Help Net Security
Trend Micro launches Titanium 2011 security software
Trend Micro released Titanium Security 2011 that utilizes a cloud-client strategy that combines cloud-based web, email, and file reputation services with Trend Micro’s …
International variations in online threat perception
How do computer users around the world view online security risks? A survey by F-Secure reveals some interesting international variations in people’s experiences and …
The emotional impact of cybercrime
A new study by Norton reveals the staggering prevalence of cybercrime: 65% of Internet users globally, and 73% of U.S. Web surfers have fallen victim to cybercrimes, including …
Safari 5.0.2 addresses three vulnerabilities
Safari 5.0.2 includes improvements to performance, stability, and security. A search path issue exists in Safari. When displaying the location of a downloaded file, Safari …
How black hat spam SEO works
For some time, attackers have leveraged Search Engine Optimization (SEO) techniques in order to promote malicious web content targeting end users. Google has researched this …
Firefox 3.6.9 fixes numerous security issues
Mozilla released Firefox 3.6.9 that fixes several security issues as well as stability issues. Miscellaneous memory safety hazards Mozilla developers identified and fixed …
Phishers exploit HMRC tax error refund
Tax authorities in the UK are in the process of contacting millions of people, telling them that they have paid the wrong amount of tax. As members of the public wait to be …
Sourcefire integrates with Qualys
Sourcefire announced an integration with QualysGuard. To support increased product collaboration, Sourcefire is delivering a new Qualys Connector, which associates threats …
AuthenTec and UPEK to merge
AuthenTec, a provider of security, identity management and touch control solutions, and UPEK, a supplier of fingerprint solutions, announced that the companies have combined, …
TrueCrypt 7.0a released
TrueCrypt 7.0a has been released. This version contains a workaround for a bug in some custom (non-Microsoft) drivers for storage device controllers that caused a system crash …
Wireless car hacking due to poor security
Research from the University of California San Diego and the University of Washington – and which concludes that modern cars are susceptible to wireless hacking – …
Every week 57,000 fake Web addresses try to infect users
Every week, hackers are creating 57,000 new Web addresses which they position and index on leading search engines in the hope that unwary users will click them by mistake. …
Featured news
Resources
Don't miss
- Report: The State of Secrets Sprawl 2025
- APTs have been using zero-day Windows shortcut exploit for eight years (ZDI-CAN-25373)
- Moving beyond checkbox security for true resilience
- Dependency-Check: Open-source Software Composition Analysis (SCA) tool
- Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK