Help Net Security
Week in review: Smartphone security risks, botnet offering DDoS services, defense of the future Internet
Here’s an overview of some of last week’s most interesting news, interviews and articles: “Here you have” virus authors may be based in Spain …
Q&A: RSA Conference Europe 2010
Linda Lynch is the RSA Conference Europe Manager and in this Q&A she provides an overview of this year’s event. Where do you see RSA Conference Europe fit in the …
Seagate’s self-encrypting hard drive earns U.S. Government certification
Seagate’s Momentus Self-Encrypting Drive, the world’s first laptop hard drive with built-in encryption to protect against unauthorized access to information on …
80% of network attacks target web-based systems
2010 has brought the use of the Internet for conducting business to an all-time high; however, attacks continue to strike networks more than ever by using sophisticated …
Mobile tracking, remote phone locking and data wiping
Spare Backup launched Spare Mobile Security, a suite of software tools that provide users the means to remotely manage their mobile device. The suite includes five features: …
Facebook is the top source for malware infections
The use of social networking during working hours is common (77% of employees do), and consequently, 33% say they have been infected by malware corporate network that has been …
How bad are the web bad guys?
As the bad guys look for new ways to exploit holes in technology, they have become increasingly financially motivated, with organized crime picking up where the …
Secure file transfer with StuffIt Deluxe 2011
Smith Micro released StuffIt Deluxe 2011 for the Mac, which introduces StuffIt Destinations, a new drag-and-drop toolbar application designed to help users securely transfer …
Apple patches QuickTime for Windows
Apple released QuickTime 7.6.8 that patches two vulnerabilities affecting Windows 7, Vista, XP SP2 or later. An input validation issue exists in the QuickTime ActiveX control. …
Social engineering definitely a massive threat
A report by Social-Engineer.Org reveals some alarming information regarding a DEFCON CTF contest which included targets such as BP, Shell, Apple, Google, Microsoft, Cisco …
Run Nessus on your iPhone
Tenable released an iPhone application for its Nessus Vulnerability Scanner, providing Nessus users the ability to remotely connect to a Nessus server, launch scans and review …
ZBot removal tool
ZBot (also known as Zeus, ZeusBot or WSNPoem) is a Trojan engineered to steal sensitive data from compromised computers. While ZBot focuses mainly on the online banking …
Featured news
Resources
Don't miss
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations
- How to customize Safari for private browsing on iOS
- Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
- Swap EOL Zyxel routers, upgrade Netgear ones!