Help Net Security
Online shopping safety: Consumers hold retailers responsible
Almost a quarter (24%) of UK adults believe retailers are primarily responsible for making online shopping safer, according to a survey of 1004 consumers by CyberSource. This …
Seagate ships the Savvio 10K.4 hard drive
Seagate today announced its Savvio 10K.4 hard disk drive, the world’s highest-capacity 2.5-inch enterprise-class drive. Built for the demands of enterprise servers and …
Political hacktivism and the exploitation of tragedies is on the rise
A new McAfee report highlights the rise of political hacktivism in countries like Poland, Latvia, Denmark and Switzerland as well as the most significant spam-generating …
Multiple vulnerabilities in popular Web servers
When a file is created on a Windows system, a DOS-compatible 8.3 short file name (hereafter referred to as ‘8.3 alias’) is generated for backwards compatibility …
Automated malware analysis platform
HBGary released Responder Professional 2.0, a Windows physical memory and automated malware analysis platform that analyzes all programs in memory including malware to obtain …
Beyond the cloud: Common Assurance Metric
The Common Assurance Metric (CAM) launched today is a global initiative that aims to produce objective quantifiable metrics, to assure Information Security maturity in cloud, …
Rogue software details: AntiSpyware
AntiSpyware is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Safer surfing mobile social networks
ENISA (the European Network and Information Security Agency) today presents a new report on accessing social networks over mobile phones which points out the risks and threats …
Week in review: cloud computing security, black hat hacking, identity theft
Here’s an overview of some of last week’s most interesting news, reviews and articles: Cloud computing not as safe as they want you to think Cloud computing has …
First man ever charged with hacking VoIP providers
The first individual ever charged with hacking into the networks of Voice Over Internet Protocol (VoIP) providers and reselling hacked VoIP services for a profit pleaded …
Rogue software details: GuardWWW
GuardWWW is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Microsoft plans massive Windows patch next week
Microsoft announced it will deliver 13 bulletins Tuesday, February 9, 2010. They will address 26 vulnerabilities in Windows and Office, five of which are rated critical. The …
Featured news
Resources
Don't miss
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform
- Connected homes: Is bystander privacy anyone’s responsibility?
- Google says 2026 will be the year AI supercharges cybercrime