Help Net Security
The importance of metadata to prevent data leaks
A new IDC report highlights how the widespread use of collaborative content technologies is fueling the aggressive growth of unstructured and semi-structured data. While …
Security considerations bring Software-plus-service and Software as a Service to the enterprise
Software-plus-service (S+S) and Software-as-a-service (SaaS) are next-generation software solutions for a number of today’s applications. Implementation flexibility, …
Risk management cookbook
The Open Group Security Forum completed a major risk management initiative with the publication of the Cookbook for ISO/IEC 27005:2005 (registration required). The cookbook is …
Week in review: Trojan on official Android market, reset Gmail accounts and backdoor Mac OS X Trojan
Here’s an overview of some of last week’s most interesting news and articles: Moldovan fraud ring mastermind arrested A coordinated effort of the Irish gardai and …
Trojans still top malware threat
Continuing a trend observed since last summer, the same types of Trojan horse programs have persistently dominated the threat landscape through February, according to GFI …
Simple protection steps from credit card fraud
Every year, cybercriminals steal billions of dollars from unsuspecting computer users and companies by committing credit card fraud. Although this activity was once relegated …
Internet fraudsters jailed for online criminal forum
A group of young internet fraudsters who set up an online criminal forum which traded unlawfully obtained credit card details and tools to commit computer offences were jailed …
E-mail spam drops by half, search malware on the rise
Attackers are making a shift from using e-mail spam to more aggressively targeting the Internet, according to Barracuda Network. E-mail spam dropped by half during 2010, while …
Twitter crime rate rises 20 percent
Barracuda Labs analyzed more than 26 million Twitter accounts in order to measure and analyze account behavior. The analysis enabled researchers to model normal user behavior …
Malware decreases, Trojans still dominate
According to data gathered by Panda Security, only 39 percent of computers scanned in February were infected with malware, compared to 50 percent last month. Trojans were …
iTunes 10.2 fixes multiple security vulnerabilities
iTunes 10.2 comes with several new features, improvements and security fixes. ImageIO libpng is updated to version 1.4.3 to address multiple vulnerabilities, the most serious …
Wireshark 1.4.4 released
Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. Wireshark 1.4.4 fixes the following vulnerabilities: …
Featured news
Resources
Don't miss
- April 2025 Patch Tuesday forecast: More AI security introduced by Microsoft
- Forward-thinking CISOs are shining a light on shadow IT
- Inside the AI-driven threat landscape
- Ivanti VPN customers targeted via unrecognized RCE vulnerability (CVE-2025-22457)
- Attackers are leveraging Cisco Smart Licensing Utility static admin credentials (CVE-2024-20439)