Help Net Security
Malware decreases, Trojans still dominate
According to data gathered by Panda Security, only 39 percent of computers scanned in February were infected with malware, compared to 50 percent last month. Trojans were …
iTunes 10.2 fixes multiple security vulnerabilities
iTunes 10.2 comes with several new features, improvements and security fixes. ImageIO libpng is updated to version 1.4.3 to address multiple vulnerabilities, the most serious …
Wireshark 1.4.4 released
Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. Wireshark 1.4.4 fixes the following vulnerabilities: …
SpyEye botnet activity surges
Fortinet announced its February 2011 Threat Landscape report, which details five zero-day vulnerabilities found in Cisco (FGA-2011-03), Adobe (FGA-2011-06) and Microsoft …
Cain & Abel 4.9.39 released
Cain & Abel is a password recovery tool for Microsoft operating systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted …
SANS Secure Europe: In-depth information security training
SANS Secure Europe Amsterdam is the second biggest event outside of the US offering 8 top level courses. What makes SANS Secure Europe Amsterdam a unique event is that these …
Workers expose businesses to malware and data loss
Organizations are at risk of malware as 76% of workers plug unknown USB flash drives into company PCs, potentially compromising corporate network security, according to …
Twitter 11.6 hours survey scam spreading virally
Twitter users should be vigilant following the outbreak of a scam that is spreading links from users’ accounts without their knowledge. The scam, which has already …
PDF-Pro multiple vulnerabilities
Several vulnerabilities in PDF-Pro can be exploited by malicious people to compromise a user’s system, according to Secunia. 1. The application loads libraries (e.g. …
Man sentenced to 82 months for malware
A New Hampshire man was sentenced in federal court for his role in an international computer hacking conspiracy and his failure to file income tax returns while living in …
Growing focus on endpoint security
90% of business leaders are investing in resources to better manage the security of their endpoints, including servers, PCs and laptops, according to IBM. Over half of those …
Nessus 4.4.1 released
The Nessus vulnerability scanner features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations