Help Net Security
Anonymity, privacy and circumvention with Tor
Below you can watch Jake Appelbaum’s presentation from SOURCE Boston 2010.
AT&T and McAfee offer secure e-mail gateway
As spam and other e-mail security threats continue to inundate organizations’ daily operations, AT&T has announced a new network-based solution, AT&T Secure …
Linux 2.6.34 released
Linux 2.6.34 has been released. This version adds two new filesystem, the distributed filesystem Ceph and LogFS, a filesystem for flash devices. Other features are a driver …
Facebook users hit by video attack
Facebook users should be wary following a video attack on users this weekend designed to infect computers with adware. Thousands have been hit by the attack which posted a …
Week in review: KHOBE attack, Facebook security and the biggest phishing crime syndicate
Here’s an overview of some of last week’s most interesting news and articles: phpnuke.org compromised, serving exploits PHP-Nuke is a popular Web content …
Twitter-controlled botnet SDK at large
Huge armies of zombified computers unanimously executing the commands sent by their master – that’s what comes in the mind of a computer user at the sound of the …
Black swans, secure access and business continuity
If you’d looked through the contingency plans of the world’s top 500 companies in March of this year, it’s unlikely you’d have found a scenario that …
Real-world data on software security initiatives
Cigital announced an updated release of the “Building Security In Maturity Model” (BSIMM) study, which significantly expands the data defining benchmarks for …
OneWay: Fast FTP, SFTP uploader for Mac OS X
OneWay is a contextual FTP, SFTP uploader for Mac OS X. You can upload files directly from the Finder. Save frequently used locations in your context menu for quick access. …
Rogue software details: Live PC Care
Live PC Care is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\live pc …
One crime syndicate responsible for most phishing attacks
A single electronic crime syndicate employing advanced malware was responsible for two-thirds of all the phishing attacks detected in the second half of 2009 — and was …
Less than half of cloud services are vetted for security
More than half of U.S. organizations are adopting cloud services, but only 47 percent of respondents believe that cloud services are evaluated for security prior to …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?