Help Net Security
First man ever charged with hacking VoIP providers
The first individual ever charged with hacking into the networks of Voice Over Internet Protocol (VoIP) providers and reselling hacked VoIP services for a profit pleaded …
Rogue software details: GuardWWW
GuardWWW is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Microsoft plans massive Windows patch next week
Microsoft announced it will deliver 13 bulletins Tuesday, February 9, 2010. They will address 26 vulnerabilities in Windows and Office, five of which are rated critical. The …
NIST draft of smart grid cyber security strategy
The Commerce Department’s National Institute of Standards and Technology (NIST) issued the second draft of its Smart Grid Cyber Security Strategy and Requirements, which …
Windows file system exploitation at ShmooCon
At ShmooCon 2010 tomorrow, Core Security researcher Dan Crowley will demonstrate how features not widely known in Windows path and filename normalization routines cause …
Corporations should follow the goverment’s lead on attribution of cyberattacks
Many would argue, and understandably so, that government does not often provide models for corporations to follow to improve their bottom line. However, federal agencies have …
Cracking encrypted iPhone backups
iTunes routinely makes backups of iPhones and iPods being synced to it. Such backups contain a plethora of information, essentially all user-generated data from the device in …
Top 10 malware threats for January
Sunbelt Software announced the top 10 most prevalent malware threats of January 2010. The top seven detections were the same as December, but in a slightly different order. In …
Entrust placed in leaders quadrant for Web fraud detection
Entrust has been positioned in the leaders quadrant of Gartner’s 2010 Magic Quadrant for Web Fraud Detection. Gartner’s Magic Quadrant for Web Fraud Detection …
The value of stolen credentials
The rapid evolution of Web 2.0 services and the parallel world of cybercrime is driving a revolution in the price that criminals charge each other for user credentials. The …
iPhone OS 3.1.3 patches security issues
iPhone OS 3.1.3 deals with several security issues outlined below. CoreAudio A buffer overflow exists in the handling of mp4 audio files. Playing a maliciously crafted mp4 …
(IN)SECURE Magazine issue 24 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 24 has been released today. Table of contents …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?