Help Net Security
Log Management in PCI Compliance
Security professionals have come to realize that ensuring data security and integrity is critical to business continuity and risk mitigation. However, with increasing amounts …
Malicious toolbars top the list of most common malware
Panda Security informs that almost 28 percent of computers with installed protection scanned at the Infected or Not website (http://www.infectedornot.com) last week were …
Company wins important ruling for the anti-malware industry
Kaspersky Lab, a leading developer of secure content management solutions, announces that the United States District Court of Washington ruled in favor of Kaspersky Lab, …
Reducing Shoulder-surfing by Using Gaze-based Password Entry
Shoulder-surfing – using direct observation techniques, such as looking over someone’s shoulder, to get passwords, PINs and other sensitive personal information …
Weekly malware report: MSN Messenger and IRC worms
The most important malware samples analyzed by PandaLabs this week are the MSNHorn.A and Nugache.M worms, and the Legmir.ASG Trojan. MSNHorn.A spreads through MSN Messenger by …
Rihanna and Kelly Clarkson video emails spread a trojan horse
Sophos is warning internet users about the latest disguise being used by malware authors in their attempt to infect people’s PCs – an email claiming to point to …
Searching for evil
Computer security has recently imported a lot of ideas from economics, psychology and sociology, leading to fresh insights and new tools. I will describe one thread of …
Security update for AirPort Extreme 802.11n base station
A design issue exists in the IPv6 protocol’s handling of type 0 routing headers. Depending on network topology and capacity, the reception of specially crafted IPv6 …
NSA Secure Workstation Solution to use VMware
VMware announced an agreement with General Dynamics C4 Systems, a business unit of General Dynamics, to develop a complete turn-key High-Assurance Platform workstation using …
Best practices to combat SME security threats
SMEs face a different set of security challenges than enterprises and must adapt security policies and practices accordingly to avoid costly intrusions and that can cripple or …
Is PDF spam simply not working for the spammers?
Sophos has reported a dramatic decrease in the amount of spam emails using PDF file attachments to spread their unwanted messages. According to research compiled by …
Up to 59% of companies with active malware on their networks
Some 59% of companies that scanned between 20 and 30,000 PCs with Malware Radar had active malware on their computers, according to Panda Security’s Malware Radar, an …
Featured news
Resources
Don't miss
- When trusted AI connections turn hostile
- Identifying risky candidates: Practical steps for security leaders
- Humanoid robot found vulnerable to Bluetooth hack, data leaks to China
- F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info
- Microsoft patches three zero-days actively exploited by attackers