Help Net Security
Bluetooth guardian for Series 60 phones
Symbian Guru released BT Guard – the security software which helps to protect the phone from unauthorized access via Bluetooth. BT Guard changes your Bluetooth status …
Virus almanac 2007
PandaLabs, Panda Security’s anti-malware laboratory, has drawn up this review of some of the more curious examples of malware that appeared in the second half of 2007. …
Dissecting and Digging Application Source Code for Vulnerabilities
Application source code scanning for vulnerability detection is an interesting challenge and relatively complex problem as well. There are several security issues which are …
Trojan comes as codec, brings in many malware
It may come in an email asking you to check out a movie file. Or it may seek to push its way to your computer from malicious websites. In both cases a “codec’ will …
Designing BSD Rootkits: An Introduction to Kernel Hacking
This book covers a very technical and fascinating topic that hasn't received much bookshelf space before this book was released. This title aims to give you the knowledge …
Dutch authorities apprehend 14 suspects in a phishing scam
IT security and control firm Sophos has welcomed news that Dutch authorities have arrested 14 suspects who allegedly allowed their ABN Amro bank accounts to be used by …
BSA urges congress to pass cyber crime legislation
 The Business Software Alliance (BSA) today urged Congress to swiftly enact cyber crime legislation that would update criminal laws to provide law enforcement with …
Forecast: How Internet threats will evolve in 2008
PandaLabs published a forecast on how Internet threats will evolve in 2008. One of the key factors will be the increase in the amount of malware, known and unknown, in …
Open Source Vulnerability Database 2.0
OSVDB announced a major milestone in the cataloging, classification, description and management of software and hardware security vulnerabilities – the release of OSVDB …
Qualys releases QualysGuard PCI 2.0
Qualys announced the availability of QualysGuard PCI 2.0, the second generation of its On Demand PCI Platform. It dramatically streamlines the PCI compliance process and adds …
Eight security New Year’s resolutions for network managers
2008 is expected to continue the 2007 trend of increasing size, scope, and concentration of attacks on computer networks nationwide. Attacks are increasingly more targeted as …
Apple releases security update 2007-009
Today Apple released Security Update 2007-006 which addresses: Address Book Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits