With February's Threat Landscape Report out, it's time to highlight some of the most interesting movement happening from late January 2009 to now:
New vulnerabilities (NVC) were up nearly three fold, with 117 posted in comparison to 43 from January'...
Legitimate -- and sometimes renowned -- web sites are more and more subject to code-injection attacks; and it's not rare today to find your every day site injected with malicious JavaScript code, which sole purpose is to silently redirect all visitor...
Not so long ago, I arrived, all fresh and pumping, from a world full of cryptography -- you know, RSA, AES, SHA256 etc. -- very excited to discover a new face to computer security. It's always in such situations you notice the importance of vocabular...
Strictly speaking, it’s a wagon, with a band on it, made popular in the circus entertainment business. I imagine going round a circus ring on a wagon was preferable to walking round during the days when performing animals were still the norm.
Later...