Help Net Security
Rogue software details: Live Enterprise Suite
Live Enterprise Suite is a rogue security application. In order to remove it, find out what files to look for below. Known system changes: Files c:\CommonDesktop\Internet …
Basic vulnerability found in most voice encryption products
IT security blogger Notrax claims to have successfully intercepted and compromised phone calls made using 12 commercially available mobile voice encryption products. Using a …
Many cybercrimes go unreported
More than half of the 500 respondents (58%) of the 2010 CyberSecurity Watch Survey believe they are more prepared to prevent, detect, respond to or recover from a cybercrime …
Hacker attacks on healthcare organizations double
SecureWorks reported that attempted hacker attacks launched at its healthcare clients doubled in the fourth quarter of 2009. Attempted attacks increased from an average of …
Online fraud a significant revenue loss for merchants
UK merchants say online fraud is the greatest threat they face, according to the Sixth Annual UK Online Fraud Report. Merchants stated that they lost an average of 1.8% of …
iPhone application for remote desktop access
Array Networks launched the DesktopDirect iPhone Client, the first iPhone application for enterprise remote desktop access. Employees now have full-feature access on the …
Cisco Press titles for new CCNP certification exams
Cisco Press, the official publisher to the CCNP exams, brings a portfolio of learning and preparation products to the new 2009 CCNP certification exams launched recently by …
Apache SpamAssassin 3.3.0 released
Apache SpamAssassin 3.3.0 is a mature, wide-spectrum, extensible email filtering package deployed by hundreds of thousands of organizations worldwide. Apache SpamAssassin …
Virus writers produce hardware damaging code?
BitDefender identified a new e-threat that combines the destructive behavior of a virus with the spreading mechanisms of a worm. There are two known variants of this virus, …
Devious ransom trojan takes data hostage
Taking data hostage is not a new invention in the world of cybercrime but a trojan currently infecting computers does it in a way that can leave the victim unaware that he has …
TechCrunch compromised by security exploit
Popular technology blog TechCrunch was compromised earlier today and their site was replaced by a message that links to a website offering assorted links to pirated material: …
Collection of penetration testing tools
Complemento is a collection of tools for penetration testing that has been included in BackTrack 4 Final LetDown is a TCP flooder that has an (experimental) userland TCP/IP …
Featured news
Resources
Don't miss
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform
- Connected homes: Is bystander privacy anyone’s responsibility?
- Google says 2026 will be the year AI supercharges cybercrime