OpenBSD headman believes contractor tried to insert backdoors |
- OpenBSD headman believes contractor tried to insert backdoors
- Fake iTunes e-mail leads to drive-by download
- "Evil" URL shortener initiates DDoS attacks
- Win a copy of Practical Lock Picking!
- Tips for creating a strong password
- Threat modeling best practices
- Highest profile software failures of 2010
- Passwords are the weakest link in online security
- The shape of security and compliance in 2011
- Rapid7 releases NeXpose 4.10
OpenBSD headman believes contractor tried to insert backdoors Posted: 22 Dec 2010 10:05 AM PST Following last week's accusation by a former government contractor that the FBI has implemented backdoors into the encryption software used by OpenBSD, Theo de Raadt, OpenBSD's founder and leader, has... |
Fake iTunes e-mail leads to drive-by download Posted: 22 Dec 2010 09:03 AM PST E-mails purportedly coming from iTunes and bearing "iTunes account may be suspended" in the subject line have been hitting inboxes in the last few days. "Dear iTunes Customer, it is possible that y... |
"Evil" URL shortener initiates DDoS attacks Posted: 22 Dec 2010 07:09 AM PST Can you believe that clicking on a shortened link can make you an involuntary and unknowing participant in a DDoS attack on a website? Ben Schmidt, a self-styled student/researcher form the University... |
Win a copy of Practical Lock Picking! Posted: 22 Dec 2010 03:37 AM PST We are giving away two copies of "Practical Lock Picking". For the first time, Deviant Ollam, one of the security industry's best-known lockpicking teachers, has assembled an instructional manual g... |
Tips for creating a strong password Posted: 22 Dec 2010 03:05 AM PST To ensure consumers stay safe online and enjoy this holiday season, Check Point outlines practical tips for creating a strong password. Choose a password that is at least 8 to 10 characters long. |
Threat modeling best practices Posted: 22 Dec 2010 03:02 AM PST In the video below, Robert Zigweid, senior security consultant at IOActive, talks about threat modeling best practices. The video was recorded at the OWASP AppSec USA 2010 conference. Robert discus... |
Highest profile software failures of 2010 Posted: 22 Dec 2010 02:41 AM PST SQS Software Quality Systems compiled a list of the worst software failures of 2010 that have damaged reputations, impacted negatively on finances and caused stress to users. 1. Car manufacturer ... |
Passwords are the weakest link in online security Posted: 21 Dec 2010 10:00 PM PST A ZoneAlarm survey showed that 79% of consumers use risky password construction practices, such as including personal information and words. The survey also revealed that 26% of respondents reuse t... |
The shape of security and compliance in 2011 Posted: 21 Dec 2010 09:18 PM PST With increasingly stringent compliance mandates, a flurry of vendor consolidation, demands for audit reporting, and a spike in complex security breaches, 2010 has been a dynamic year for the IT securi... |
Posted: 21 Dec 2010 09:01 PM PST Rapid7 announced NeXpose 4.10, the latest version of its vulnerability management solution, providing enterprise customers with visibility and actionable intelligence for managing their security risk ... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment