Help Net Security
Too many disclose sensitive information on social networks
Social networking users should be careful when accepting friend requests and to be conscious of the data they share. According to a new study by BitDefender, social network …
Week in review: New data breach legislation, cloud hacking and the return of the Alureon rootkit
Here’s an overview of some of last week’s most interesting news and articles: Trojan simulates MS Security Essentials Alert, peddles fake AV A Trojan imitating a …
Network security challenges faced by universities
Striking a balance between an open yet secure network remains a challenge for university IT departments. While universities are often on the cutting edge of innovation, they …
Private cloud automation platform
Quest Software released Cloud Automation Platform 7.5, its enterprise-class cloud automation and management technology. New features include: Instant cloud insight with the …
Building secure software using fuzzing and static code analysis
The increased complexity of new technologies and faster software release cycles are making traditional reactive security solutions ineffective. Instead, more adaptable, …
25% of new worms are designed to spread through USB devices
In 2010, 25 percent of new worms have been specifically designed to spread through USB storage devices connected to computers, according to PandaLabs. These types of threats …
Major fake anti-virus attack spreading
Computer users should be cautious in the wake of a widespread spam campaign designed to infect users with fake anti-virus products. If recipients open HTML files attached to …
Secure wireless access points from SonicWALL
SonicWALL released two new secure wireless access points – the SonicPoint-Ni and SonicPoint-Ne. Designed for enterprises, SMBs and distributed wireless networks, the new …
Top 10 best practices for payment application companies
Visa announced global industry best practices for payment application vendors, integrators and resellers that implement, install or manage payment-related systems on behalf of …
Adobe closes critical vulnerabilities in Shockwave Player
Critical vulnerabilities have been identified in Adobe Shockwave Player 11.5.7.609 and earlier versions on the Windows and Macintosh operating systems. The vulnerabilities …
The dramatic increase of vulnerability disclosures
Vulnerability disclosures are increasing dramatically, having reached record levels for the first half of 2010, according to the IBM X-Force 2010 Mid-Year Trend and Risk …
Nearly 3 million undetected “Hot Video” pages pushing fake AV
We’ve seen many fake YouTube pages redirecting to fake antivirus software downloads in the past. However, we’re now seeing this same phenomenon with a new twist: …
Featured news
Resources
Don't miss
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations
- How to customize Safari for private browsing on iOS
- Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
- Swap EOL Zyxel routers, upgrade Netgear ones!