Monthly Archives: June 2009

ENISA: Awareness Raising Video Clips

ENISA has produced video clips which will sensitize your employees to information security risks and remind them of the basic golden rules. The ENISA video clips are available for download and use in any information security training programme, awareness activity

Harry Potter next up for hackers

Cyber criminals are using the new Harry Potter film to distribute malware, according to new research from security vendor PC Tools. The firm said that hackers are using the increasingly popular tactic of ‘black hat’ search engine optimisation (SEO) to

Saudi supercomputer ranked as fourteenth most powerful worldwide

King Abdullah University of Science and Technology (KAUST) new super computer has taken 14th place in the global list of the top 500 supercomputers compiled by www.top500.org. The IBM Blue Gene/P System, named Shaheen, recorded a peak processing power of

Q&A: Kevin Mitnick, from ham operator to fugitive to consultant

There is no question who the most famous hacker is. One of the first computer hackers prosecuted, Kevin Mitnick was labeled a “computer terrorist” after leading the FBI on a three-year manhunt for breaking into computer networks and stealing software

HTTP DoS-attack tool on Apache web server

Robert Hansen, a guru in the field of security, has released a new tool for DoS-attacks, exposing serious Web server’s vulnerabilities including Apache and other servers. Hansen called his tool Slowloris , the most interesting in this utility that it

'It takes just 1 minute to hack a govt website'

Ethical hacker Harold D’Costa breaks into a government website and intimates them immediately so they can secure the systems Guess how long it took ethical hacker Harold D’Costa to hack into the website of the Maharashtra Motor Vehicles Department? Just

Apple releases 45 patches for iPhone, iPod

Big number of fixes surprising, but no known malicious software for devices Apple Inc released 45 software patches on Wednesday to address rare security vulnerabilities in its popular iPhone and iPod Touch mobile devices. The company released them as part