Help Net Security
Latest malware threat roundup and forecast PDF report
Trend Micro today published the TrendLabs Semi-annual Threat Roundup and Forecast. Analyzing malware trends that influence the economic growth of the malware world, the report …
New book – “Securing Ajax Applications”
Securing Ajax Applications covers basic security techniques and examines vulnerabilities with JavaScript, XML, JSON, Flash, and other technologies. Wells, also, clearly and …
Computer Forensics Library Boxed Set
“Computer Forensics Library Boxed Set” includes three previously published books: “Forensic discovery” (020163497X): Definitive guide that presents a …
Know Your Enemy: Malicious Web Servers
Today, many attackers are part of organized crime with the intent to defraud their victims. Their goal is to deploy malware on a victim’s machine and to start collecting …
Worm with SMTP and dialer engine
The focus of this week’s PandaLabs report are RegisteredLetter.A worm and ZLFake.A backdoor. RegisteredLetter.A is designed to make a series of changes on infected …
Snort creator acquires ClamAV open source network anti-virus project
Sourcefire announced that it has acquired ClamAV, a leading open source gateway anti-virus and anti-malware project. Sourcefire’s first acquisition since its Initial …
Man sentenced for buying stolen identities
Sophos has welcomed news that US authorities have sentenced a man to seven years in prison for buying stolen identities from online forums run by cybercriminals in other …
Guide to Online Antivirus Solutions Part 4: Norman SandBox Malware Analyzer
Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …
Video: a new class of SQL vulnerability
Martin McKeay caught up with Ivan Arce, CTO for Core Security to talk about a new class of SQL vulnerability that’s dependent on a algorithm common to most SQL …
Details on the compromised Ubuntu servers
Ubuntu Wiki: This last week, 5 of the 8 servers that are LoCo hosted but Canonical sponsored, had to be shut down due to reports that they were actively attacking other …
Details on recent Microsoft vulnerabilities
Microsoft has released updates that address critical vulnerabilities in Microsoft Windows, Internet Explorer, Windows Media Player, Office, Office for Mac, XML Core Services, …
Malware Evolution: April – June 2007
The events that took place during the first six months of 2007 have shown us that the direction in which threats are evolving is from social engineering to the increased usage …
Featured news
Resources
Don't miss
- “Perfect” Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)
- When trusted AI connections turn hostile
- Identifying risky candidates: Practical steps for security leaders
- Humanoid robot found vulnerable to Bluetooth hack, data leaks to China
- F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info