Help Net Security
Future air travel security risks, privacy and social implications
The European Network and Information Security Agency (ENISA) has analyzed the risks associated with a future air travel scenario, enabled with “Internet of …
iPhone unlocking tricks get PCs into trouble
A malware-spreading mechanism targeting the “iPhone unlocking” fans goes to prove that cybercrime is never short of imagination. This is how the story goes: you …
Endpoint data leak prevention still a major headache
More than one in three (38%) of respondents are still failing to deploy any form of data leak prevention, whether that be device control, endpoint DLP or DLP appliances. …
Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 available
Visual Studio 2010 and .NET Framework 4 have something for every developer. The new editor, now using Windows Presentation Foundation, supports concepts such as the use of …
Identity Management for the cloud: Taking the next step
Identity and Access Management (IAM) in its present do a pretty good job dealing with internal users and systems. Unfortunately, that isn’t what most companies really …
Rogue software details: Antivirus Suite
Antivirus Suite is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
New books: Windows Server 2008, Microsoft Forefront Threat Management Gateway
Windows Server 2008 Administrator’s Pocket Consultant, Second Edition includes coverage of Windows Server 2008 R2 enhancements, including Hyper-V with Live Migration, …
Week in review: Phone phishing, botnet monetization, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Insufficient employee security training for the cloud Despite …
Prevent unauthorized electronic fund transfers
Authentify released the ETF Verifier application which enables financial applications and payment platforms to alert legitimate account owners via phone whenever a new payee …
Hacking Web 2.0 JavaScript: Reverse engineering, discovery and revelations
Today, applications are becoming increasingly dependent on the Internet as a foundation platform. As the application domain increases worldwide, the variety of web content …
Rogue software details: Your Protection
Your Protection is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\Your …
Data breaches cost Australian companies millions
Australian organizations experience costly data breaches with the average organizational cost of a data breach, including activities intended to prevent a loss of customer or …