Win a copy of Ninja Hacking!

Win a copy of Ninja Hacking!


Win a copy of Ninja Hacking!

Posted: 08 Dec 2010 08:00 AM PST

We are giving away two copies of "Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques". Throw traditional pen testing methods out the window for now and see how thinking and ac...

Internet Explorer 9 promises protection from online tracking

Posted: 08 Dec 2010 07:30 AM PST

Worried about third-party websites tracking your browsing history? Microsoft has a solution for you. The new version of Internet Explorer, which is due for release in early 2011, will contain a "T...

WordPress Comment Rating plugin CSRF vulnerability

Posted: 08 Dec 2010 06:22 AM PST

A vulnerability has been reported in the Comment Rating plugin for WordPress, which can be exploited by malicious people to conduct cross-site request forgery attacks, according to Secunia. The a...

WikiLeaks-related spam carries worm

Posted: 08 Dec 2010 06:12 AM PST

Given the great attention that WikiLeaks' releases of diplomatic cables is garnering around the world, it was only a matter of time when malware pushers were going to misuse the users' curiosity regar...

QuickTime 7.6.9 fixes security issues

Posted: 08 Dec 2010 06:10 AM PST

Here is the security content related to QuickTime 7.6.9, available for download here. A local user may have access to sensitive information A filesystem permission issue exists in QuickTime. This ...

Zeus targets major retailers

Posted: 08 Dec 2010 06:03 AM PST

Trusteer recently discovered a Zeus botnet that is targeting credit card accounts of major retailers including Macy's and Nordstrom just as the holiday gift buying season is in full swing. They cap...

Assange denied bail, WikiLeaks issues next batch of cables

Posted: 08 Dec 2010 03:51 AM PST

Following his arrest yesterday, Julian Assange has been taken to hearing at City of Westminster magistrates court, where details of the charges laid against him have been finally brought to the open. ...

Increased collaboration on cybercrime syndicate crackdowns

Posted: 08 Dec 2010 12:35 AM PST

As 2010 comes to a close, information security companies are trying to predict the amount of problems we'll have to deal with next year. Below is a list of 5 security trends for 2011 by Fortinet. ...

Avoid the phishing net

Posted: 07 Dec 2010 11:06 PM PST

Phishing, the process of attempting to acquire sensitive information by masquerading as a legitimate and trustworthy company via online means, used to just be a problem for large corporations. But tod...

CORE IMPACT Pro 11 now detects and exploits network router vulnerabilities

Posted: 07 Dec 2010 10:42 PM PST

Core Security Technologies introduced the latest version of its automated penetration testing solution, CORE IMPACT Pro 11. CORE IMPACT Pro enables users to conduct real-world assessments across a ...

Growing mobile workforce will increase security complexity

Posted: 07 Dec 2010 10:00 PM PST

IT security administrators anticipate a significant increase in the number of users connecting to their network in the next year, with 54% citing specific growth in the number of remote users, accordi...

Vulnerability scanning added to GFI MAX RemoteManagement

Posted: 07 Dec 2010 09:36 PM PST

GFI Software added vulnerability scanning and security patch management to GFI MAX RemoteManagement, an IT managed services software solution that makes it easy to stay on top of customers' servers, d...

0 comments:

Post a Comment