Help Net Security
Anti-keylogger plugin for Microsoft Internet Explorer
A browser plugin named KeyScrambler was recently released by Florida startup QFX Software. The Personal edition is free for download at the company’s website and it …
10 steps to fortify the security of your MySQL installation
For those who wish to enhance or fortify the security of the MySQL installation the following technical 10 steps are a good start. Step 1: Run MySQL in a chroot jail Chroot …
Weekly Report on Viruses and Intruders – Oscarbot.KD worm and the Nabload.JC and Banker.EEA Trojans
Oskarbot.KD is the first malicious code to infect systems by exploiting the Microsoft MS06-040 vulnerability. According to information from PandaLabs, Oscarbot.KD searches for …
Miami man accused of creating hurricane Katrina phishing website
IT security firm, Sophos, is reminding computer users of the dangers of identity theft as a 20-year-old man is charged in relation to a phishing website which claimed to …
Popcorn.net replaces MoviePass, costs victims as much as $359.88
A new variant of an old spyware infection was discovered this morning by the Schrock Innovations research department called Popcorn.net. Popcorn.net replaces the well known …
Vulnerability of Passmark Sitekey at Bank of America reported
Sestus Data Corporation announced today the discovery of a vulnerability of the Passmark Sitekey login approach at Bank of America that could permit an attacker to remotely …
Fake BBC report spreads Berlusconi death claim and malicious trojan
IT security firm Sophos is warning users about a new Trojan horse that has been spammed out to email addresses disguised as a breaking BBC news report claiming the death of …
Panda Software launches GateDefender Integra
Panda Software presents the new Panda GateDefender Integra, an all-in-one appliance for protecting against all types of threats. It offers excellent performance, a low cost of …
Assessing Java Clients with the BeanShell
Assessing the security of Java applications, and particularly client-server applications, can be a tedious process of modifying the code, compiling, deploying, testing and …
What Should Businesses Require of Data Protection Solutions?
Data protection today is one of the most innovative and fast-moving areas of Information Technology. Data protection technology developers have, in recent years, engaged in …
DOJ Deploys AppSecInc’s vulnerability assessment technology
Application Security announced that the United States Department of Justice (DOJ) is utilizing the company’s vulnerability assessment scanner, AppDetective to reduce and …
Sensitive information can still be found on second hand disks
BT, the University of Glamorgan in Wales and Edith Cowan University in Australia today issued a report based on research to determine whether second hand computer disks that …
Featured news
Resources
Don't miss
- LLMs can boost cybersecurity decisions, but not for everyone
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!