Help Net Security
Campaign Monitor attacked, accounts compromised
E-mail marketing service Campaign Monitor has been attacked and some accounts have been compromised. The company labeled this as a deliberate, planned and complex intrusion …
Video: Mitigating Web-based malware attacks
Over the past few years, malware spreading primarily by infecting web pages has been a significant emerging trend that has become so significant that the major search engines …
Portable smart card readers from SCM Microsystems
Smart cards are being used worldwide to secure identities in many applications, such as bank payment cards, employee access badges, government identity cards and healthcare …
Arch Linux 2009.08 released
Arch Linux is a lightweight and flexible Linux distribution. The 2009.08 snapshot images are now available. Changes since the 2009.02 release: built from a current snapshot of …
jCryption: Javascript HTML form encryption plugin
jCryption is a javascript HTML form encryption plugin, which encrypts the POST/GET-Data that will be sent when you submit a form. It uses the Multiple-precision and Barrett …
4-drive rack mounted NAS servers from Qnap
Qnap expanded their Turbo NAS lineup with a pair of NAS servers for the corporate and entry-level enterprise market. The new TS-439U-RP and TS-439U-SP models are both 4-drive …
12 tips to protect your identity at school
Schools are traditionally open and unprotected environments. Keeping your personal information secure is a critical responsibility. Losing that information can impact you the …
Protecting enterprises against Web application attacks with IBM
As threats and attacks increasingly target Web applications, many enterprises have been forced to take a reactive approach to security with point products that address only …
Malware beyond Vista and XP
Windows may be ubiquitous, but there’s a thriving variety of alternative operating systems for enterprise and home use. However, the alternatives aren’t as risk …
New book: “Natural Language Processing with Python”
Technologies based on Natural Language Processing, or NLP, are becoming increasingly widespread. In Natural Language Processing with Python, authors Steven Bird, Ewan Klein, …
Twitter security move positive but is it it enough?
Twitter has quietly started checking URLs entered into user messages on its microblogging service. The new level of security might still leave room for improvement on several …
Denial of Service attack on Twitter
Earlier today Twitter was under a massively coordinated Denial of Service (DoS) attack and the service was interrupted. The folks at Twitter have been fighting the attack and …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)