Entries by fdesir

Firefox’s Version 20 Patches 11 Serious Flaws

An posting from TechNews on FireFox Patches : Firefox was not exactly full of vulnerabilities previously, but now users of Mozilla’s customizable Web browser can rest even easier. In its 20th version, Firefox patches 11 potentially catastrophic security flaws while introducing a few privacy and convenience features for the average user. While Mozilla still pinpoints […]

Defcon Kerala Information Security Meet 2013

We invite all the information security enthusiasts, hackers, coders, programmers, security & network professionals, web developers, students, academic practitioners, government, police, business & corporate and all of those who care about ‘Information Security’ to Defcon Kerala Information Security Meet. We invite you to attend the talks of Speakers and to expand your Network. To read […]

Companies Buying More Insurance Against Cyberattacks

An posting from Tech news daily Companies are getting smarter about protecting themselves from cyberattacks. New research has found that the number of companies purchasing cyberinsurance increased 33 percentage points over the past year. Several industries are driving that growth. Professional, business, legal, accounting and personal services firms grew by 76 percentage points across 2012. […]

NSA Director: Information-Sharing Critical To U.S. Cybersecurity

An posting from Dark Reading about cyber security: Information-sharing and visibility into the threat landscape are vital for the public and private sectors to defend cyberspace, National Security Agency Director Gen. Keith B. Alexander told an audience at The Georgia Tech Cyber Security Symposium yesterday. The key to this is crafting legislation that protects privacy […]

Too Scared To Scan

An article from Dark Reading in there Security section: When it comes to detecting vulnerabilities in mission-critical applications, security professionals often find themselves in a bind. These are usually the applications that the enterprise can least afford to suffer a hack. But at the same time, they are also the applications whose owners are most […]

Spicing up phishing attacks

An posting form Nakcd Secutiy  on phishing Attacks: Phishing is often regarded as old hat. From a technical perspective, it’s a case of ‘been there, done that’. Sometimes however, we come across attacks that are just a little bit more interesting (or at least different) from the norm. In this post I am going to […]

DDOS attack brings the Internet to its knees

An article from Ehacking about DDOS: The reason behind the attack is that Spamhaus added the IP addresses of cyberbunker to its “spam” list due to Cyberbunker allowing almost any sort of content to be hosted hence also maybe the source for spam. So Cyberbunker attacked back and this attack also affected normal internet users. The attack was possible […]

VSkimmer trojan steals card data on point-of-sale systems

An posting from SC Magazine on VSkimmer Trojan: Researchers have discovered a new trojan capable of stealing credit card data from point-of-sale (POS) systems, and it appears to be an updated version of Dexter, similar malware targeting card-swiping devices. On Thursday, Chintan Shah, a security researcher for McAfee Labs, blogged about VSkimmer, which is capable […]