Help Net Security
Attackers focusing on capturing personal data
Online criminals are garnering greater success with increased technical sophistication affecting a wider range of industries. With greater diversity and the use of targeted …
Hackers follow the money, IBM research shows
Existing threats such as phishing and document format vulnerabilities have continued to expand, even as users improve security, according to a new IBM report. The X-Force …
Protect Mac applications against piracy and malicious attacks
As the Mac platform continues to gain popularity, attackers are increasingly exploiting weaknesses in Mac OS X applications to invade end-user systems. This exploitation leads …
Worm spreads on Fotolog social networking website
PandaLabs has reported the appearance of a new worm, FTLog.A, which spreads through the popular Fotolog social networking site. This foto-blogging portal is used by almost 30 …
Is 2010 the year of the cloud?
Research by Resource on Demand claims to show the company has been receiving a record number of enquiries for salesforce and SaaS specialists during the first month of the …
Video: This you???? Twitter phishing attack demonstrated
A phishing attack on Twitter asks “This you????” and links to a bogus login page. Here’s a video from Sophos that shows how it works:
Rogue software details: TrustFighter
TrustFighter is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
VeriSign introduces new verification service for Web sites
VeriSign debuted the VeriSign Trust Seal, an extension of their recognized online trust mark, to increase confidence, traffic and transactions for sites that do not require …
Critical vulnerability in Adobe Download Manager patched
A critical vulnerability has been identified in the Adobe Download Manager. This vulnerability (CVE-2010-0189) could potentially allow an attacker to download and install …
Secretary of Homeland Security Janet Napolitano to keynote RSA Conference 2010
RSA Conference 2010 announced that Janet Napolitano, U.S. Secretary of Homeland Security, is scheduled to deliver a keynote on Wednesday, March 3, 2010 at 3:10 PM. Secretary …
First certified cloud-based solution for FDCC compliance
Qualys announced its new QualysGuard FDCC module – the first certified cloud-based computing solution for FDCC compliance. The module, validated by the National …
Rapid7 NeXpose now includes Exploit Exposure
Rapid7 announced Exploit Exposure, a new technology in its vulnerability management product, Rapid7 NeXpose. Exploit Exposure provides users with deeper insight into the …
Featured news
Resources
Don't miss
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform
- Connected homes: Is bystander privacy anyone’s responsibility?
- Google says 2026 will be the year AI supercharges cybercrime