Help Net Security
Reverse Engineering: Smashing the Signature
Many antivirus and antispyware solutions identify malicious programs by looking for known unique signatures contained inside them. Those signatures are stored inside a …
APWG and IEEE partner for Electronic Crime Research Conference
Anti-Phishing Working Group and IEEE will join forces for the development of the APWG e-Crime Researchers Summit (eCRS), the world’s only peer-reviewed technical …
Internal network security threats online encyclopedia
Promisec has released an online encyclopedia of internal network security threats. The encyclopedia, which can be viewed by anyone for free, is continually updated with …
Confidential school records made available online
Recent media reports state that more than 100,000 student records were accidentally made available online. The security blunder by The Princeton Review, an educational …
Code signing certificates for Adobe AIR applications
VeriSign today released VeriSign Code Signing Certificates for an application on Adobe AIR. Adobe AIR is a cross-operating system runtime that enables rich Internet …
Deep packet inspection testing methodology videos and documentation
BreakingPoint Systems released a detailed test methodology and video series that enables network engineers to test the deep packet inspection (DPI) features of content-aware …
Internet Terrorist: Does Such A Thing Really Exist?
Recently, I have experienced an increase in organizations questioning how real is the threat of Internet terrorism and what they can do to protect themselves. As a former …
New version of SifoML e-mail gateway appliance
O2Security released the newest version of its email gateway appliance. SifoML v3.9 provides new features and enhancements, including the ability to prevent attacks on networks …
Summary of changes to next version of PCI Data Security Standard
The PCI Security Standards Council (PCI SSC) announced the summary of forthcoming changes to PCI DSS as it moves from version 1.1 to the previously announced version 1.2 in …
Personal data of 92,095 credit applicants exposed in a security breach
A computer server within InterActive Financial Marketing Group (IFMG), a division of Dominion Enterprises located in Richmond, Virginia, was hacked into and illegally accessed …
Symantec to acquire PC Tools
Symantec Corp. signed a definitive agreement to acquire PC Tools, a global provider of innovative software products designed to protect the privacy and security of Windows …
Reputation Attacks: A Little Known Internet Threat
Reputation attacks target both individuals and companies, and their goal is to ruin the victim’s reputation. While attack techniques are varied, the consequences are …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems