Help Net Security
Web browsers leave ‘fingerprints’ as you surf
An overwhelming majority of web browsers have unique signatures – creating identifiable “fingerprints” that could be used to track you as you surf the …
Cryptmount: Create and manage secure filing systems on Linux
Cryptmount is a utility for GNU/Linux operating systems which allows an ordinary user to mount an encrypted filing system without requiring superuser privileges. It is aimed …
Rogue software details: CyberSecurity
CyberSecurity is a rogue security application. In order to remove it, find out what files to look for below. Known system changes: Files c:\Desktop\Cyber Security.lnk Folders …
A closer look at Carbon Copy Cloner
If you care about your data, you should consider backups as essential, not just important. Apple did a lot for the average user with the introduction of Time Machine, but …
Anonymity, privacy and circumvention with Tor
Below you can watch Jake Appelbaum’s presentation from SOURCE Boston 2010.
AT&T and McAfee offer secure e-mail gateway
As spam and other e-mail security threats continue to inundate organizations’ daily operations, AT&T has announced a new network-based solution, AT&T Secure …
Linux 2.6.34 released
Linux 2.6.34 has been released. This version adds two new filesystem, the distributed filesystem Ceph and LogFS, a filesystem for flash devices. Other features are a driver …
Facebook users hit by video attack
Facebook users should be wary following a video attack on users this weekend designed to infect computers with adware. Thousands have been hit by the attack which posted a …
Week in review: KHOBE attack, Facebook security and the biggest phishing crime syndicate
Here’s an overview of some of last week’s most interesting news and articles: phpnuke.org compromised, serving exploits PHP-Nuke is a popular Web content …
Twitter-controlled botnet SDK at large
Huge armies of zombified computers unanimously executing the commands sent by their master – that’s what comes in the mind of a computer user at the sound of the …
Black swans, secure access and business continuity
If you’d looked through the contingency plans of the world’s top 500 companies in March of this year, it’s unlikely you’d have found a scenario that …
Real-world data on software security initiatives
Cigital announced an updated release of the “Building Security In Maturity Model” (BSIMM) study, which significantly expands the data defining benchmarks for …