Help Net Security
Twitter users hit by Chatwebcamfree attack
Twitter users should to be vigilant as approximately 750 accounts on the popular micro-blogging site have been hit by yet another hack attack. Experts at SophosLabs found that …
Dual segment 10 Gigabit intelligent bypass switch
Interface Masters Technologies unveiled the Niagara 2814 Intelligent Bypass which consists of dual 10Gb bypass segments which possess passive and active bypass switch …
The economy and cyber crime
In this uncertain global economy, you can count on one thing: crime – both in the real world and the online one – has the opportunity to thrive. According to a …
Cost-effective single board computer from Axiomtek
Axiomtek has released its new cost-effective SBC81206 PICMG 1.0 PCI/ISA single board computer, based on the Mobile Intel 945GC Express chipset to support Intel Core 2 Duo …
New malware analysis technology improves threat detection
Sunbelt Software announced its new malware analysis technology, MX-Virtualization (“MX-V”), as part of a significant enhancement to its popular VIPRE Antivirus + …
Massive Twitter account hijacking spree
As posted by Rik Ferguson to Trend Micro’s CounterMeasure blog, it appears that there is a rash of Twitter account hijacking going on this evening. Hundreds of Twitter …
Secure data communication and protection for Windows Mobile
Certgate uveiled the Protector for Smart Phones, a hardware-based security solution for the protection of data and mobile communications. A smart card of the microSD type is …
iStockphoto struck by phishing attack
Popular stock photography website, iStockphoto, has been targeted by password thieves. According to a statement on the iStockphoto website, the phishing attack was perpetrated …
Web 2.0 defense system for enterprises
Optenet unveiled Optenet NetSecure, Optenet MailSecure, Optenet WebSecure and Optenet WebFilter – four new content security products that offer proactive protection from …
New Wireshark version addresses vulnerabilities
Wireshark is the world’s foremost network protocol analyzer, and is the de facto (and often de jure) standard across many industries and educational institutions. …
Cyber-criminals manipulate Internet searches to sell fake antivirus products
Cyber-criminals are manipulating search engine results to distribute malware, in particular, fake antivirus products. The reasons are simple: the criminals need to attract …
New version of the GNAT Pro Ada development environment
AdaCore announced GNAT Pro 6.2, the latest release of its GNAT Pro Ada development environment, available on 18 native and 28 cross platforms. It offers over 130 new features, …
Featured news
Resources
Don't miss
- Southwest Airlines CISO on tackling cyber risks in the aviation industry
- Insider risk management needs a human strategy
- Cerbos: Open-source, scalable authorization solution
- Patch Tuesday: Microsoft fixes 5 actively exploited zero-days
- Zero-day exploited to compromise Fortinet FortiVoice systems (CVE-2025-32756)