Browsing Category: Web Security

Thorsten Holz, researcher at Vienna University of Technology, whose team not only participated in the recent takedown of the Waledac botnet, but released an interesting paper earlier this year, summarizing their findings based on 33GB of crimeware data obtained from active campaigns talks to Dancho Danchev of ZDNet. Read the full article. [ZDNet]

Read more...

Categories: Web Security

[img_assist|nid=3895|title=|desc=|link=none|align=left|width=100|height=100]Google has released its own Web application security scanner, called Skipfish. The free scanner is designed to work within a variety of existing Web application frameworks and is built with an emphasis on speed and low false-positives, the company said.

Read more...

[img_assist|nid=3887|title=|desc=|link=none|align=right|width=100|height=100]Security blogger Brian Krebs has compiled lists of the top 10 ISPs who are hosting the worst botnets, spam, phishing, and other malware from independent tracking organizations. These lists come from: Stop Badware, F.I.R.E., Phishtank, Zeustracker, Malware Domain List, Arbor Top ASN List, Emerging Threats Compromised IPS, Emerging Threata RBN, Shadowswerver, and Google Safebrowsing. Read the full article. [KrebsonSecurity]

Read more...

[img_assist|nid=3869|title=|desc=|link=none|align=right|width=100|height=100]MIT researchers funded by DARPA (U.S. Defense Department’s Defense Advanced Research Projects Agency) have developed a system to keep web servers — or, for
that matter, any Internet-connected computers — running even when
they’re under attack. Read the full article. [MIT News]

Read more...

[img_assist|nid=3867|title=|desc=|link=none|align=left|width=100|height=100]Hackers have flooded the Internet with virus-tainted spam that targets Facebook’s estimated 400 million users in an effort to steal banking passwords and gather other sensitive information. The emails tell recipients that the passwords on their Facebook accounts have been reset, urging them to click on an attachment to obtain new login credentials, according to researchers.

Read more...

[img_assist|nid=3866|title=|desc=|link=none|align=right|width=87|height=115]The Drupal team has just released a whole heap of security advisories. Drupal’s Email Input Filter, Keys and Tag Order modules all contain security vulnerabilities. Updated versions, in which the problems are fixed, are now available. Read the full article. [The H Security]

Read more...

[img_assist|nid=3855|title=|desc=|link=none|align=right|width=100|height=100]The following is the full transcript of a live Threatpost chat with Charlie Miller, a vulnerability researcher at Independent Security Evaluators.   During this session, Miller discussed his approach to finding security flaws, his work on fuzzing applications, his plans for this year’s Pwn2Own hacker challenge and his thoughts on improvements in Apple’s Mas OS X.

Read more...

Over the past week, security researchers and vendors have been playing a cat-and-mouse game with a cybercrime-friendly ISP known as TROYAK-AS. The results so far? A series of attempts by the cybercriminals to restore access to their botnet, and an invaluable learning experience for the community, with the gang exposing node after node of malicious activity. Read the full article. [ZDNet]

Read more...