Help Net Security
Crimeware: Understanding New Attacks and Defenses
Even as the security industry celebrates solid sales thanks to compliance laws, the last few years have not been characterized by a state of growing security. In fact, …
Phishing attacks down in May
The percentage of phishing attacks decreased in May relative to other malware, according to threat statistics analysed by managed security company, Network Box. Phishing …
22 suspected computer hackers arrested in France
According to French media reports, the 22 alleged hackers were arrested in Paris, southern and central France following a four month investigation involving over 90 members of …
Malware report: AdvancedXPFixer adware and Tixcet worm
PandaLabs reports this week about the adware AdvancedXPFixer, the Banbra.FTI Trojan and the Tixcet.A worm. AdvancedXPFixer is adware (a program designed to display adverts) …
The critical importance of Enterprise Rights Management
Anyone wondering why Enterprise Rights Management (ERM) is growing in importance need only review the news stories of the past few years. A US government consultant accesses …
Internet scheme used to steal micro-deposits
Michael Largent, 22, was arraigned on an indictment charging him with multiple counts of computer fraud, wire fraud, and mail fraud. This case is the product of an extensive …
Hardware encryption-secured flash drive
EDGE Tech Corp introduced its rough-and-tough, hardware encryption-secured flash drive, the DiskGO Secure GUARDIAN. Utilizing mandatory 256-bit AES hardware encryption, the …
Web application security landscape and trends
In the latest issue of the HNS Podcast, Mandeep Khera from Cenzic shares web application security trends observed by his company in the first quarter of 2008. Mr. Khera also …
Apple updates security with Mac OS X 10.5.3
The Mac OS X 10.5.3 Update is recommended for Mac OS X 10.5, 10.5.1, and 10.5.2 Leopard. It includes general operating system improvements that enhance the stability, …
Adobe Flash Player remote code execution vulnerability roundup – update #2
Adobe Flash Player contains an code execution vulnerability. An attacker may be able to trigger this overflow by convincing a user to open a specially crafted SWF file. The …
HNS Book giveaway: “The Future of Reputation: Gossip, Rumor, and Privacy on the Internet”
June 05 2008: The winner is Jeffry B. ———————————- We are giving one of our readers a copy of “The …
Insider threats keep IT directors awake at night
Secure Computing announced the results of an IT Director survey that uncovers a rising concern of insider threats and widespread acknowledgement of being unprepared for …
Featured news
Resources
Don't miss
- What a future without CVEs means for cyber defense
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks
- Key tips to stay safe from deepfake and AI threats
- UK retailers under cyber attack: Co-op member data compromised