Help Net Security
Manage Your Passwords with 1Passwd
Nowadays everyone has too many passwords to remember. People either use easy to remember passwords or even worse, the same password for multiple accounts. 1Passwd makes things …
Testing a Bluetooth worm on Nokia E90 Communicator
Mikko H. Hypp?¶nen, F-Secure’s Chief Research Officer will be delivering presentations on the current state of mobile malware this week in Black Hat Briefings and next …
The Story of DEFCON
Jeff Moss aka Dark Tangent, the founder of DEFCON and Black Hat, tells the history of the largest hacker conference and how it all got started. Find out more about the early …
Virus plays on Super Mario Bros nostalgia
Sophos is warning of a new mass-mailing worm that is capitalising on users’ enthusiasm for Nintendo’s iconic character, Mario. Once they open the email, recipients …
50% of organisations not coping with image-based spam
A survey by PineApp of 400 medium to large organisations in the UK has found that whilst 97% have anti-spam solutions, half of the respondents complained that they were not …
ScanSafe’s threat report for June 2007
Here is a copy of ScanSafe’s latest Threat Report (June 07). Click on the icons for larger images.
Panda Software no more
News from the Panda headquarters:Panda has changed name and brand. This change represents the attitude and response of Panda Software to the new malware dynamic, where threat …
Spammed screensaver installs rootkits and trojan
Sophos is warning of a widespread email spam campaign that poses as a screensaver, but is actually designed to install rootkits and a Trojan horse on infected Windows PCs. The …
PayPal data stealing trojan and IcePack malware installer
PayRob.A is a Trojan designed to steal data from PayPal accounts. Like most Trojans, PayRob.A cannot spread by itself, but needs intervention from a malicious user to reach …
New book: “Fuzzing: Brute Force Vulnerability Discovery”
Fuzzing has evolved into one of today’s most effective approaches to test software security. To “fuzz,” you attach a program’s inputs to a source of …
Malicious tool Icepack installs malware through exploits
PandaLabs has discovered a new malicious tool that installs malware through exploits. This tool is called Icepack and is sold on the Internet for US$400. This tool joins …
New book: “Network Warrior”
Network managers looking to work smarter and improve their job performances will find the useful, real-world tools they need in Gary Donahue’s new book, Network Warrior …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)