Help Net Security
Facebook widget installs Zango spyware
Fortinet Global Security Research Team discovered a malicious Facebook Widget actively spreading on the social networking site which ultimately prompts users to install the …
Sourcefire 3D gets a Network Intrusion Prevention System Certification from ICSA Labs
Sourcefire 3D System’s 3D3800 Sensor has received Network Intrusion Prevention System certification from ICSA Labs, an independent division of Verizon Business. …
Trojan horses the leading cyber-threat in 2007
Trojans were responsible for 25.83% of infections recorded by ActiveScan, the online scanner from Panda Security, during 2007. This type of malicious code accounted for 77.40% …
New book release: “Mac OS X Leopard: The Missing Manual”
David Pogue’s timely new book “Mac OS X Leopard: The Missing Manual” offers honest, straightforward, and fun-to-read instructions on all things Leopard, …
They really don’t want you to have a happy new year
Sophos is warning workers returning from the New Year holidays to be wary of internet attacks taking advantage of the celebrations. New versions of the Dorf worm (W32/Dorf-AE, …
New way of auditing Oracle and UNIX password security
ElcomSoft has added support for Oracle and UNIX passwords to Elcomsoft Distributed Password Recovery v. 2.10. The latest version of ElcomSoft’s Windows password recovery …
Endpoint Security
Endpoint security is currently one of the "hot topics" in the information security market. Often neglected, this vital part of your company network organization can very …
Example of double spam sent to mailboxes and mailing lists
A way of double spamming – combo of spamming email users and mailing lists to get a profit: #1 Spammer sends a spam e-mail to a mailing list that doesn’t have …
Video: information security – before and after public-key cryptography
Whitfield Diffie, a key figure in the discovery of public-key cryptography, traces the growth of information security through the 20th century and into the 21st. In the 1970s, …
Guide for assessing the security controls in federal information systems
NIST recently released a draft Special Publication 800-53A, Guide for Assessing the Security Controls in Federal Information Systems. This final public draft provides …
Weekly report on viruses and malware X-mas edition
As for the most harmful malware strains this week, the list is headed by the Virtumonde spyware and the NaviPromo and VideoAddon adware.As for the new samples that appeared …
Bluetooth guardian for Series 60 phones
Symbian Guru released BT Guard – the security software which helps to protect the phone from unauthorized access via Bluetooth. BT Guard changes your Bluetooth status …
Featured news
Resources
Don't miss
- How CISOs can talk cybersecurity so it makes sense to executives
- How OSINT supports financial crime investigations
- Review: Effective Vulnerability Management
- Vuls: Open-source agentless vulnerability scanner
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)