Help Net Security
What the Heartland Data Breach Tells Us
The recent data breach at Heartland Payment Systems should make one thing clear: the standards for security around credit card numbers still aren’t good enough. New …
Damn Vulnerable Linux 1.5 is now available
Damn Vulnerable Linux (DVL) is meant to be used by both novice and professional security personnel and is even ideal for the Linux uninitiated. You can start learning IT …
Only 8.4% of email that reached companies in 2008 was non-malicious
PandaLabs revealed the results from its analysis on 430 million email messages from 2008 and discovered that only 8.4 percent of messages that reached companies were …
PayPal joins OpenID foundation board
The OpenID Foundation announced the addition of PayPal as a sustaining corporate member of the board. PayPal selected Andrew Nash, Sr. Director of Information Risk Management …
New version of iServices Trojan now in pirated Adobe Photoshop CS4
Intego has discovered a new variant of the iServices Trojan horse that the company discovered on January 22, 2009. This new Trojan horse, OSX.Trojan.iServices.B, like the …
Code Review or WAFs? PCI 6.6
Short answer: both. Compliance with requirement 6.6 of the PCI DSS cites the use of either a web application firewall (WAF) or code review. It’s far more effective to …
Fraud costs rise, challenging online businesses
Fraud is taking a bigger bite out of UK online revenues according to the figures come from a survey of 150 online merchants undertaken by CyberSource. One in eight businesses …
Fujitsu develops HDD security technology based on Opal SSC standards
Fujitsu announced the development of new security technology to make its 2.5-inch encrypted hard disk drives support the Opal Security Subsystem Class (Opal SSC). Opal SSC is …
2008 spam lessons learned: “Stop the guns, not just the bullets”
Marshal8e6, a provider of web and email security products, released its TRACE report for the second half of 2008 which finds that while global spam volumes continued to …
NetMRI 3.0 introduces impact analysis to Network Configuration and Change Management
NetMRI 3.0 solves the number-one challenge that undermines network performance and policy compliance – internal changes to the network, whether malicious or inadvertent …
Mac theft recovery application Undercover now with location tracking
Orbicule announced the integration of Wi-Fi Positioning software from Skyhook Wireless into Undercover, a theft-recovery application that can track any stolen Mac. Undercover …
Positive financial results from Check Point Software
Positive financial results are not so common these days, so let us briefly cover that Check Point Software reported record fourth quarter and fiscal year 2008 numbers. Here …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems