Help Net Security
Unlike popular belief, short links on Twitter aren’t malicious
Twitter recently announced that it has implemented a new security system to scan all URLs posted in tweets to protect users from malicious sites. This follows a similar …
New Linksys wireless routers
Cisco unveiled a new line of Linksys wireless routers, designed to let its core audience of tech experts and enthusiasts take their home networking experience to the next …
Blackhat SEO techniques
The business of using blackhat Search Engine Optimization (SEO) techniques to impregnate legitimate sites has become a huge money-spinner for cybercriminals. Every day scores …
Social networking risks under little control
While social media is pervasive in organizations worldwide, usage has far outpaced controls, according to the latest study conducted by Palo Alto Networks. The degree of …
Beware targeted attacks around tax season
With the tax filing deadline less than three weeks away, we’re entering the busiest time of the tax season according to the IRS. Last year, almost 95 million people …
Root issues causing software vulnerabilities
A survey on software security assurance conducted during the Security B-Sides conference shows 50% of software companies say security is “always a concern.” More …
Korea becomes world’s biggest malware producer
Korea has taken over from the US as the world’s largest producer of Internet viruses, according to analysis of internet threats in March by Network Box. Korea now …
Microsoft releases out-of-cycle IE security patch
Microsoft released a cumulative security update which resolves nine privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most …
15 years of Infosecurity Europe
In this podcast, Laura Heather, Marketing Manager for Infosecurity Europe gives an update on this year’s event, which will be opening its doors on the 27th of April in …
Break TrueCrypt hard drive encryption quickly
The latest version of Passware Kit Forensic has become the first commercially available software to break TrueCrypt hard drive encryption without applying a time-consuming …
What’s your SEO poison?
Search engine optimization (SEO) poisoning is an increasingly popular method of attack for cybercriminals and one that shows they are using more sophisticated techniques. In …
61% of new threats are banker Trojans
PandaLabs published its report analyzing the IT security events and incidents of the first three months of the year. The amount of new malware in circulation has continued to …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption