Help Net Security
Amazon-inc.com phishing e-mails
There is a new batch of Amazon phishing e-mails. The address linked inside the message goes to a random collection of quite possibily compromised computers and afterwards …
Quick start program for shielding vulnerabilities in Electronic Health Record systems
In response to recent findings of the eHealth Vulnerability Reporting Program (eHVRP) study (PDF) announced on Monday, Third Brigade, a security software company specializing …
Prevent data theft from smartphones and PDAs with new SecuBox
Aiko Solutions today released SecuBox 1.3, a powerful solution for encrypting sensitive information carried on Windows Mobile smartphones and PDAs. SecuBox 1.3 offers full …
New Kerio WinRoute Firewall with Internet monitoring module
Kerio WinRoute Firewall 6.4 was just released the other day. A new version of the Internet monitoring module in Kerio WinRoute Firewall, Kerio StaR, has added enhanced, …
Survey shows average cyber-losses jumping after five-year decline
The Computer Security Institute (CSI) released its 2007 report with news that the average annual loss reported by U.S. companies in the 2007 CSI Computer Crime and Security …
The Right Formula for Data Leak Protection
Whether on the race track, on the web or in the boardroom, data leaks are invariably bad news. Just ask Ferrari and McLaren, the F1 giants embroiled in controversy over …
New attacks that exploit widgets and gadgets are imminent
Seemingly innocent Widgets (or Gadgets) are exposing computer users to a whole host of attacks. The findings are one of a number uncovered by Finjan’s Malicious Code …
IBM Report: stealthy, targeted online attacks continue to grow in 2007
IBM today reported an increase in malware volume and sophistication, the rise of exploit leasing and a lower number of vulnerability disclosures versus the first half of 2006 …
eHealth Vulnerability Reporting Program study findings
The board of the eHealth Vulnerability Reporting Program (eHVRP.org), today made public the results of a fifteen-month study assessing the security risks associated with …
This week’s new strains of malware
The LunchLoad.A and FakeGoogleBar.M Trojans are the two new strains of malware in this week’s PandaLabs report. LunchLoad.A reaches systems under the name backup2_36. …
Ten arrested for phishing trojan horse attack
Germany’s Federal Crime Office (known as the BKA) announced on its website that the gang of ten, which includes two women, has been arrested on suspicion of defrauding …
Spyware Terminator 2.0
Over the years, hundreds of anti malware applications started popping out on the Internet but only the best prevailed. One of these tools is Spyware Terminator and this review …
Featured news
Resources
Don't miss
- CISA confirms exploitation of VMware ESXi flaw by ransomware attackers
- Why a decade-old EnCase driver still works as an EDR killer
- Smart glasses are back, privacy issues included
- Cybersecurity planning keeps moving toward whole-of-society models
- Major vulnerabilities found in Google Looker, putting self-hosted deployments at risk