Identifying suspicious URLs

Identifying suspicious URLs


Identifying suspicious URLs

Posted: 19 Jul 2010 01:51 PM PDT

This video explores online learning approaches for detecting malicious Web sites (those involved in criminal scams) using lexical and host-based features of the associated URLs. It shows that this app...

Hacker fingerprints - the future of malware detection?

Posted: 19 Jul 2010 12:50 PM PDT

It has been obvious for a time now that security companies will have to find a new malware detection technique that will complement their heuristic engines searching for generic malware signatures, si...

Skimming devices on gas pumps sending stolen card numbers via Bluetooth

Posted: 19 Jul 2010 10:47 AM PDT

A maintenance worker at a Shell gas station located in Florida was the first one to notice that a gas pump he was checking had been fitted with a credit card skimming device. After he reported the...

Emerging threats in the end user environment

Posted: 19 Jul 2010 10:43 AM PDT

New social networking technologies, mobile devices and a more flexible and tech-savvy workforce are leading to increasingly complex and diverse end user environments with many greater security challen...

Open source IDS Suricata 1.0 released

Posted: 19 Jul 2010 09:45 AM PDT

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. Suricata is the result of more than two years of ...

Free browser security testing service

Posted: 19 Jul 2010 06:09 AM PDT

Qualys announced a free service, Qualys BrowserCheck, that scans web browsers looking for security flaws within the browser and its plug-ins. Security flaws in modern web browsers and their plug-in...

10 steps for safe web surfing

Posted: 19 Jul 2010 05:58 AM PDT

For the millions heading out on vacations ranging from long-distance travel to short daytrips to the beach, or finalizing plans for them, the Internet is an important resource. That's why this is a go...

Nmap 5.35DC1 released

Posted: 19 Jul 2010 05:51 AM PDT

Nmap is a free and open source utility for network exploration or security auditing. Nmap 5.35DC1 includes 131 NSE scripts (17 new), 6,622 version detection signatures, 2,608 OS fingerprints, and m...

Personal identity protection from McAfee

Posted: 19 Jul 2010 05:14 AM PDT

McAfee launched McAfee Identity Protection, one of the most comprehensive and easy to use identity protection services on the market. The product features proactive identity surveillance which keeps c...

IBM delivers proactive network security

Posted: 19 Jul 2010 05:11 AM PDT

As today's threat landscape continues to evolve and become more complex, IBM is introducing a new security appliance to help clients more easily adopt an IT infrastructure that is secure by design and...

Event: 4th USENIX Workshop on Offensive Technologies (WOOT ’10)

Posted: 19 Jul 2010 12:36 AM PDT

Progress in the field of computer security is driven by a symbiotic relationship between our understandings of attack and of defense. The USENIX Workshop on Offensive Technologies aims to bring togeth...

Top 12 spam-relaying countries

Posted: 19 Jul 2010 12:34 AM PDT

Sophos has published its latest report into the top twelve spam-relaying countries, covering the second quarter of 2010. The United States continues to be the number one spam polluter, piping out 1...

Week in review: New ZeuS version and multi-stage attacks cyber attacks

Posted: 18 Jul 2010 10:03 PM PDT

Here's an overview of some of last week's most interesting news and articles: When identity theft is not your fault It is definitely true that you should be responsible for the security of your ...

0 comments:

Post a Comment