Help Net Security
Video: Online privacy – Industry self-regulation in practice
In this video, Aleecia M. McDonald speaks about industry self-regulation for online privacy. What is the user burden if people read online privacy policies? How long would it …
Nigeria shuts down 800 scam websites
The Nigerian Economic and Financial Crimes Commission has shut down no fewer than 800 scam websites and arrested members of 18 syndicates behind the fraudulent scheme in a …
Snort 2.8.5.1 released
Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol …
96 percent of Americans in favor of video surveillance to counteract terrorism
A recent Harris Poll survey indicates that 96 percent of U.S. citizens feel the federal government and law enforcement agencies should be able to use video surveillance in an …
Botnets dominate click fraud
Click Forensics released advertising audience quality figures for the third quarter 2009. Traffic across more than 300 ad networks is reflected in the data. Key findings for …
CentOS 5.4 released
Enterprise-class Linux distribution CentOS 5.4 for i386 and x86_64 architectures is now available. CentOS has numerous advantages over some of the other clone projects …
Anti-virus programs certified for Windows 7
ICSA Labs, an independent division of Verizon Business, has certified five vendors in detection and cleaning following its first round of testing security software designed …
Learn to avoid identity theft and online scams
Working within highly organized e-fraud cartels, today’s criminals are outwitting even Web-savvy consumers by luring them to phishing sites, clever copies of the real …
Control weaknesses jeopardize NASA’s systems
NASA has been audited by the U.S. Government Accountability Office, and the results are not satisfactory. The audit uncovered multiple weaknesses in the agency’s …
TrueCrypt 6.3 released
Version 6.3 of TrueCrypt, the free open-source disk encryption software for Windows Vista/XP (and now 7), Mac OS X, and Linux has been released. New features: Full support for …
RSA Conference Europe 2009 video walkthrough
In this RSA Conference Europe 2009 video walkthrough, you can see the look and feel of the event, opening day keynotes and the expo floor.
Survey points out endpoint device security gaps
In an effort to help IT departments evaluate and better secure their network endpoints, such as desktops, notebooks, smart phones, MP3 players and thumb drives, Novell today …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online