Help Net Security
Testing a Bluetooth worm on Nokia E90 Communicator
Mikko H. Hypp?¶nen, F-Secure’s Chief Research Officer will be delivering presentations on the current state of mobile malware this week in Black Hat Briefings and next …
The Story of DEFCON
Jeff Moss aka Dark Tangent, the founder of DEFCON and Black Hat, tells the history of the largest hacker conference and how it all got started. Find out more about the early …
Virus plays on Super Mario Bros nostalgia
Sophos is warning of a new mass-mailing worm that is capitalising on users’ enthusiasm for Nintendo’s iconic character, Mario. Once they open the email, recipients …
50% of organisations not coping with image-based spam
A survey by PineApp of 400 medium to large organisations in the UK has found that whilst 97% have anti-spam solutions, half of the respondents complained that they were not …
ScanSafe’s threat report for June 2007
Here is a copy of ScanSafe’s latest Threat Report (June 07). Click on the icons for larger images.
Panda Software no more
News from the Panda headquarters:Panda has changed name and brand. This change represents the attitude and response of Panda Software to the new malware dynamic, where threat …
Spammed screensaver installs rootkits and trojan
Sophos is warning of a widespread email spam campaign that poses as a screensaver, but is actually designed to install rootkits and a Trojan horse on infected Windows PCs. The …
PayPal data stealing trojan and IcePack malware installer
PayRob.A is a Trojan designed to steal data from PayPal accounts. Like most Trojans, PayRob.A cannot spread by itself, but needs intervention from a malicious user to reach …
New book: “Fuzzing: Brute Force Vulnerability Discovery”
Fuzzing has evolved into one of today’s most effective approaches to test software security. To “fuzz,” you attach a program’s inputs to a source of …
Malicious tool Icepack installs malware through exploits
PandaLabs has discovered a new malicious tool that installs malware through exploits. This tool is called Icepack and is sold on the Internet for US$400. This tool joins …
New book: “Network Warrior”
Network managers looking to work smarter and improve their job performances will find the useful, real-world tools they need in Gary Donahue’s new book, Network Warrior …
Guide to Online Antivirus Solutions: NanoScan and TotalScan
Internet connections are getting faster every day, so online antivirus solutions have transformed from proof-of-concept into actual quality security services. I’ve been …
Featured news
Resources
Don't miss
- Sensitive data of Eurail, Interrail travelers compromised in data breach
- PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)
- Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses
- LinkedIn wants to make verification a portable trust signal
- QR codes are getting colorful, fancy, and dangerous