Help Net Security
Cloud computing: Risks outweigh the benefits
Research conducted across Europe, the Middle East and Africa (EMEA) by ISACA has found that a quarter of enterprises that already use cloud computing believe that the risks …
Rogue software details: PC Antispy
PC Antispy is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Opera 10.51 addresses security issues
Opera 10.51 (build 3315) for Windows has been released. This release also addresses a couple of security issues, as well as various stability improvements and other bug fixes. …
Remote lock and wipe for Blackberry users
InnoPath Software announced ActiveCare for RIM Blackberry devices, including support for models such as the Bold 9700, Storm 2, Curve and Tour across both GSM and CDMA …
Firefox 3.6.2 fixes critical security issue
Mozilla released Firefox 3.6.2 that fixes a critical security issue as well as stability issues. WOFF heap corruption due to integer overflow Security researcher Evgeny …
Security on a shoestring
Whenever information security is mentioned within most organizations there is a collective groan; the board don’t want to engage, staff don’t want to be encumbered …
Seattle is US riskiest online city
Symantec teamed up with independent research firm Sperling’s BestPlaces to find and expose the top 10 US cities most vulnerable to cybercrime. And here are the results …
Rogue software details: Total Win 7 Security
Total Win 7 Security is a rogue security application. In order to remove it, find out what file entry to look for below. Known system changes: File c:\userprofile\Local …
Solving the data privacy puzzle
The absence of uniform global legislation, regulations or standards for data privacy is posing a major data privacy puzzle for organizations faced with protecting the …
Google releases web application security scanner
Google released Skipfish, a free fully automated, active web application security reconnaissance tool. It prepares an interactive sitemap for the targeted site by carrying out …
Week in review: Amateur-run botnets, Mac OS X ransomware and feds on social networks
Here’s an overview of some of last week’s most interesting news, articles, reviews and videos: The rise of amateur-run botnets It used to be that cyber criminals …
The cloudy world of passwords
With the growth of social networking, online media consumption and cloud computing, every day millions of people log in to a variety of different sites using a username and …
Featured news
Resources
Don't miss
- Google agrees to pay $135 million over Android data harvesting claims
- SolarWinds fixes critical Web Help Desk RCE vulnerabilities, upgrade ASAP!
- Open-source malware zeroes in on developer environments
- Hottest cybersecurity open-source tools of the month: January 2026
- A practical take on cyber resilience for CISOs