Help Net Security
Rogue software details: WiniFixer
WiniFixer is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
SecureCloud 2010: The future of cloud security
SecureCloud 2010 is a premier educational and networking event hosted by ENISA, the Cloud Security Alliance and ISACA, three of the leading organizations shaping the future of …
Week in review: critical IE security issues, cybercrime increase and Facebook risks
Here’s an overview of some of last week’s most interesting news and interviews: Blippy, a great service for phishers? Blippy, a new service that lets you twitter …
New Google Chrome security features
The latest release of Google Chrome has integrated five new security features that “make it easier for developers to build secure web sites,” writes Adam Barth, …
Top 5 online privacy tips
Increasingly sophisticated spam and an ever-changing array of new email-borne malware continue to have a huge impact on the growing levels of loss of sensitive and personal …
Ultra-secure USB flash drive from Kingston
Kingston released the DataTraveler 5000 USB Flash drive which is FIPS 140-2 Level 2 certified with Level 3 pending, and features 256-bit AES hardware-based encryption. The …
Critical IE security issues to be detailed at Black Hat DC 2010
At the Black Hat DC 2010 conference Core SCS Security Consultant Jorge Luis Alvarez Medina will demonstrate cutting-edge browser manipulation techniques that can allow for …
RSA Conference 2010 keynote lineup
RSA Conference 2010 announced its keynote speaker lineup for the March event in San Francisco. As interest continues to swirl around cloud computing and the popularity of …
The age of cyberwar
McAfee revealed the staggering cost and impact of cyberattacks on critical infrastructure such as electrical grids, oil and gas production, telecommunications and …
Rogue software details: PcSecureNet
PcSecureNet is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Phishing attacks account for more than one in two viruses
More than half (55.59 per cent) of all malware sent on email is an attempted phishing attack, according to analysis of malware in January 2010 by Network Box. Phishing attacks …
Information security guidelines for the healthcare industry
SecureWorks recommends the guidelines outlined below. Security risk assessments Performing regular security risk assessments will give your organization a much better …
Featured news
Resources
Don't miss
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities
- Why logs aren’t enough: Enhancing SIEM with AI-driven NDR
- Aim for crypto-agility, prepare for the long haul