Help Net Security
Computer pranks that simulate Trojan infections are invading the Web
As Halloween approaches, applications, fake websites, spam and Trojans all put on a disguise to try to trick users. PandaLabs has been detecting attacks like these since …
Most Americans support an Internet kill switch
Sixty-one percent of Americans said the President should have the ability to shut down portions of the Internet in the event of a coordinated malicious cyber attack, according …
CloudAudit joins the Cloud Security Alliance
The Cloud Security Alliance (CSA) announced that CloudAudit has become an official project of the CSA, with the joint mission of promoting the use of best practices for …
.com is the most dangerous domain
The world’s most heavily trafficked web domain, .COM, is now the riskiest, according to McAfee’s “Mapping the Mal Web” report released today. Fifty-six …
Breaking web browsers
In the video below, Jeremiah Grossman, the founder and CTO of WhiteHat Security, talks about breaking web security. The video was recorded at the OWASP AppSec USA 2010 conference.
80% of firms don’t know who should secure cloud data
The cloud is still akin to the Wild West when it comes to the security of the data hosted there, according to Courion. In fact, 1 in 7 companies admit that they know there are …
One-touch secure access to corporate data
Check Point announced its new Mobile Access Software Blade that delivers fast and secure access to corporate email, data and business applications from mobile devices. It …
Facebook users are voyeuristic while at work
There are several realities that typically fall outside of the approved enterprise communications mechanisms. These applications can enhance business responsiveness and …
Ubuntu Privacy Remix 10.04r1 released
Ubuntu Privacy Remix is a modified Live-CD based on Ubuntu Linux. UPR is not intended for permanent installation on hard disk. The goal of Ubuntu Privacy Remix is to provide …
Avalanche spam gang uses ZeuS to boost earnings
Reports that the world’s most prolific phishing gang have diversified their operations over from conventional phishing emails to distributing the ZeuS Trojan is another …
Most users still vulnerable to attacks that exploit Java flaw
More than a week after Oracle released a critical patch for Java, more than 68% percent of Internet users are still vulnerable to attacks that exploit these vulnerabilities, …
Riverbed acquires CACE Technologies
Riverbed Technology announced the acquisition of CACE Technologies, a leader in packet capture and analysis products for wireless and wireline networks and the corporate …
Featured news
Resources
Don't miss
- Critical Veeam Backup & Replication RCE vulnerability fixed, patch ASAP! (CVE-2025-23120)
- RansomHub affiliate leverages multi-function Betruger backdoor
- Kali Linux 2025.1a drops with theme refresh, Kali NetHunter updates
- 5 pitfalls that can delay cyber incident response and recovery
- How healthcare CISOs can balance security and accessibility without compromising care