Monthly Archives: November 2010

IRC-Based Botnets Almost Vanishing!

Botnet Number that is controlled over web servers are five times the number of botnets controlled by IRC-channels this is according to a new research conducted by Team Cymru Security experts. The IRC botnet has decreased significantly due to some

Verizon Enterprise Risk and Incident Sharing (VERIS) Application

Verizon launched a new service that will allow companies to spread information about hacking attempts. This will be done to other companies who find themselves in similar situations, take into account the experience. Verizon Enterprise Risk and Incident Sharing (VERIS)

Attacking Cisco Router over TCL

Today only lazy or out from the IT sphere person never heard about Cisco. Company specialized in developing network devices and solving all related problems. IOS (Internetwork Operation System) is installed on Cisco networking equipment and allows flexible system configuration.

Internet Explorer Vulnerability Allows Trojan Spreading

Microsoft has fixed a new vulnerability (CVE-2010-3962) in all Internet explorer versions except Internet Explorer 9 Beta. The bug could Allow Remote Code Execution on victim machines. About this vulnerability Symantec stated that by visiting an infected website a Backdoor.Pirpi

Fedora 14 More Developers Features

The Fedora development community announced the official release of Fedora 14, the new version of one of the most popular Linux-distributions, sponsored by Red Hat and supported by the community, – Fedora 14, codenamed Laughlin. This release is a bit