Help Net Security
Spammers turn to PDF files in latest pump-and-dump scam
Sophos is warning of a new ‘pump-and-dump’ stock spam campaign which uses a PDF file to hoodwink potential investors. Sophos has identified email messages being …
Virtualisation adopters face security challenges
Virtualisation is moving into the mainstream with 50% of IT professionals already using this new technology, or planning to do so within the next 18 months, reveals a survey …
USB Flash Drive worm from the “good guys”
Sophos has discovered a worm which copies itself onto removable drives, such as USB flash drives, in an attempt to spread information about AIDS and HIV. The LiarVB-A worm …
Secure Computing updates its URL filtering solution
Secure Computing announced a new version of SmartFilter 4.2 with TrustedSource. It provides granular protection against today’s Web 2.0 threats, allowing companies to …
Create Password Protected PDF Files On Your Mac
In the office I often use different word processors and text writing software applications. The majority of my output files are generated by the nifty (especially for a long …
Designing IS strategies to stay ahead of network threats
Headline-grabbing news about computer security breaches and their devastating consequences on an agency and its constituents is the stuff of every CSO’s nightmare, …
Hackers insert footage of nuclear explosion into webcam
Czech hackers managed to get access to a webcam and insert realistic footage of nuclear explosion. The incident was broadcasted on the Czech TV programme Panorama on Sunday. …
The Exploit Development Process
Alexander Sotirov is a Vulnerability Researcher at Determina Inc. In this video, made at Black Hat Europe, he discusses on a general note how exploit writers develop exploits.
Reactions to the HP acquisition of SPI Dynamics
Here are a couple of quotes found while traversing today’s media releases regarding the HP’s acquisition of SPI Dynamics. Microsoft to follow? “This is the …
Break a security product beta and win prizes
BitDefender is inviting the public to test BitDefender Total Security 2008, the flagship product of the company’s upcoming family of Internet security products. Among …
Internet security forecast revisited
McAfee just revisited its top ten predictions for security threats in 2007. Their research shows that threats including data-thieving phishing Web sites are on the rise, as …
Capabilities and weaknesses of token-based authentication
From Martin McKeay’s blog: As most security professionals know, passwords are a losing proposition. We use them because the capability comes with your operating system, …
Featured news
Resources
Don't miss
- Meta open-sources AI tool to automatically classify sensitive documents
- Why SAP security updates are a struggle for large enterprises
- Attackers fake IT support calls to steal Salesforce data
- Google fixes Chrome zero-day with in-the-wild exploit (CVE-2025-5419)
- How to manage your cyber risk in a modern attack surface