Help Net Security
Tokenization: A new approach to enterprise data security
As enterprises seek to protect data from cybercriminals, internal theft or even accidental loss, encryption and key management have become increasingly important and proven …
BruCON 2010 call for papers
BruCON is a 2-day security and hacking conference held in Brussels (24 & 25 September 2010), full of interesting presentations, workshops and security challenges. Help …
Minimalist server monitoring
Anfibia Reactor is a web-based server monitoring solution that oversees the CPU, memory, battery, hard drives, makes sure network connections are working, checks databases, …
F-Secure protects Android users
F-Secure released Anti-theft for Mobile and Mobile Security, which includes the Browsing Protection feature, for smartphones on the Android platform. Today’s smartphones …
Rogue software details: Security Essentials 2010
Security Essentials 2010 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Week in review: Aurora malware, cyber war games and 0-day vulnerabilities for sale
Here’s an overview of some of last week’s most interesting news and articles: Biggest Chinese hacker training site taken down Black Hawk Safety Net, which offered …
Rogue software details: MalwarePro
MalwarePro is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Google Buzz for spammers
The Google Buzz sign-up is being advertised to users when logging into Gmail, and is a fairly transparent process to users with an existing Gmail account. Clicking on …
Critical infrastructure is a primary cybercriminal target
Critical infrastructure such as energy, pharmaceutical and government assets are more than twice as likely to be targeted by cybercriminals than other organizations, according …
Security advice for Valentine’s Day
Malware that uses Valentine’s Day as a lure to trick users and infect computers is now a well-established feature of the IT security calendar. Once again, it will be no …
Rogue software details: Security Antivirus
Security Antivirus is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Will virtualization and cloud computing change how we achieve security?
The virtues of virtualization and cloud computing will figure in most enterprise IT infrastructure discussions during 2010. Virtualization has already proven its worth in …
Featured news
Resources
Don't miss
- F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info
- Microsoft patches three zero-days actively exploited by attackers
- U.S. seizes $15 billion in Bitcoin linked to massive forced-labor crypto scam
- A safer way to break industrial systems (on purpose)
- Maltrail: Open-source malicious traffic detection system