Help Net Security
How black hat spam SEO works
For some time, attackers have leveraged Search Engine Optimization (SEO) techniques in order to promote malicious web content targeting end users. Google has researched this …
Firefox 3.6.9 fixes numerous security issues
Mozilla released Firefox 3.6.9 that fixes several security issues as well as stability issues. Miscellaneous memory safety hazards Mozilla developers identified and fixed …
Phishers exploit HMRC tax error refund
Tax authorities in the UK are in the process of contacting millions of people, telling them that they have paid the wrong amount of tax. As members of the public wait to be …
Sourcefire integrates with Qualys
Sourcefire announced an integration with QualysGuard. To support increased product collaboration, Sourcefire is delivering a new Qualys Connector, which associates threats …
AuthenTec and UPEK to merge
AuthenTec, a provider of security, identity management and touch control solutions, and UPEK, a supplier of fingerprint solutions, announced that the companies have combined, …
TrueCrypt 7.0a released
TrueCrypt 7.0a has been released. This version contains a workaround for a bug in some custom (non-Microsoft) drivers for storage device controllers that caused a system crash …
Wireless car hacking due to poor security
Research from the University of California San Diego and the University of Washington – and which concludes that modern cars are susceptible to wireless hacking – …
Every week 57,000 fake Web addresses try to infect users
Every week, hackers are creating 57,000 new Web addresses which they position and index on leading search engines in the hope that unwary users will click them by mistake. …
nCircle updates PCI scan service
nCircle released a new version of its Certified PCI Scan Service that is fully compliant with the latest PCI DSS requirements. The new requirements improve the processes …
Week in review: Facebook’s remote logout, malware protection tips and a new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, articles and videos: Building secure web mashups In this video from OWASP AppSec Research 2010, …
Automated vs. manual security
In this video from OWASP AppSec Research 2010, David Byrne and Charles Henderson from Trustwave talk about automated vs. manual security.
Trojan attacks remain widespread
GFI’s statistics for the month of August show that users were under attack throughout the month primarily by the same Trojan horse programs that have persisted for …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems