Help Net Security
Koobface worm doubles its number of command and control servers
The shut down and recovery of the Troyak-as command and control center (C&C) for the active Zeus botnet was good news for the whole IT security community. Unfortunately, …
It’s time to embrace the shift to the cloud
The software industry is entering another age of astonishing innovation. It’s a time when not only software is advancing at a fast pace, but so too are hardware devices …
File sharing networks open door to identity theft
According to the Washington Post, in any given second, nearly 22 million people around the globe are on peer-to-peer file-sharing networks downloading and swapping movies, …
Employees continue to put data at risk
According to a Ponemon Institute study, business managers continue to pose the greatest threat to sensitive company information such as customer records, health information …
13m users worldwide affected by Mariposa botnet
Following the worldwide shutdown of the Mariposa botnet last week, Panda Security reported today that the massive botnet had infected 13 million computers in 190 countries and …
Most malicious websites are hosted in the US
AVG Technologies unveiled the results of a research study which shows that – contrary to popular opinion – most malicious websites are hosted on US servers and not …
9 million ZeuS attacks blocked in the last 6 months
Trend Micro has seen a recent rise in average of around 300 unique ZeuS samples per day, according to a recent threat report that examines the Eastern European criminal …
Human exploit attacks surpass the software flaw approach
Barracuda Labs released its annual report for 2009, in which they highlight the shifts in Internet user behavior and the resulting attacker trends. Twitter Throughout 2009, …
Eight vulnerabilities fixed, one IE 0-day warning for Patch Tuesday
After last month’s mammoth Patch Tuesday release, administrators will be glad to know that this month Microsoft delivers only 2 bulletins that fix 8 vulnerabilities …
An introduction to virtualization security
Virtualization platforms are software. All software has flaws. Therefore, virtualization platforms have flaws. Simple logic, right? The major virtualization platform vendors, …
Email security trends
Proofpoint announced findings from a survey of 122 RSA Conference 2010 attendees, conducted at its exposition booth, about email security trends. Key findings from the survey …
Remote access app for iPhone and iPod touch
TeamViewer released TeamViewer and TeamViewer Pro iPhone. Designed for iPhone or iPod touch, from versions 2.2.1 and newer, the applications access or control remote Windows …
Featured news
Resources
Don't miss
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities
- Why logs aren’t enough: Enhancing SIEM with AI-driven NDR
- Aim for crypto-agility, prepare for the long haul