Help Net Security
How to wipe personal information off your mobile phone
People are unsuspectingly selling their personal information to complete strangers as a new report from CPP finds half (54%) of second hand mobile phones contain extensive …
Plagiarism detection tool
SAFE Corporation announced the release of DocMatch, a new tool for comparing all kinds of documents to find plagiarism. DocMatch compares thousands of document files in …
Infosecurity Europe 2011: New attack vectors change the landscape
The cybercrime landscape is changing with the overall cost to the UK economy estimated at £27bn per year, by a recent report by the Office of Cyber Security & …
Find and eliminate credit card data
Nearly two-thirds of merchant computer systems store unencrypted payment card data in violation of the PCI DSS, according to scans of more than 475 merchant networks of all …
Password cracking in the cloud
Passware Kit Forensic is commercial software that enables users to harness the power of cloud computing to accelerate password recovery. It allows the use of Amazon Elastic …
Linux Kernel ROSE multiple vulnerabilities
Some vulnerabilities have been reported in the Linux Kernel. These can be exploited by malicious, local users to cause a Denial of Service and potentially gain escalated …
Things to watch out for during tax season
Most people look forward to their refunds to pay for a nice vacation or pay off some debt. But when filing your taxes online, there are a number of ways you can lose that …
Initiative measures the harm of breached patient information
Healthcare organizations are struggling with two key concerns: how to protect patient information and how to better understand the financial harm caused when protected health …
Hitachi ID Management Suite 7.1.0 released
Hitachi ID Systems released version 7.1.0 of its ID Management Suite. The new release includes updates to Password Manager and a rebranded Privileged Access Manager, both with …
Second hand phones contain extensive personal data
People are unsuspectingly selling their personal information to complete strangers as a new report from CPP finds half (54%) of second hand mobile phones contain extensive …
McAfee to acquire Sentrigo
McAfee announced its intention to acquire Sentrigo, a provider of database security and compliance, assessment, monitoring and intrusion prevention solutions. The proposed …
63% of schools plagued by two IT security breaches a year
With 63 percent of schools experiencing malware outbreaks or unauthorized user access at least twice a year, the results of a Panda Security survey indicate that IT security …
Featured news
Resources
Don't miss
- SafeLine Bot Management: Self-hosted alternative to Cloudflare
- Windows NTLM vulnerability exploited in multiple attack campaigns (CVE-2025-24054)
- Apple plugs zero-day holes used in targeted iPhone attacks (CVE-2025-31200, CVE-2025-31201)
- When AI agents go rogue, the fallout hits the enterprise
- Inside PlugValley: How this AI vishing-as-a-service group operates