McAfee update cripples thousands of PCs |
- McAfee update cripples thousands of PCs
- Metasploit Express: Easy-to-use penetration testing
- Zbot acquires file infection feature
- Spying the spy: How to turn Trojans against criminals
- TinyIDS: Distributed intrusion detection system
- So, you bought a fake AV. What happens next?
- Rogue software details: Vistop
- Facebook profound privacy concerns
- Passive Vulnerability Scanner 3.2 released
McAfee update cripples thousands of PCs Posted: 22 Apr 2010 06:32 AM PDT The misidentification of a legitimate Windows file as a virus and its subsequent deletion was what made Windows XP running computers all over the world enter in a continuous circle of rebooting on Wed... |
Metasploit Express: Easy-to-use penetration testing Posted: 22 Apr 2010 06:09 AM PDT Rapid7 introduced Metasploit Express, a comprehensive penetration testing solution built on the open source Metasploit Framework. Metasploit Express is designed specifically for penetration teste... |
Zbot acquires file infection feature Posted: 22 Apr 2010 05:55 AM PDT A Zbot Trojan variant that has the ability to infect other files has been discovered recently. It searches for .exe files in predefined places and injects into them 512 bytes of code, altering als... |
Spying the spy: How to turn Trojans against criminals Posted: 22 Apr 2010 05:25 AM PDT "Researchers do vulnerability research on so many various application, why not to do it on this one?" asked himself Andrzej Dereszowski, founder and director of Signal 11, a Polish firm focused on ana... |
TinyIDS: Distributed intrusion detection system Posted: 22 Apr 2010 05:14 AM PDT TinyIDS is a distributed Intrusion Detection System (IDS) for Unix systems. It is based on the client/server architecture and has been developed with security in mind. The client, tinyids, collects... |
So, you bought a fake AV. What happens next? Posted: 22 Apr 2010 03:47 AM PDT A Sunbelt researcher has had the "fortune" of having a relative fall for the scam, which gave him the opportunity to take a peak at the process following the acquisition of the rogue solution. Upo... |
Rogue software details: Vistop Posted: 22 Apr 2010 03:46 AM PDT Vistop is a rogue security application. In order to remove it, find out what folders and registry entries to look for below. Known system changes: Folders c:\ProgramFiles\vistop Registry e... |
Facebook profound privacy concerns Posted: 22 Apr 2010 03:37 AM PDT Facebook founder Mark Zuckerberg may believe that "the age of privacy is over," but users of world's most popular social networking site are actively concerned with protecting their privacy especial... |
Passive Vulnerability Scanner 3.2 released Posted: 22 Apr 2010 01:03 AM PDT Tenable Network Security released version 3.2 of the Passive Vulnerability Scanner (PVS), a passive technology that monitors network traffic and provides real-time vulnerability data to Tenable's Secu... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment