Help Net Security
Mac security under real threat?
In its latest security threat report, Sophos reveals that in 2007 organised criminal gangs for the first time arrived at Apple’s doorstep with the intention of stealing …
RFID replay attack allows free travel in The Netherlands
A week ago a TV program was broadcasted about the successful attack on the single-use RFID-based Dutch public transit card by computer science student Roel Verdult of the …
Weekend “fun” with the vulnerable RIAA web site
Over the weekend many Internet surfers had the chance to witness an online “play” with Recording Industry Association of America (RIAA) web site. It looks like the …
Security fixes in new Apache HTTP Server versions 1.3.41, 2.0.63 and 2.2.8
The Apache Software Foundation and the Apache HTTP Server Project announced the release of new Apache HTTP servers, versions 1.3.41, 2.0.63 and 2.2.8. The new releases fix a …
Web 2.0 Security
Web 2.0 is an umbrella term coined to include technologies used for providing user-centric web based services. Here, the services are architected and programmed so that they …
Adobe addresses potential cross-site scripting vulnerabilities
Input validation errors have been identified in code generated by Dreamweaver and Contribute which could lead to potential cross-site scripting attacks. Only users who have …
Ministry of Defence confirms loss of recruitment data
UK’s Ministry of Defence confirmed that a laptop was stolen from a Royal Navy officer in Birmingham last week, on the night of 9/10 January, and as a result, a large …
Video: demonstration of the Mac OS X DNSChanger Trojan
The video demonstrates the results of the DNS changes made on a Mac OS X system.
Last week malware “winners”
According to data gathered at the Infected or Not website the Bagle.HX worm was responsible for most infections over the last week. Two strains of adware, Comet and Starware, …
Malware findings 2007: instant messaging and P2P
FaceTime announced its initial findings of 2007 malware trends affecting today’s enterprise networks through instant messaging (IM), P2P file sharing and chat …
New UK postgraduate course in computer forensics and investigations
Computer Forensics and Investigations, a new postgraduate course from The UK’s Open University provides an introduction to the world of digital evidence collection, …
Skype cross zone scripting vulnerability details and video
Skype uses Internet Explorer web control to render HTML content. This is used also for providing “add video to mood” and “add video to chat” …
Featured news
Resources
Don't miss
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)
- GitPhish: Open-source GitHub device code flow security assessment tool
- Healthcare CISOs must secure more than what’s regulated