Help Net Security
Week in review: Poisoned Japan earthquake search results, open source exploit kit and new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news and articles: The importance of metadata to prevent data leaks A new IDC report highlights how the …
Best practices for identity theft services
With security breaches and identity theft cases frequently in the news, consumers are worried about becoming identity theft victims. Responding to this concern, dozens of …
Brain: Searching for the first PC virus in Pakistan
Here is a 10-minute video reportage about Mikko Hypponen’s trip to Lahore, Pakistan, to find the authors of the first PC virus “Brain”. This is the first …
Most sites are exposed to at least one vulnerability each day
The average website has serious vulnerabilities more than nine months of the year and data leakage has over taken cross site scripting as the most common website …
GFI MAX MailArchive released
GFI Software launched GFI MAX MailArchive, a hosted service which allows businesses to archive email messages to geographically distributed datacenters for future search, …
Cloud streamlines efficiency of identity theft
Working with cloud-based services significantly improves economies of scale – for cybercriminals too, according to Commtouch. Phishers are already benefiting from free …
Tips for healthcare organizations to improve their security profile
Based upon extensive work in both healthcare IT and information security, CDW Healthcare has identified preliminary steps for healthcare organizations focused on improving …
SANS gets ready for Amsterdam
SANS Secure Europe, one of the region’s largest infosec training events is returning to Amsterdam’s Radisson Blu Hotel from 9th-21st May with 2 weeks of technical, …
Apple iOS 4.3 fixes security issues
The iOS 4.3 update contains new features, improvements, security and bug fixes. CoreGraphics Multiple vulnerabilities existed in FreeType, the most serious of which may lead …
Restrictive e-mail policies: Hidden security risks for business
IT departments are fighting a losing battle in seeking to constrain employees’ behavior through policy alone, according to Mimecast. Findings suggest that a new approach …
March Patch Tuesday details
In the video below, Qualys CTO Wolfgang Kandek and Qualys vulnerability labs manager Amol Sarwate discusses this month’s Microsoft Patch Tuesday release.
Multiple vulnerabilities in Google Chrome
Multiple vulnerabilities have been reported in Google Chorme, according to Secunia. Some have an unknown impact while others can be exploited by malicious people bypass …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations