Help Net Security
Secure USB 2.0 drives with hardware-authentication lock
Corsair launched the “Flash Padlock” family of affordable USB 2.0 drives, the safest way to secure your data while on the go. Priced starting at only $29.99 USD …
Latest malware threat roundup and forecast PDF report
Trend Micro today published the TrendLabs Semi-annual Threat Roundup and Forecast. Analyzing malware trends that influence the economic growth of the malware world, the report …
New book – “Securing Ajax Applications”
Securing Ajax Applications covers basic security techniques and examines vulnerabilities with JavaScript, XML, JSON, Flash, and other technologies. Wells, also, clearly and …
Computer Forensics Library Boxed Set
“Computer Forensics Library Boxed Set” includes three previously published books: “Forensic discovery” (020163497X): Definitive guide that presents a …
Know Your Enemy: Malicious Web Servers
Today, many attackers are part of organized crime with the intent to defraud their victims. Their goal is to deploy malware on a victim’s machine and to start collecting …
Worm with SMTP and dialer engine
The focus of this week’s PandaLabs report are RegisteredLetter.A worm and ZLFake.A backdoor. RegisteredLetter.A is designed to make a series of changes on infected …
Snort creator acquires ClamAV open source network anti-virus project
Sourcefire announced that it has acquired ClamAV, a leading open source gateway anti-virus and anti-malware project. Sourcefire’s first acquisition since its Initial …
Man sentenced for buying stolen identities
Sophos has welcomed news that US authorities have sentenced a man to seven years in prison for buying stolen identities from online forums run by cybercriminals in other …
Guide to Online Antivirus Solutions Part 4: Norman SandBox Malware Analyzer
Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …
Video: a new class of SQL vulnerability
Martin McKeay caught up with Ivan Arce, CTO for Core Security to talk about a new class of SQL vulnerability that’s dependent on a algorithm common to most SQL …
Details on the compromised Ubuntu servers
Ubuntu Wiki: This last week, 5 of the 8 servers that are LoCo hosted but Canonical sponsored, had to be shut down due to reports that they were actively attacking other …
Details on recent Microsoft vulnerabilities
Microsoft has released updates that address critical vulnerabilities in Microsoft Windows, Internet Explorer, Windows Media Player, Office, Office for Mac, XML Core Services, …
Featured news
Resources
Don't miss
- Building the missing layers for an internet of agents
- What security leaders should watch for when companies buy or sell a business
- Malicious Rust packages targeted Web3 developers
- Max-severity vulnerability in React, Node.js patched, update ASAP (CVE-2025-55182)
- Smart grids are trying to modernize and attackers are treating it like an invitation