Flame’s Data Collection Module Detailed by Experts

Flame’s Data Collection Module Detailed by Experts

The advnetcfg.ocx component allowed the malware to stay hidden for such a long time

“Printer Bomb” Spreads via .htaccess Redirection Attacks

“Printer Bomb” Spreads via .htaccess Redirection Attacks

Over 4,000 websites have been compromised to take part in the scheme

Video: Researchers Develop Rootkit to Highlight Flaws in Android 4.0.4

Video: Researchers Develop Rootkit to Highlight Flaws in Android 4.0.4

The malware could replace the legitimate browser with a malicious one

All Carberp Cybercriminals Arrested, but Infection Rates Still High

All Carberp Cybercriminals Arrested, but Infection Rates Still High

ESET and Group-IB researchers have closely investigated the case

WhiteHat: XSS Most Prevalent Site Vulnerability in 2011

WhiteHat: XSS Most Prevalent Site Vulnerability in 2011

Compared to 2010, the average number of critical flaws per website has dropped

Softpedia Exclusive Interview: Steven Seeley on the “Ghost” in Windows Allocator

Softpedia Exclusive Interview: Steven Seeley on the “Ghost” in Windows Allocator

The Stratsec expert presents issues in the heap manager and attack mitigation strategies

RiskRanker Detects Mobile Threats Without Relying on Malware Signatures

RiskRanker Detects Mobile Threats Without Relying on Malware Signatures

An innovative solution developed by experts from NQ Mobile and North Carolina University

RSA CTO: It’s Not True, SecurID 800 Token Not Cracked

RSA CTO: It’s Not True, SecurID 800 Token Not Cracked

The expert claims that the attack can't be used to gain access to the private key

RSA SecurID Cracked, Experts Access Cryptographic Keys in 13 Minutes

RSA SecurID Cracked, Experts Access Cryptographic Keys in 13 Minutes

Researchers demonstrate that many security tokens are highly vulnerable

Android Network Tool-Kit Pentester’s World Cup Launched by Zimperium

Android Network Tool-Kit Pentester’s World Cup Launched by Zimperium

The winner will attend this year's Black Hat conference in Las Vegas

Softpedia Exclusive Interview: Georgia Weidman on the Android Permission Model

Softpedia Exclusive Interview: Georgia Weidman on the Android Permission Model

We had the opportunity to talk to the expert at Hack in the Box 2012 Amsterdam

PayPal Launches Paid Bug Bounty Program

PayPal Launches Paid Bug Bounty Program

Security researchers can submit XSS, CSRF, SQL Injection and authentication bypass flaws

Expert Publishes Android App That Steals Contactless Card Details

Expert Publishes Android App That Steals Contactless Card Details

The application shows how easy it is to swipe payment card details by using a phone

Experts Confronted by Malware Developer While Researching Diablo III Keylogger

Experts Confronted by Malware Developer While Researching Diablo III Keylogger

The cybercriminal remotely shut down their computer after trying to access their webcam

Prepare Your Vulnerabilities, Exodus Has Launched Its Intelligence Program

Prepare Your Vulnerabilities, Exodus Has Launched Its Intelligence Program

Submit your findings and in 10 business days you'll learn if it's of value

Bruce Schneier on Flame-Like Malware: It’s All About the Way It Spreads

Bruce Schneier on Flame-Like Malware: It’s All About the Way It Spreads

The expert believes that all developers test their malware against antivirus software

Researcher Explains Why Scammers Say They Are from Nigeria

Researcher Explains Why Scammers Say They Are from Nigeria

A great study that shows the challenges faced by fraudsters

 
Want more? Browse: