Help Net Security
Internet security forecast revisited
McAfee just revisited its top ten predictions for security threats in 2007. Their research shows that threats including data-thieving phishing Web sites are on the rise, as …
Capabilities and weaknesses of token-based authentication
From Martin McKeay’s blog: As most security professionals know, passwords are a losing proposition. We use them because the capability comes with your operating system, …
HP to acquire web application security expert
HP today announced that it has signed a definitive agreement to acquire SPI Dynamics, Inc., a provider of web application security assessment software and services, to further …
Business model based on the malicious MPack tool
PandaLabs has discovered the new 0.90 version of the malicious tool Mpack, available for US$1000 on the Web. This application could be defined as “a kit for installing …
Lock Down Your Mac with DoorStop X
When it comes to security, Mac OS X has proved on numerous occasions that it is quite safe, right out of the box. However, that doesn’t mean it cannot use additional …
A closer look at Tor privacy tool
Tor is a tool that can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol. This is a graphical …
Fast-moving web threat spreads around the world
Security researchers at Trend Micro reported an accelerating infection in Italy of seemingly legitimate web pages loaded with malicious code that could plant a keylogger to …
Monitoring all local and privileged user access to database
Tizor Systems announced Mantra V5.4 with Enterprise Local Audit Architecture, the most complete solution for monitoring all local and privileged user access to databases. …
Interview with Joanna Rutkowska, security researcher
Joanna Rutkowska is primarily known for her contributions to Windows Vista backdoor installation and hiding techniques. She is very interested in stealth technology as used by …
Hedgehog database security and insider threat prevention solution
Sentrigo announced the general availability of Hedgehog, product specifically designed to combat data breaches caused by insiders with access privileges—including employees, …
New ASUS notebooks with biometric fingerprint sensors
AuthenTec announced that its AES1610 fingerprint sensors are standard in more than a dozen new 2007 Windows Vista-model ASUS notebooks. Bundled with the Trusted Platform …
Counting the Cost of Cyber Crime
It has been a busy month in cyberspace. TJX, the massive worldwide fashion retailer, is finally releasing some of the gory details of the recent hack which saw over 45 million …
Featured news
Resources
Don't miss
- Hackers used Cisco zero-day to plant rootkits on network switches (CVE-2025-20352)
- Microsoft revokes 200 certs used to sign malicious Teams installers
- A new approach to blockchain spam: Local reputation over global rules
- SAP zero-day wake-up call: Why ERP systems need a unified defense
- “Perfect” Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)