Help Net Security
Evidian announces PortalXpert 3.0
With new PortalXpert Web security software, Evidian demonstrates an unparalled capability for handling plug and play Access Control and SSO for all web applications. According …
Powerpuff Girls DVD Struck Down By Funlove
Sophos has learnt that a DVD from Warner Bros featuring new cartoon stars, the Powerpuff Girls, is infected by the FunLove virus. If the disc – called ‘Meet the …
F-Secure warns about Nimda.E network worm
F-Secure Corporation (HEX:FSC) is alerting computer users worldwide about a new version of the infamous Nimda worm. Nimda.E has been modified probably by the original author …
Sophos- Virus Top Ten for October 2001
This is the latest in a series of monthly charts counting down the ten most frequently occurring viruses as compiled by Sophos, a world leader in corporate anti-virus …
Console IOCTLs Under Linux
Console IOCTLs can be very useful and powerful. These are the IOCTls that involve the console. They are the user interface to manipulation of the console. I am going to go …
Which hat are you?
It was inevitable that the hacking scene be split into new sub categories with new terminology to represent the mentality of the world’s brightest hackers. A decade ago …
How can you spot a Hacker?
What defines a Hacker? What motivates a Hacker? A majority of people seem to have a vague understanding of what being a Hacker is all about. Is there an underground Hacker …
ATTRITION: Evolution
Definition Attrition.org is a non-profit hobby site run by a handful of volunteers in their free time. Each staff member at Attrition has a day job that takes a considerable …
Your Opinion: “What are the current privacy threats?”
In 2001 we held a survey on HNS regarding the current privacy threats. Many visitors decided to share their opinions with us, thank you. Listed below are some of the most …
Privacy, is it real?
In our daily lives a persons privacy is violated countless times. So many in fact, we tend to catch less and less of them as we become more desensitized. In the making of this …
The History Of Hacking
Nowadays, different people have different views on the hacking scene. Often times people of similar skill level have similar opinions. There is no official definition of a …
Social Engineering
The purpose of this text is to introduce or better explain the art of social engineering. This is one of the most difficult things to explain but I found a rather easy method …
Featured news
Resources
Don't miss
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025