Help Net Security
Ask the social engineer: Practice
One reader wrote in asking: “How can one practice social engineering before using it in the wild?” Answering is Chris “loganWHD” Hadnagy, the lead …
Embracing tokenization: Payment without pain
Today, it’s expected that merchants accept electronic payments. It’s more than expected that those payments are secure. No data leaks or breaches of any kind. The …
Discover security flaws in source code with Graudit
Graudit is a simple script and signature sets that allows you to find potential security flaws in source code using the GNU utility grep. Graudit supports scanning code …
Find potential exploit conditions in Microsoft Office documents
OfficeCat is a command line utility developed by the Sourcefire VRT that can be used to process Microsoft Office Documents to determine the presence of potential exploit …
Trojans dominate BitDefender’s top 10 e-threats list
The top spot on BitDefender’s top 10 e-threats list for October is once again Trojan.Clicker.CM, which is mostly present on websites hosting illegal applications such as …
Top causes of identity fraud
Identity fraud increased substantially in 2008, reversing a four-year trend of decreasing incidents. Researchers say identity fraud increased by 22 percent last year and they …
Global security best practices
The latest Microsoft Security Intelligence Report shares security best practices from countries that have consistently exhibited low malware infection. These best practices …
Worm infections in the enterprise rose by nearly 100%
The latest Microsoft Security Intelligence Report (SIRv7), which indicates that worm infections in the enterprise rose by nearly 100 percent during the first half of 2009 over …
Record levels of spam, malware and Web-based threats
The number of new file-sharing sites hosting unauthorized, copyrighted content skyrocketed over the last three months, according to McAfee’s latest report. It also shows …
Week in review: Malicious email attachments, phishing trends, China’s cyber army and Halloween attacks
Here is an overview of some of last week’s most interesting news, interviews and articles: Q&A: Malware threats, Windows 7 and cyber crime Bo Olsen is a malware …
Facebook hit by phishing scam and banking Trojan combo
Facebook users should be on the lookout for an email threat that is posing as a message from Facebook administrators. The message contains both a phishing scam and a notorious …
Network access control system PacketFence 1.8.5 released
PacketFence is a free and open source network access control (NAC) system. PacketFence is actively maintained and has been deployed in numerous large-scale institutions over …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware