Help Net Security
Week in review: Exploitable PDF feature, Google phishing detection and Facebook privacy changes
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 90% of critical Windows 7 vulnerabilities are mitigated by …
Beware fake eBay security alert
Red Condor issued a warning of a new blended email threat that appears to be a security alert from eBay. The email message with the subject line “eBay Procedural Warning …
Botnets drive the rise of ransomware
Ransomware is the dominating threat with nine of the detections in the malware top ten list resulting in either scareware or ransomware infesting the victim’s PC. …
OSSEC 2.4 released
The OSSEC team is pleased to announce the general availability of OSSEC version 2.4. There are lots of new features and bug fixes, but these are the main changes: Added daily …
Trojans are the most constant infectious vector
The generic mechanism that spreads using removable devices – Trojan.AutorunInf.Gen – is the top e-threat for March with 13.40 percent of the total amount of global …
Games on social networks increase spam and phishing by 50%
In order to reach high scores, social entertainment applications require users to gather a considerable number of friends and supporters to play the same game, leading to …
Wireshark 1.2.7 released
Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. The following bugs have been fixed: SNMPv3 Engine ID …
Advice on securing Web applications
In this podcast, Cenzic’s Mandeep Khera talks about the latest trends in Web application security. According to their latest report, 80 percent of published …
Evolving malware attack strategies exploit online user behavior
The popularity of social networking services and changes in online user behavior are driving broader attack strategies, including complex blended threats, faster malware …
Rogue software details: BraveSentry
BraveSentry is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Swiss privacy: Myth or reality?
How is privacy impacting Swiss banks? It’s time for a change according to Dr. David Costa, Professor at Robert Kennedy College who comments on Bloomberg TV.
QuickTime 7.6.6 fixes security issues
Here is the security content related to QuickTime 7.6.6, available for download here. Playing maliciously crafted audio content may lead to an unexpected application …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption