Help Net Security
Trojan spreading and confidential information stealing malware
FormShared.A is a worm aimed at spreading the SpyForms.S Trojan across P2P file-sharing programs. To do this, FormShared.A uses its own P2P client. It creates a subfolder …
SquirrelMail 1.4.9a update fixes multiple vulnerabilities
Version 1.4.9a of SquirrelMail has been released. It fixes several cross-site scripting vulnerabilities that could be exploited to inject code in Web sessions. The first flaw …
X-Force predicts security trends for 2007
IBM X-Force announced several predictions for the top security trends of 2007. Among the host of threats on the security horizon for 2007, X-Force foresees broader and more …
New wave of FBI spam
BitDefender warns users about a new wave of spam aimed at poisoning Bayesian spam filters. The increased volume of spam was sparked by recent attempts by the FBI to curb spam …
A new worm creeps all over Myspace
It’s great to meet people online and befriend them, to share your thoughts, photographs, movies and much more. Even better when the community website is easy to login to …
First comprehensive tracking and analysis website for zero-day vulnerabilities
eEye Digital Security announced that it is offering the industry’s first vulnerability tracking site that focuses exclusively on zero-day vulnerabilities, or those …
Tips: Don’t give an identity thief the gift of your personal information
Whether you enjoy the hustle and bustle of shopping in stores or prefer the flexibility and convenience of online shopping, be careful to not give the gift of your personal …
BreachGate WebDefend web application firewall released
Breach Security announced the release of its BreachGate WebDefend Enterprise version 2.0 web application firewall. The new Enterprise version delivers a scalable enterprise …
The Truth About Patching
As arguments continue to rage about whether an agent-based or agentless patching technique is more effective, see which side you’re on after we dispel five common myths. …
Introduction to the Windows Management Instrumentation Command-line (WMIC)
It’s quite possible you’ve never heard of the Windows Management Instrumentation Command-line (WMIC), but this well kept secret command-line tool is immensely …
E-Mail Content Security: Filtering Out the Hype
E-mail is at risk – vulnerable to external attack from viruses, spam, spyware and phishing technologies. And vulnerable to abuse from within, which could result in: …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025