Source: NetworkWorld A cyberespionage group has been discovered using a new remote access Trojan, dubbed Trochilus, whose detection rate was very low among antivirus products. The malware was discovered by researchers from Arbor Networks while investigating attacks in Myanmar that were launched from compromised government websites. The researchers linked the compromises to a sophisticated group of attackers known… Read More »
Source: Computerworld “McAfee said it has found a vulnerability in Adobe Systems’ Reader program that reveals when and where a PDF document is opened. The issue is not a serious problem and does not allow for remote code execution, wrote McAfee’s Haifei Li in a blog post. But McAfee does consider it a security problem and has notified… Read More »
Source: Network World By Layer 8 For every 1,000 lines of code, one to five bugs are introduced. And getting those bugs out of the millions of lines of software code that run today’s complex systems is costly and only performed by highly specialized researchers with deep knowledge of software and mathematical theorem-proving techniques.
Source: Microsoft Patterns & Practices Introduction This guide shows you how to improve security for your WCF services. It also shows you how to effectively design your authentication, authorization, and communication strategies for Microsoft® Windows Communication Foundation. The information in this guide is based on practices learned from customer feedback and product support, as well as experience gained… Read More »