Help Net Security
Weekly Report on Viruses and Intruders – Oscarbot.KD worm and the Nabload.JC and Banker.EEA Trojans
Oskarbot.KD is the first malicious code to infect systems by exploiting the Microsoft MS06-040 vulnerability. According to information from PandaLabs, Oscarbot.KD searches for …
Miami man accused of creating hurricane Katrina phishing website
IT security firm, Sophos, is reminding computer users of the dangers of identity theft as a 20-year-old man is charged in relation to a phishing website which claimed to …
Popcorn.net replaces MoviePass, costs victims as much as $359.88
A new variant of an old spyware infection was discovered this morning by the Schrock Innovations research department called Popcorn.net. Popcorn.net replaces the well known …
Vulnerability of Passmark Sitekey at Bank of America reported
Sestus Data Corporation announced today the discovery of a vulnerability of the Passmark Sitekey login approach at Bank of America that could permit an attacker to remotely …
Fake BBC report spreads Berlusconi death claim and malicious trojan
IT security firm Sophos is warning users about a new Trojan horse that has been spammed out to email addresses disguised as a breaking BBC news report claiming the death of …
Panda Software launches GateDefender Integra
Panda Software presents the new Panda GateDefender Integra, an all-in-one appliance for protecting against all types of threats. It offers excellent performance, a low cost of …
Assessing Java Clients with the BeanShell
Assessing the security of Java applications, and particularly client-server applications, can be a tedious process of modifying the code, compiling, deploying, testing and …
What Should Businesses Require of Data Protection Solutions?
Data protection today is one of the most innovative and fast-moving areas of Information Technology. Data protection technology developers have, in recent years, engaged in …
DOJ Deploys AppSecInc’s vulnerability assessment technology
Application Security announced that the United States Department of Justice (DOJ) is utilizing the company’s vulnerability assessment scanner, AppDetective to reduce and …
Sensitive information can still be found on second hand disks
BT, the University of Glamorgan in Wales and Edith Cowan University in Australia today issued a report based on research to determine whether second hand computer disks that …
Worms exploit critical Microsoft security vulnerability
Sophos is warning computer users of malware that is exploiting a critical security vulnerability in Microsoft software, and urging companies to roll-out security patches as a …
Mac Password Generator 1.0 released
Password Generator is a Mac OS X application that allows users to generate strong passwords for all their accounts. Of significant note, this release allows users to customize …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)