Help Net Security
New crimeware targeting companies
The new variant, “Prg”, researched by Finjan’s Malicious Code Research Center (MCRC) and also noted by Don Jackson of managed security specialist …
Cisco IOS Exploitation Techniques
It’s been almost two years since Michael Lynn first demonstrated a reliable code execution exploit on Cisco IOS at Black Hat 2005. Although his presentation received a …
MPack mass hacking tool – work in progress video
This video demonstrates how a system is compromised by a malicious IFRAME and how the MPack gang has accomplished this on literally thousands of websites (mostly Italian) …
Utimaco releases SafeGuard Enterprise 5.1
This cross-platform security suite for 360-degree data protection of confidential data integrates multiple new functions including flexible policy management for hard disk …
New service offers advanced notification of potential identity misuse
IdentityTruth announced the public beta launch of IdentityTruth.com, a free service to provide individuals with the earliest possible notification in advance of potential …
New trojan horse uses Shockwave video
Sophos is warning computer users about a Trojan horse that disguises its malicious intent by playing a humorous animation. The Agent-FWO Trojan horse plays the popular …
Trojan in a fake Microsoft security bulletin
Sophos is warning users of a widespread attempt to infect email recipients by sending a warning about a bogus Microsoft security patch. The emails, which have the subject line …
PCI compliance and vulnerability scanning suite for just $99
Research published recently within the security industry confirms that, while PCI is important, it is only one part of a larger vulnerability management framework for …
The State of Database Security
Ted Julian is the VP of Marketing and Strategy at Application Security Inc. In this video he discusses the current state of database security and offers some insight on what …
API for OpenSSL developers to add elliptic curve cryptography to their applications
Certicom announced Security Builder API for Open Source to help OpenSSL developers easily add elliptic curve cryptography (ECC) to their applications. The SSL shim, or …
“Mind Games” – a psychology study on cyber criminals
In the study titled “Mind Games,” the primary author, Dr. James Blascovich, Professor of Psychology at the University of California, Santa Barbara, offers analyies …
Log-on to Windows computers with your fingerprint
IOGEAR just released Personal Security Mouse with Nano Technology (GMEFP1W6), a solution offering fingerprint scan to log-in to a computer Additional features include file / …
Featured news
Resources
Don't miss
- Chinese cyber spies used Claude AI to automate 90% of their attack campaign, Anthropic claims
- A suspected Fortinet FortiWeb zero-day is actively exploited, researchers warn
- Why your security strategy is failing before it even starts
- Protecting mobile privacy in real time with predictive adversarial defense
- Los Alamos researchers warn AI may upend national security