Help Net Security
Internet fraudsters jailed for online criminal forum
A group of young internet fraudsters who set up an online criminal forum which traded unlawfully obtained credit card details and tools to commit computer offences were jailed …
E-mail spam drops by half, search malware on the rise
Attackers are making a shift from using e-mail spam to more aggressively targeting the Internet, according to Barracuda Network. E-mail spam dropped by half during 2010, while …
Twitter crime rate rises 20 percent
Barracuda Labs analyzed more than 26 million Twitter accounts in order to measure and analyze account behavior. The analysis enabled researchers to model normal user behavior …
Malware decreases, Trojans still dominate
According to data gathered by Panda Security, only 39 percent of computers scanned in February were infected with malware, compared to 50 percent last month. Trojans were …
iTunes 10.2 fixes multiple security vulnerabilities
iTunes 10.2 comes with several new features, improvements and security fixes. ImageIO libpng is updated to version 1.4.3 to address multiple vulnerabilities, the most serious …
Wireshark 1.4.4 released
Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. Wireshark 1.4.4 fixes the following vulnerabilities: …
SpyEye botnet activity surges
Fortinet announced its February 2011 Threat Landscape report, which details five zero-day vulnerabilities found in Cisco (FGA-2011-03), Adobe (FGA-2011-06) and Microsoft …
Cain & Abel 4.9.39 released
Cain & Abel is a password recovery tool for Microsoft operating systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted …
SANS Secure Europe: In-depth information security training
SANS Secure Europe Amsterdam is the second biggest event outside of the US offering 8 top level courses. What makes SANS Secure Europe Amsterdam a unique event is that these …
Workers expose businesses to malware and data loss
Organizations are at risk of malware as 76% of workers plug unknown USB flash drives into company PCs, potentially compromising corporate network security, according to …
Twitter 11.6 hours survey scam spreading virally
Twitter users should be vigilant following the outbreak of a scam that is spreading links from users’ accounts without their knowledge. The scam, which has already …
PDF-Pro multiple vulnerabilities
Several vulnerabilities in PDF-Pro can be exploited by malicious people to compromise a user’s system, according to Secunia. 1. The application loads libraries (e.g. …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)