Latest Articles

[img_assist|nid=2829|title=|desc=|link=none|align=left|width=100|height=100]Analysis of the 32 million passwords recently exposed in the breach of
social media application developer RockYou last month provides further
proof that consumers routinely use easy to guess login credentials. Read the full article. [The Register]

Read more...

Categories: Vulnerabilities

One day after a Google security researcher releases code to expose a flaw that affects every release of the Windows NT kernel — from Windows NT 3.1 (1993) up to and including Windows 7 (2009) — Microsoft has released a security advisory to acknowledge the issue and warn of the risk of privilege escalation attacks.

Read more...

Categories: Malware, Vulnerabilities

[img_assist|nid=2812|title=|desc=|link=none|align=right|width=100|height=100]Although the first known attacks using the Aurora malware that compromised Google weren’t discovered until late last year, some parts of the malware codebase has been in existence in China for nearly four years, raising questions about how many other attacks it might have been used in during that time frame.

Read more...

[img_assist|nid=2806|title=|desc=|link=none|align=left|width=100|height=100]This is just a quick heads-up that the emergency security patch for Microsoft’s Internet Explorer will be released tomorrow (January 21, 2009).The update, rated critical for all versions of IE, will cover a remote code execution flaw that has already been used in targeted attacks against U.S. companies, including Google and Adobe.

Read more...

Categories: Compliance, Podcasts

[img_assist|nid=2827|title=|desc=|link=none|align=right|width=67|height=100]Dennis Fisher talks with Tom Kellermann of Core Security about the Google attack, the priorities for new cyber coordinator Howard Schmidt and the economic and political realities of advanced persistent threats.

Read more...

[img_assist|nid=2793|title=|desc=|link=none|align=right|width=100|height=100]Robert Mueller, Director of the Federal Bureau of Investigation, will deliver a keynote address at RSA Conference 2010 that will detail cyber threats through the years – from criminal threats like computer intrusions and identity theft to the use of the Internet by extremists and hostile foreign powers. Read the full article. [Help Net Security]

Read more...