Lost in the Noise
Linux security mailing list infiltrated, crippled by hackers
more info on: http://www.linuxfordevices.com/c/a/News/VendorSec-list-compromised
FLAME – The Story of Leaked Data Carried by Human Vector
Redux: Are you sure SHA-1+salt is enough for passwords?
‘Bioskits’ Join Ranks of Stealth Malware
60% of ISPs to roll-out IPv6 by end of 2012
Researchers find ways to bypass Google’s Android malware scanner
FBI Opens Investigation into Stuxnet Attack Leaks
Inside iOS: Security, Vulnerabilities, and Jailbreaking
MD5 password scrambler ‘no longer safe’
Crypto breakthrough shows Flame was designed by world-class scientists
Report: North Korea Accused Of DDoS Attack On South Korean Airport
Flame authors order infected computers to remove all traces of the malware
sKyWIper: A complex malware for targeted attacks (pdf)
Bogus story: no Chinese backdoor in military chip
CVE-2012-1823 being exploited in the wild
Is CVE-2012-0507 the best toolkit to exploit Mac OS X?
How Did They Get In? A Guide To Tracking Down The Source Of An APT
Q1 Threats Go Mobile
A Quick Primer on Internet Peering and Settlements
French Budget Minister website hijacked
Deeper into the rabbit hole. The infinite-layer malware
Flashback Cleanup Still Underway—Approximately 140,000 Infections
Is Anti-Virus Really Dead? A Real-World Simulation Created for Forensic Data Yields Surprising Results
GetMama Analysis: Having fun and reading PHP
Cyber security: Private responsibility, public concerns
Microsoft Responds to Critics Over Botnet Bruhaha
The value of HTTP 404 Errors
Why an outdated Java Plugin is so serious
Disrupting Cybercrime via Hosts and ISPs
AhnLab published ASEC Security Report Vol.26.
Everything you thought you knew about cybercrims is WRONG
Verizon Breach Report – Application Security Specific Highlights
Keeping the customer satisfied: cybercriminals focus on service
Botnet Shutdown Success Story – again: Disabling the new Hlux/Kelihos Botnet
Chrome addons hacking: Bye Bye AdBlock filters!
MS Office exploit that targets MacOS X seen in the wild – delivers “Mac Control” RAT
The mystery of Duqu: Part Ten
IBM Releases Trend and Risk Report
Scamming the scammers – catching the virus call centre scammers red-handed
Ten Million DNS Resolvers on the Internet
Signed Malware; you can run, but you can’t hide!
Bredolab Botmaster ‘Birdie’ Still at Large
Reversing & Malware Analysis Training – Reference Guide
Mac Malware at the Moment
Microsoft and partners disrupt Zeus botnets
Revisiting Targeted Attacks – Insights From the Past to Present
Google can’t track every single click of your web surfing. Only most of them.
Shhh… don’t let your response headers talk too loudly
Get Your ICS Off The Internet!
Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL
First reports of IPV6 DDoS attacks raise security fears
Lost in the Noise
Dit werk is gelicenseerd onder een
Creative Commons Naamsvermelding-NietCommercieel-GelijkDelen 3.0 Nederland licentie
This site is protected by
Comment SPAM Wiper