Help Net Security
MI5 describes astonishing level of cyber attacks
MI5 has admitted that it is working to counter astonishing levels of cyber-attacks on UK industry. Head of MI5, Jonathan Evans, commented that vulnerabilities on the internet …
Video: Attacking XML preprocessing
Documenting more than a year of research in XML technologies, this talk by Nicolas Grégoire at Hack in The Box 2012 Amsterdam details security implications of the XML format …
Network Forensics: Tracking Hackers Through Cyberspace
Learn to recognize hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious email attachments from …
70% of teens hide their online behavior
When it comes to using the Internet, teens are not only engaging in risky behaviors, but how they are hiding it from their parents, many of whom don’t realize they are …
Online compliance and vulnerability scanning tool
First Data Corporation announced its PCI Rapid Comply solution, an online Self-Assessment Questionnaire (SAQ) and vulnerability scanning tool that can help small to mid-sized …
Most senior managers don’t know where their data is
67% of respondents say that senior management in their organizations either don’t know where all company data resides or are not sure, according to Varonis. In addition, …
VMware Cookbook, 2nd Edition
With scores of step-by-step solutions, VMware Cookbook, 2nd Edition helps you work with VMware ESXi in a wide range of network environments. You’ll not only learn the …
Week in review: Origins of Flame revealed, Windows 8 security, and active exploitation of state-sponsored 0-day
Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles: Real life examples on hackers bypassing CAPTCHA …
Malware-as-a-service allows victim management
A big amount of the malware out there are RAT (Remote administration tool) samples. This is software created by people specialized on it, people that develop, improve and sell …
Rising malware threat for banking credentials
AhnLab cautioned against increasing variations of SpyEye trojan and ZeuS bot that attempt to steal personal banking information all over the world. Lately, the AhnLab Security …
Smart TVs are vulnerable to attacks
Home entertainment has expanded beyond the traditional television. Modern TV sets are very similar to a desktop computer: they have a processor, memory, a hard disk and some …
User education essential against social engineering attacks
The five-year analysis of data from Google’s Safe Browsing service shows that the threat landscape of today has evolved considerably from that of just five years ago, …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)