Help Net Security
New book: “Surviving Cyberwar”
“Surviving Cyberwar” examines in depth the major recent cyber attacks that have taken place around the world, discusses the implications of such attacks, and …
New Facebook clickjacking attack
There is a new Facebook focused worm circulating around. Currently it seems that it doesn’t have any malicious payload, except spamming via posting messages to the …
Wi-Fi security patent granted for dynamic authentication and encryption
Ruckus Wireless has been granted a patent by the USPTO for an innovation that radically simplifies the configuration, administration and strength of wireless network security. …
More Facebook users hit by “distracting beach babes”
Sophos is warning Facebook users to be on their guard, after an attack this weekend designed to infect computers with adware. Hundreds of thousands of Facebook users are …
Google now supports encrypted search
Google just rolled out SSL encryption to Google Search. The option is currently in beta, therefore the users aren’t automatically transferred to https. Over the years, …
Week in review: Facebook privacy problems and web fingerprints
Here’s an overview of some of last week’s most interesting news, articles and interviews: Google encrypts Google Search Following the unintended collection of …
Surviving and recovering from network interruptions
Ongoing changes to network and security device configuration are unavoidable and necessary for business. But they are also risky. They can have unexpected consequences – …
iptables 1.4.8 released
iptables is the userspace command line program used to configure the Linux 2.4.x and 2.6.x IPv4 packet filtering ruleset. It is targeted towards system administrators. The …
New book: “Security on Rails”
You need to know how to defend yourself. Designing security into an application is a little like getting insurance. You know you really need it, you probably keep putting it …
Security process automation: Create order from chaos
As a boy I loved Lego. I’d use the red and green and white bricks that in those days came in just a few shapes, to construct houses, ships, cars and stairways that lead …
Office 2010 Beta impersonator is a Trojan
An e-mail with the subject “See Office 2010 Beta in action” uses an alleged Office 2010 Beta version used as bait. This enticing title accompanies a message which …
Rogue software details: ByteDefender
ByteDefender is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Featured news
Resources
Don't miss
- Hottest cybersecurity open-source tools of the month: November 2025
- Gainsight breach: Salesforce details attack window, issues investigation guidance
- New “HashJack” attack can hijack AI browsers and assistants
- Heineken CISO champions a new risk mindset to unlock innovation
- Small language models step into the fight against phishing sites