Help Net Security
Understanding social engineering
At the heart of many of the malicious ploys that we see online is one underlying concept: social engineering. Deceptive social engineering tactics are interwoven throughout …
1 in 4 kids have tried hacking
Despite 78% agreeing that it is wrong, 1 in 4 of UK’s children have tried their hand at hacking into others’ Facebook accounts mostly by surreptitiously using the …
Rogue software details: Antivirus 7
Antivirus 7 is a rogue security application. In order to remove it, find out what files to look for below. Known system changes: Files c:\Desktop\Antivirus7.lnk …
Enterprise 2.0 privacy concerns in Europe
Transparent access to people and information is Enterprise 2.0’s great promise. It’s tempered, however, by a privacy risk that is especially sensitive in the …
Cloud-based rapid disaster recovery
Unitrends unveiled its Vault2Cloud disaster recovery service, monitored and managed through a simple, easy-to-use Web 2.0-based user interface. Vault2Cloud solves many of the …
Video: Nessus scan through a meterpreter session
Run a Nessus scan through a compromised host:
New release of RSA Data Loss Prevention Suite
With more than 70 new features for scanning, workflow, reporting, and global content processing, version 8.0 of the RSA Data Loss Prevention (DLP) Suite is engineered to allow …
Virtual PC Hypervisor vulnerability remains unpatched
Core Security issued an advisory disclosing a vulnerability that could affect large numbers of organizations and consumers using Microsoft’s Virtual PC virtualization …
FBI: Online fraud loss was $559 million in 2009
Online crime complaints increased substantially once again last year, according to a report about fraudulent activity on the Internet from the Internet Crime Complaint Center …
Intel launches its most secure data center processor
Combining security, performance and energy efficiency, Intel launched the Intel Xeon Processor 5600 series which deliver two new security features — Intel Advanced …
Six common virtualization security risks and how to combat them
Through 2012, 60 percent of virtualized servers will be less secure than the physical servers they replace, according to Gartner. Although they expect this figure to fall to …
Implement the SSH-2 protocol in pure Java
Ganymed SSH-2 for Java is a library which implements the SSH-2 protocol in pure Java (tested on J2SE 1.4.2 and 5.0). It allows one to connect to SSH servers from within Java …
Featured news
Resources
Don't miss
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities
- Why logs aren’t enough: Enhancing SIEM with AI-driven NDR