Help Net Security
Rogue software details: Total Win 7 Security
Total Win 7 Security is a rogue security application. In order to remove it, find out what file entry to look for below. Known system changes: File c:\userprofile\Local …
Solving the data privacy puzzle
The absence of uniform global legislation, regulations or standards for data privacy is posing a major data privacy puzzle for organizations faced with protecting the …
Google releases web application security scanner
Google released Skipfish, a free fully automated, active web application security reconnaissance tool. It prepares an interactive sitemap for the targeted site by carrying out …
Week in review: Amateur-run botnets, Mac OS X ransomware and feds on social networks
Here’s an overview of some of last week’s most interesting news, articles, reviews and videos: The rise of amateur-run botnets It used to be that cyber criminals …
The cloudy world of passwords
With the growth of social networking, online media consumption and cloud computing, every day millions of people log in to a variety of different sites using a username and …
Barclays under strong phishing shower
A highly productive phishing scam, with more than 180 messages sent in three minutes, hits a big chunk of the online segment of Barclays members Various people are wondering …
Rogue software details: DoubleVaccine
DoubleVaccine is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Understanding social engineering
At the heart of many of the malicious ploys that we see online is one underlying concept: social engineering. Deceptive social engineering tactics are interwoven throughout …
1 in 4 kids have tried hacking
Despite 78% agreeing that it is wrong, 1 in 4 of UK’s children have tried their hand at hacking into others’ Facebook accounts mostly by surreptitiously using the …
Rogue software details: Antivirus 7
Antivirus 7 is a rogue security application. In order to remove it, find out what files to look for below. Known system changes: Files c:\Desktop\Antivirus7.lnk …
Enterprise 2.0 privacy concerns in Europe
Transparent access to people and information is Enterprise 2.0’s great promise. It’s tempered, however, by a privacy risk that is especially sensitive in the …
Cloud-based rapid disaster recovery
Unitrends unveiled its Vault2Cloud disaster recovery service, monitored and managed through a simple, easy-to-use Web 2.0-based user interface. Vault2Cloud solves many of the …
Featured news
Resources
Don't miss
- Balancing cybersecurity and client experience for high-net-worth clients
- CISOs, are you ready for cyber threats in biotech?
- fiddleitm: Open-source mitmproxy add-on identifies malicious web traffic
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?