS-CERT warns of guest-to-host VM escape vulnerability
The vulnerability affects 64-bit operating systems and virtualization software running on Intel CPU hardware.
View ArticleSBN Sponsor Post
June Webcast: register now for our upcoming webcast, “Future State of IT Security: A Survey of IT Security Executives” at 2pm EST June 27th.http://bit.ly/KPwOUF
View ArticleWordPress 3.4 Released – Update, Update, Update
It’s always very easy to say to update, but the harsh reality is that although the update process has been drastically streamlined over the past few years, there are always a few challenges. Its why we...
View ArticleBeware the phony Classmates.com email
Classmates.com has become the latest in a series of well-known brands to be abused by a particular gang of malware distributors. The similarities to other outbreaks include: Linking to multiple...
View ArticleWhat Every CIO Should Know about Cloud Computing
At the “What Every CIO Should Know About Cloud Computing” panel at FIRE X, we talked about how today’s IaaS momentum will shift to PaaS in coming years; we also discussed the enterprise shift to...
View ArticleVIDEO: How to solve the AusCERT 2012 #sophospuzzle
By popular demand, here is a video explaining how to solve the puzzle we published on our AusCERT 2012 conference T-shirt. 44 solvers from 14 countries cracked it in the time allowed - find out how...
View ArticleBack Doors in US Infrastructure
According to this, Chinese equipment makers have built backdoors into their hardware (which may be the root of Mr. Panetta's remarks). First, a little perspective: Most intelligent networking...
View ArticleShould patient consent be considered in sharing health info across national...
The steady migration to electronic health records, mandated by the HITECH Act, may lead to inevitable trade-offs between privacy and security on the one hand, and more efficient and, ultimately,...
View ArticleSummerCon 2012 Wrap Up
This past weekend in downtown Brooklyn New York, a few miles away from the new Nets stadium was SummerCon 2012. SummerCon has the title of being the longest-running American hacker conference where...
View ArticleSeen Ad Pop-up’s in Your Mobile Browser Lately?
by Armando Orozco Today, one of our Webroot SecureAnywhere for Android users reported seeing ad redirections while browsing on his Android device. As we began investigating, we noticed that there were...
View ArticleGartner Security & Risk Mgt- Day 3, Bigger and Badder than ever.
CipherBlonde is really enjoyed Day 3 @ the Gartner’s IT Security and Risk Management Summit: John Hodgman’s talk was hilarious, and he can sing He signed his book, “All”, to me, as The Vanna White of...
View Article