How much does a 0-day vulnerability cost?

How much does a 0-day vulnerability cost?


How much does a 0-day vulnerability cost?

Posted: 26 Mar 2012 08:06 AM PDT

The market for exploits for zero-day vulnerabilities has exploded in the last year, says Adriel Desautels, the founder of Netragard, a penetration testing and vulnerability assessment outfit that, amo...

Fake eBay identity confirmation message hitting inboxes

Posted: 26 Mar 2012 06:28 AM PDT

Ebay users are once again targeted with fake notifications asking them to "confirm their identity". "Dear eBay Community Member, You're signing in from a computer we're not familiar with," says the...

Facebook users targeted with account-hijacking Chrome extensions

Posted: 26 Mar 2012 06:08 AM PDT

With the steady rise in popularity of both Facebook and Google's Chrome browser, cyber scammers have turned to targeting users of both. According to Kaspersky Lab expert Fabio Assolini, Facebook us...

Open source audit plug-in for MySQL

Posted: 26 Mar 2012 05:58 AM PDT

McAfee announced a free open source audit plug-in for MySQL database users to capture complete detailed activity audits from their databases. The plug-in was created and developed by McAfee as part...

New cloud disaster recovery service

Posted: 26 Mar 2012 05:44 AM PDT

EVault announced a four-hour option for its Cloud Disaster Recovery Service (EVault CDR) with a guaranteed SLA. The EVault CDR four-hour managed service includes an SLA-backed guarantee for recover...

Android security from the ground up

Posted: 26 Mar 2012 05:00 AM PDT

Georgia Weidman is a penetration tester, security researcher, and trainer. She's also one of the speakers at the upcoming HITBSecConf 2012 Amsterdam conference. In this interview she discusses the sec...

Exploiting legitimate online technology

Posted: 26 Mar 2012 03:23 AM PDT

Criminals intent on distributing images of children being sexually abused are finding new ways of exploiting legitimate online technology, according to the Internet Watch Foundation (IWF). Criminal...

Data center industry dynamics

Posted: 26 Mar 2012 02:00 AM PDT

While interest around data center services (DCS) is extremely high, the market structure, dynamics and maturity differ across the world, according to Gartner. The shift toward industrialized services,...

Microsoft disrupts massive cybercrime operation

Posted: 26 Mar 2012 01:12 AM PDT

In its most complex effort to disrupt botnets to date, Microsoft, in collaboration with the financial services industry — including the Financial Services – Information Sharing and Analysis Center (FS...

Free online tool teaches IT security procedures

Posted: 26 Mar 2012 12:59 AM PDT

AVG Technologies launched SMB BootCamp, a free, online tool to help SMBs demonstrate to customers that their company is seriously committed to following AVG's recommended IT security procedures. Th...

Week in review: Facebook privacy loophole, Duqu still active, the world of vulnerability sellers

Posted: 26 Mar 2012 12:50 AM PDT

Here's an overview of some of last week's most interesting news, podcasts, videos and articles: US govt and military email addresses offered for sale Webroot has recently unearthed an offer for ...

0 comments:

Post a Comment