Help Net Security
MacScan 2.7 is now Snow Leopard compatible
SecureMac released MacScan 2.7, the latest version of its anti-spyware privacy and security software. This new version enhances protection against the latest threats for Mac …
First online hacking conference: SecurityTubeCon
SecurityTubeCon is the first hacker conference to be held completely online, 6-8 November, 2009. The event is aimed at democratizing hacker conferences by allowing any …
Guide to mitigate network security vulnerabilities, threats and cyber attacks
EU Agency ENISA presents the first pan European Good Practice Guide on Network Security Information Exchange (NSIE). The main aim of this guide is to assist Member States and …
(Fake) malware leads to real danger
Well, it seems that we are so used to scares regarding viruses and other assorted malware, that the actual information doesn’t even have to be true anymore but can still …
How phishing savvy are you?
Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a …
Pilot programs for an open government
Ten industry leaders — Yahoo!, PayPal, Google, Equifax, AOL, VeriSign, Acxiom, Citi, Privo and Wave Systems — announced they will support the first pilot programs designed …
Symantec introduces Norton Internet Security and AntiVirus 2010
Symantec announced Norton Internet Security 2010 and Norton AntiVirus 2010, with a new model of security, codenamed Quorum, to attain detection of new malware beyond …
Firefox 3.5.3 fixes critical security vulnerabilities
Mozilla released Firefox 3.5.3 that fixes several security issues. Crashes with evidence of memory corruption Mozilla developers and community members identified and fixed …
Nullcon Goa 2010 opens Call for Papers
The next edition of Nullcon is taking plance in Goa, India, in February 2010. The conference will run on the following two serial tracks: 1. Gurukul Track – 1 hr …
Detecting Twitter spam and threats
David Maynor, over at Errata Security’s blog explains how he got fooled by a spambot. Using their TwiGUARD analysis tool, he discovered a profile that to him seemed …
The most dangerous computer threats of the last 20 years
PandaLabs has issued a ranking of the most insidious malware threats that have surfaced in the past 20 years. The following threats have been selected for the notoriety they …
JScript scripting engine critical vulnerability
Microsoft released a security update that resolves a privately reported vulnerability in the JScript scripting engine that could allow remote code execution if a user opened a …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations