Help Net Security
Compliance, IT Security and a Clear Conscience
Never has the need to prove compliance with external regulations and internal policies been more acute than it is today. The likely consequences of failing to prove that your …
Security is broken: the past, present and future
Our computer security model is broken. Worse yet, it never really has worked at all well, and is even less suitable for today’s uses. This talk explores the history …
The insecurity of Widgets
Iftach Ian Amit from Finjan explains why widgets and gadgets on various websites and platforms are inherently insecure, despite the fact that standards exist to create secure …
Step-by-step Guide to Online Amazon S3 Backups with Jungle Disk
Jungle Disk is an application that lets you store files and backup data securely to Amazon.com’s S3 Storage Service. Amazon S3 provides a simple web services interface …
Bumping the Medeco Lock at DEFCON 2007
Lock bumping became big news at last year’s Defcon when 11-year-old Jennalynn showed an exceptional talent for being able to bump almost any lock set in front of her. …
What every engineer needs to know about security
This talk discusses recent trends in security, and what every engineer needs to know to prevent the most significant emerging threats such as cross-site scripting and SQL …
Noteworthy presentations at HITBSecConf2007
HITBSecConf2007 is taking place between September 3rd and 6th 2007 in Kuala Lumpur. Here’s a list of interesting presentations: Injecting RDS-TMC Traffic Information …
Automated bot attacks increase dramatically totaling 1.7 Million in June/July
SecureWorks announced today that it has seen an onslaught of Storm Worm attacks in the last two months. “From the first of January to the end of May, we only saw 71,342 …
Number of cyber attacks on banks up 81% since last year
SecureWorks reserach shows that the number of hackers attempting to attack its banking clients is up 81% since last year and hackers attempting to attack its credit union …
Two-thirds of all email blocked based on sender reputation
St. Bernard Software’s LivePrism filtering solution blocked two-thirds of its customers’ incoming email in July based solely on sender reputation without having to …
PDF Spam: A Step Ahead of Image Spam
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. The latest tactic is to use the …
Spammed out “shocking photos” emails contain malicious payload
Sophos is urging computer users to think before opening unsolicited email attachments following the discovery of a widespread malicious spam campaign that claims to contain …
Featured news
Resources
Don't miss
- Hackers used Cisco zero-day to plant rootkits on network switches (CVE-2025-20352)
- Microsoft revokes 200 certs used to sign malicious Teams installers
- A new approach to blockchain spam: Local reputation over global rules
- SAP zero-day wake-up call: Why ERP systems need a unified defense
- “Perfect” Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)