Help Net Security
Unaware of the dangers, most teens share personal info online
50% of European teenagers give out personal information on the web – according to an EU study – which can remain online forever and can be seen by anybody. Today, …
Safety tips for online dating
BitDefender cautioned online daters about the increased security risks associated with looking for love online this year and their unique susceptibility to identity theft and …
Is authenticated XSS a problem?
Obviously, see cross-site scripting (XSS) is a big problem on the public Web. But there’s another angle to XSS that no one seems to be talking about – at least I …
Online shopping safety: Consumers hold retailers responsible
Almost a quarter (24%) of UK adults believe retailers are primarily responsible for making online shopping safer, according to a survey of 1004 consumers by CyberSource. This …
Seagate ships the Savvio 10K.4 hard drive
Seagate today announced its Savvio 10K.4 hard disk drive, the world’s highest-capacity 2.5-inch enterprise-class drive. Built for the demands of enterprise servers and …
Political hacktivism and the exploitation of tragedies is on the rise
A new McAfee report highlights the rise of political hacktivism in countries like Poland, Latvia, Denmark and Switzerland as well as the most significant spam-generating …
Multiple vulnerabilities in popular Web servers
When a file is created on a Windows system, a DOS-compatible 8.3 short file name (hereafter referred to as ‘8.3 alias’) is generated for backwards compatibility …
Automated malware analysis platform
HBGary released Responder Professional 2.0, a Windows physical memory and automated malware analysis platform that analyzes all programs in memory including malware to obtain …
Beyond the cloud: Common Assurance Metric
The Common Assurance Metric (CAM) launched today is a global initiative that aims to produce objective quantifiable metrics, to assure Information Security maturity in cloud, …
Rogue software details: AntiSpyware
AntiSpyware is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Safer surfing mobile social networks
ENISA (the European Network and Information Security Agency) today presents a new report on accessing social networks over mobile phones which points out the risks and threats …
Week in review: cloud computing security, black hat hacking, identity theft
Here’s an overview of some of last week’s most interesting news, reviews and articles: Cloud computing not as safe as they want you to think Cloud computing has …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?