Help Net Security
New Facebook clickjacking attack
There is a new Facebook focused worm circulating around. Currently it seems that it doesn’t have any malicious payload, except spamming via posting messages to the …
Wi-Fi security patent granted for dynamic authentication and encryption
Ruckus Wireless has been granted a patent by the USPTO for an innovation that radically simplifies the configuration, administration and strength of wireless network security. …
More Facebook users hit by “distracting beach babes”
Sophos is warning Facebook users to be on their guard, after an attack this weekend designed to infect computers with adware. Hundreds of thousands of Facebook users are …
Google now supports encrypted search
Google just rolled out SSL encryption to Google Search. The option is currently in beta, therefore the users aren’t automatically transferred to https. Over the years, …
Week in review: Facebook privacy problems and web fingerprints
Here’s an overview of some of last week’s most interesting news, articles and interviews: Google encrypts Google Search Following the unintended collection of …
Surviving and recovering from network interruptions
Ongoing changes to network and security device configuration are unavoidable and necessary for business. But they are also risky. They can have unexpected consequences – …
iptables 1.4.8 released
iptables is the userspace command line program used to configure the Linux 2.4.x and 2.6.x IPv4 packet filtering ruleset. It is targeted towards system administrators. The …
New book: “Security on Rails”
You need to know how to defend yourself. Designing security into an application is a little like getting insurance. You know you really need it, you probably keep putting it …
Security process automation: Create order from chaos
As a boy I loved Lego. I’d use the red and green and white bricks that in those days came in just a few shapes, to construct houses, ships, cars and stairways that lead …
Office 2010 Beta impersonator is a Trojan
An e-mail with the subject “See Office 2010 Beta in action” uses an alleged Office 2010 Beta version used as bait. This enticing title accompanies a message which …
Rogue software details: ByteDefender
ByteDefender is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Symantec to acquire VeriSign’s security business
Symantec has signed a definitive agreement to acquire VeriSign’s identity and authentication business, which includes the Secure Sockets Layer (SSL) Certificate …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous