Help Net Security
Top 10 security predictions for 2010
Michael Sutton, VP of security research at Zscaler outlined the following security predictions for 2010. Apple is forced to climb the security learning curve Apple has for …
Rogue software details: InternetSecurity2010
InternetSecurity2010 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
The future of spam: 2010 and beyond
The economics behind spam dictate that 2010 will be another active year for spammers. The distribution of spam emails is set to continue as long as distribution channels …
Interactive packet manipulation tool
Scapy is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match …
Threat alert: Fake Flash greeting card
Cisco Security Intelligence Operations has detected serious activity related to spam e-mail messages that claim to contain a greeting card. The text in the spam message …
Malware in rich media and content
Cybercriminals most commonly used PDF and Shockwave Flash rich-media formats during the first half of 2009. In their State of the Internet 2009 report, CA discusses how …
Facebook privacy and security guide
This is a video created by Tom Eston from SocialMediaSecurity walking you through the new Facebook privacy settings. It also covers notifications, Facebook Ads and hiding your …
Identify vulnerabilities with Microsoft’s CAT.NET tool
CAT.NET is a binary code analysis tool that helps identify common variants of certain prevailing vulnerabilities that can give rise to common attack vectors such as Cross-Site …
Attacks on strong authentication factors need new defenses
Fraudsters have started to raid user accounts by beating strong two-factor authentication methods. Gartner analysts said that Trojan-based, man-in-the-browser attacks are …
The 2010 threat landscape
The 2010 threat landscape In conjunction with their State of the Internet 2009 report, CA outlined their online security predictions for 2010. 1. Search engine optimization …
Serious SQL flaw could have compromised millions of Rockyou.com users
Imperva has issued a warning after finding a serious SQL injection flaw with Rockyou.com – a social networking application development web site. The SQL injection flaw …
World of Warcraft phishing scam
World of Warcraft (WoW) players should be on the lookout for phishing sites trying to get their user info. One still operating at time of writing is worldqfwarcraft.com. This …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations