Help Net Security
Gang of four charged in joss-stick worm case
Li Jun, Wang Lei, Zhang Shun and Lei Lei are facing charges in a people’s court in Hubei Province in connection with the creation and distribution of the Fujacks worm. …
Super Ninja Privacy Techniques for Web App Developers
If I keep my documents on Google Docs, my mail on Yahoo Mail, my bookmarks on del.icio.us, and my address book on .Mac, is there any point in talking about the privacy of my …
Hot Summer Book Giveaway – Winners announced
The lucky winners in our “Hot Summer Book Giveaway” are: 1) Lennox B. – “Security Metrics” 2) Mathew L. – “The Art of Software …
2008 promises exceptional demand for professional certification
(ISC)2 has expanded its global education offerings to support the next phase of Department of Defense (DoD) Directive 8570.1 — a phase that will involve an unprecedented …
2/3 of people worried about information shared on Facebook
Research conducted by IT security and control firm Sophos has revealed that fifty percent of workers are being blocked from accessing Facebook by their employers who are …
File containing confidential data from 30,000 users
A version of Apophis, a tool used by cyber-crooks to handle information stolen from users infected by several variants of the Nuklus family of Trojans, stores data belonging …
MacNikto: Working with the Nikto Web Server Security Scanner on the Mac
Nikto is an open source web server scanner which performs comprehensive tests against web servers for multiple items, including over 3300 potentially dangerous files/CGIs, …
Windows patch updates blamed for Skype problems?
Although a Russian security forum speculated about a possible exploit that caused major problems for the Skype network, Skype announced the following: “On Thursday, 16th …
Secure USB 2.0 drives with hardware-authentication lock
Corsair launched the “Flash Padlock” family of affordable USB 2.0 drives, the safest way to secure your data while on the go. Priced starting at only $29.99 USD …
Latest malware threat roundup and forecast PDF report
Trend Micro today published the TrendLabs Semi-annual Threat Roundup and Forecast. Analyzing malware trends that influence the economic growth of the malware world, the report …
New book – “Securing Ajax Applications”
Securing Ajax Applications covers basic security techniques and examines vulnerabilities with JavaScript, XML, JSON, Flash, and other technologies. Wells, also, clearly and …
Computer Forensics Library Boxed Set
“Computer Forensics Library Boxed Set” includes three previously published books: “Forensic discovery” (020163497X): Definitive guide that presents a …
Featured news
Resources
Don't miss
- Chinese cyber spies used Claude AI to automate 90% of their attack campaign, Anthropic claims
- A suspected Fortinet FortiWeb zero-day is actively exploited, researchers warn
- Why your security strategy is failing before it even starts
- Protecting mobile privacy in real time with predictive adversarial defense
- Los Alamos researchers warn AI may upend national security