Help Net Security
Week in review: New cybercrime currency, massive SQL injection attack and Facebook battling scammers
Here’s an overview of some of last week’s most interesting news, videoas and articles: Intellectual capital is the new cybercrime currency Cybercriminals …
Pharmaceutical spam and mobile threats dominate
Wannabe cybercriminals were able to execute attacks with impunity and relative ease thanks to toolkits, pre-written software programs designed to steal information, rendering …
Tips to prevent identity theft during tax season
PrivacyGuard would like to help educate consumers with the following tips on how to prevent identity theft during tax season. When preparing your return 1. Be aware of …
Personalized cloud-based platform
NetQin announced a personalized cloud-based platform that allows users to synchronize their personal data across multiple devices with single account. Backed by a cloud …
Vulnerabilities in common web applications escalate
A new Cenzic report reveals widespread Web application vulnerabilities, with 2,155 discovered – a third of which have both no known solution and an exploit code publicly …
Cybercriminals and their favorite baits
According to PandaLabs research, 25 percent of sites used video and multimedia content as bait; 21.63 percent referred to installers or program updates; 16.53 percent claimed …
Half of U.S. tax payers are unaware about identity theft risks
While consumers take steps to protect themselves against identity theft and remain concerned about the possibility of a data breach when sharing their personal information, …
Vulnerabilities surge: 8,000 recorded in 2010
IBM today released results from its annual X-Force 2010 Trend and Risk Report, highlighting that public and private organizations around the world faced increasingly …
Key security experts unfamiliar with DNSSEC
Half of IT personnel in charge of Internet security at the world’s largest organizations either haven’t heard of DNSSEC or have limited familiarity with it, …
Tips for protecting against advanced evasion techniques
By challenging the rules of traditional evasion techniques and combining multiple evasions, AETs are currently unable to be detected by existing network security systems. Ted …
Application control within virtual environments
Sourcefire announced integration between Sourcefire and VMware vShield App and vShield Edge. The integrations enable the Sourcefire Intrusion Prevention System (IPS) to …
Cisco ACS unauthorized password change vulnerability
A vulnerability exists in some Cisco Secure Access Control System (ACS) versions that could allow a remote, unauthenticated attacker to change the password of any user account …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)