Event: Brucon 2010

Event: Brucon 2010


Event: Brucon 2010

Posted: 05 May 2010 03:44 PM PDT

BruCON aims to become the best and most fun hacking and security event in Belgium and Western Europe offering a high quality line up of speakers, opportunities of networking with peers, hacking challe...

Ex-con helps feds foil an ATM hacking scheme

Posted: 05 May 2010 12:15 PM PDT

Thor Alexander Morris had a plan. The plan involved reprograming certain ATMs so that they would overpay him when he made a withdrawal, giving out $20 instead of $1 bills - or, at least, this is w...

Lessons to be learned from Facebook privacy changes

Posted: 05 May 2010 10:45 AM PDT

The recent Facebook privacy changes, the public outcry they caused and the petition by a group of U.S. senators to the Federal Trade Commission to restrict the amount of personal information that onli...

Review: Security+ SY0-201 Video Mentor

Posted: 05 May 2010 09:21 AM PDT

Author: Shon Harris Pages: 96 Publisher: Pearson ISBN: 0789740249 Introduction When I glance at my bookshelf, I see many certification titles racking up an imposing number of pages, and I...

Google's new Web application security course

Posted: 05 May 2010 07:30 AM PDT

As a part of its effort to educate Web application developers on how to sidestep common programming mistakes that leave the doors open for attackers, Google has unveiled a "Web Application Exploits an...

Demonstration of Facebook account credentials theft

Posted: 05 May 2010 05:07 AM PDT

When you use a computer other than your own, you have to be especially careful about what online accounts you access - particularly if the computer in question is in a library or an Internet cafe, whe...

Money mules wanted

Posted: 05 May 2010 04:30 AM PDT

Reading about people unwittingly becoming money mules for cybercriminals, a lot of people wonder if they would be able to spot if the offer they received or searched for is illegitimate. F-Secure ...

Analyze the network behavior of unknown malware samples

Posted: 05 May 2010 03:53 AM PDT

The aim of the INetSim project is to perform a quick run-time analysis of the network behavior of unknown malware samples in a laboratory environment. Modules for the simulation of the following se...

Rogue software details: AKM Antivirus 2010 Pro

Posted: 05 May 2010 03:03 AM PDT

AKM Antivirus 2010 Pro is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\AKM Antivirus...

Continued growth of rogue antivirus activity

Posted: 05 May 2010 12:56 AM PDT

Sunbelt Software announced the top 10 most prevalent malware threats for the month of April 2010. The list of detections for April is little changed from March with the exception of a loader for a ...

PortalProtect 2.0: Web threat protection, content-filtering and data loss prevention

Posted: 05 May 2010 12:49 AM PDT

Trend Micro PortalProtect 2.0 supports the Microsoft SharePoint 2010 platform and is backed by the Trend Micro Smart Protection Network infrastructure which scans, filters and correlates more than 20 ...

Open source software for cloud services deployment

Posted: 05 May 2010 12:42 AM PDT

Cloud.com announced CloudStack, an open source software solution that accelerates the deployment, management and configuration of multi-tier and multi-tenant private and public cloud services. Th...

0 comments:

Post a Comment