Help Net Security
New book: “Linux Networking Cookbook”
The recipes in her book focus on connectivity: firewalls, wireless access points, secure remote administration, remote helpdesk, remote access for users, Virtual Private …
Fresh from CES – Maxtor BlackArmor hardware encrypted storage solution
At CES, Seagate Technology introduced Maxtor BlackArmor encrypting storage solution that provides AES government-grade encryption protection against unauthorized access to …
WiFi Epidemiology: Can Your Neighbors’ Router Make Yours Sick?
In densely populated urban areas WiFi routers form a tightly interconnected proximity network that can be exploited as a substrate for the spreading of malware able to launch …
Firefox basic authentication spoofing details and video
Researcher Aviv Raff found out that Mozilla Firefox allows spoofing the information presented in the basic authentication dialog box. This can allow an attacker to conduct …
RealPlayer 11 can be used for a system compromise
Secunia reported that researcher Evgeny Legerov has found a vulnerability in RealPlayer, which can be exploited by malicious people to compromise a user’s system. The …
11 indicted in illegal spamming and stock fraud scheme
A federal grand jury indictment was unsealed today in Detroit charging 11 persons in a wide-ranging international fraud scheme involving the illegal use of bulk commercial …
New PHP release fixes several vulnerabilities
The PHP development team announced the immediate availability of PHP 4.4.8. It continues to improve the security and the stability of the 4.4 branch and all users are strongly …
Microsoft prepares two security bulletins
Microsoft announced their plan to release two Windows security updates on Tuesday January 8 as part of the regular software patch cycle. One of the bulletins is rated critical …
Facebook widget installs Zango spyware
Fortinet Global Security Research Team discovered a malicious Facebook Widget actively spreading on the social networking site which ultimately prompts users to install the …
Sourcefire 3D gets a Network Intrusion Prevention System Certification from ICSA Labs
Sourcefire 3D System’s 3D3800 Sensor has received Network Intrusion Prevention System certification from ICSA Labs, an independent division of Verizon Business. …
Trojan horses the leading cyber-threat in 2007
Trojans were responsible for 25.83% of infections recorded by ActiveScan, the online scanner from Panda Security, during 2007. This type of malicious code accounted for 77.40% …
New book release: “Mac OS X Leopard: The Missing Manual”
David Pogue’s timely new book “Mac OS X Leopard: The Missing Manual” offers honest, straightforward, and fun-to-read instructions on all things Leopard, …
Featured news
Resources
Don't miss
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)
- GitPhish: Open-source GitHub device code flow security assessment tool
- Healthcare CISOs must secure more than what’s regulated