Help Net Security
25 million new malware strains in one year
The outstanding trend of the last 12 months has been the prolific production of new malware: 25 million new strains were created in just one year, compared to a combined total …
iPhone network sniffer
Pirni is the worlds first native network sniffer for iPhone. The iPhone’s Wi-Fi has some major drawbacks in its hardware design, thus we can not properly set the device …
F-Secure protects smartphone data
F-Secure released its new standalone smartphone solution, Anti-Theft for Mobile which provides three useful security features to protect your phone: remote lock, remote wipe …
Automatic analysis of malware behavior
Malheur is a tool for automatic analysis of program behavior recorded from malware. It has been designed to support the regular analysis of malicious software and the …
Rogue software details: SpyEraser
SpyEraser is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Classification of weaknesses and attacks
The Web Application Security Consortium (WASC) released Threat Classification 2.0. The Threat Classification is an effort to classify the weaknesses, and attacks that can lead …
2010: A good year for fighting cybercrime?
McAfee Labs believes cybercriminals will target social networking sites and third-party applications, use more complex Trojans and botnets to build and execute attacks, and …
Phishers prefer Paypal, Visa, eBay and Amex
Compared to the first half of 2009, the amount of phishing messages has remained relatively unchanged, although phishers have switched their focus to institutions that could …
E-threats shifting with current events
Malware writers have preserved their focus on web-based attacks while actively looking for new methods to disseminate their products. BitDefender released the results of its …
Twitter bans obvious passwords
An applause for Twitter which has recently made it so that when you sign up for an account you can’t use one of those very obvious passwords. Here is a list of these …
Rogue software details: KeepCop
KeepCop is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\ProgramFiles\KeepCop …
Greatest security threats to education
With education-related cyber-security threats expected to rise in 2010, WatchGuard is predicting the top threats facing schools, colleges and universities. Top threats …