Help Net Security
New ASUS notebooks with biometric fingerprint sensors
AuthenTec announced that its AES1610 fingerprint sensors are standard in more than a dozen new 2007 Windows Vista-model ASUS notebooks. Bundled with the Trusted Platform …
Counting the Cost of Cyber Crime
It has been a busy month in cyberspace. TJX, the massive worldwide fashion retailer, is finally releasing some of the gory details of the recent hack which saw over 45 million …
Watch out for .hk domains with embedded malware code
ISC handler Maarten Van Horenbeeck writes that many valued contributors wrote in yesterday with various spam messages that contained nothing but a short piece of text and a …
Trojan horse allows attacker connect to Internet through your computer
A malware named Trojan-Proxy.Win32.Agent.y is on the prowl and like other members of its family, this one too facilitates a remote attacker to access the Internet via a …
This week’s top malware: “YouTube” and Dotex worms
This week’s PandaLabs report looks at two very dangerous worms: Dotex.A and SpreadBanker.A, as well as the six security patches published by Microsoft to fix up to …
New AI-based security data and log analyzer
Privacyware has released Adaptive Security Analyzer 2.0 (ASA), a software solution that helps system administrators and security and compliance personnel detect, understand …
Secure File Upload in PHP Web Applications
Various web applications allow users to upload files. Web forums let users upload avatars. Photo galleries let users upload pictures. Social networking web sites may allow …
Results from the annual RSA’s Wireless Security Survey 2007
As measured by the use of either advanced encryption or Wired Equivalent Privacy (WEP), London experienced notable improvement in the security of business wireless networks …
Data Seepage: How to Give Attackers a Roadmap to Your Network
At Black Hat Europe we met with Robert Graham and David Maynor, the CEO and CTO of Errata Security. In this video they talk about how the days of widespread internet attacks …
Data security summary report for 1H 2007 (video, 10 min)
Couple of days ago we covered F-Secure’s data security summary report for the first 6 months of 2007. Here is a video version of the report:
Jetstream security IP core algorithms get NIST certification
Security silicon IP provider Jetstream Media Technologies announced today that the algorithms of its security IP cores have successfully passed the Cryptographic Algorithm …
New tool for controlling bot infected computers
A detection of the LdPinch Trojan was the clue that led PandaLabs to discover a new server hosting a previously undiscovered tool for controlling botnets.  This tool …
Featured news
Resources
Don't miss
- PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)
- Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses
- LinkedIn wants to make verification a portable trust signal
- QR codes are getting colorful, fancy, and dangerous
- The NSA lays out the first steps for zero trust adoption