Help Net Security
Mobile workforce shift will cause security headache
A recent iPass report highlights the rising numbers of workers are moving to a truly mobile working environment confirms what many in the IT security industry have suspected …
Security monitoring: Having vision for the future
Security attacks such as website hacking, security breaches and malware threats are all becoming increasingly common and sophisticated in design. The latest high-profile …
Cloud based Web application security assessment
Cenzic released ClickToSecure Cloud, a self-service, completely cloud based Web application security assessment solution. With this new cloud platform, Cenzic has created open …
International Secure Systems Development Conference
The International Secure Systems Development Conference, taking place in London during May 2010, addresses the key issues around designing-in security for standard and …
How to avoid rogue security software
What can you do to help prevent the spread of rogues and make sure that rogue software vendors stop profiting from their unscrupulous business? Follow these tips below to tell …
Attackers focusing on capturing personal data
Online criminals are garnering greater success with increased technical sophistication affecting a wider range of industries. With greater diversity and the use of targeted …
Hackers follow the money, IBM research shows
Existing threats such as phishing and document format vulnerabilities have continued to expand, even as users improve security, according to a new IBM report. The X-Force …
Protect Mac applications against piracy and malicious attacks
As the Mac platform continues to gain popularity, attackers are increasingly exploiting weaknesses in Mac OS X applications to invade end-user systems. This exploitation leads …
Worm spreads on Fotolog social networking website
PandaLabs has reported the appearance of a new worm, FTLog.A, which spreads through the popular Fotolog social networking site. This foto-blogging portal is used by almost 30 …
Is 2010 the year of the cloud?
Research by Resource on Demand claims to show the company has been receiving a record number of enquiries for salesforce and SaaS specialists during the first month of the …
Video: This you???? Twitter phishing attack demonstrated
A phishing attack on Twitter asks “This you????” and links to a bogus login page. Here’s a video from Sophos that shows how it works:
Rogue software details: TrustFighter
TrustFighter is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Featured news
Resources
Don't miss
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities
- Why logs aren’t enough: Enhancing SIEM with AI-driven NDR
- Aim for crypto-agility, prepare for the long haul