Help Net Security
Declining confidence in social networking security
Consumer awareness of phishing attacks has doubled between 2007 and 2009 and the number of consumers who reported falling prey to this attack increased six times during that …
Rogue software details: Windows Security Suite
Windows Security Suite is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Folders …
Encryption challenge worth $100K
News that am encrypted swiss army knife from manufacturers Victorinox remained uncracked – and a $100,000 prize went unclaimed – at the Consumer Electronics Show …
Nmap 5.20 released
Nmap is a free and open source utility for network exploration or security auditing. Nmap 5.20 offers more than 150 significant improvements: 30+ new Nmap Scripting Engine …
Analysis of 32 million breached passwords
Imperva released a study analyzing 32 million passwords exposed in the Rockyou.com breach. The data provides a unique glimpse into the way that users select passwords and an …
Mac OS X Snow Leopard common criteria certification
Atsec information security announced the successful common criteria certification of Mac OS X Snow Leopard at EAL 3 (augmented for flaw remediation) with the Controlled Access …
Critical Shockwave Player vulnerabilities patched
Critical vulnerabilities have been identified in Adobe Shockwave Player 11.5.2.602 and earlier versions, on the Windows and Macintosh operating systems. The vulnerabilities …
4,500 USBs left at dry cleaners
A survey reveals that in the last year, 4500 memory sticks have been forgotten in people’s pockets as they take their clothes to be washed at the local dry cleaners. …
FBI Director to chronicle the evolution of cyber threats at RSA Conference 2010
Robert Mueller, Director of the Federal Bureau of Investigation, will deliver a keynote address at RSA Conference 2010. Mueller’s keynote will detail cyber threats …
Rogue software details: ArmorDefender
ArmorDefender is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Three-factor authentication using voice biometrics
PhoneFactor announced biometric verification for its phone-based authentication platform. By leveraging an existing voice channel, the new offering simultaneously verifies …
Serious Mac OS X vulnerabilities patched
Apple released Security Update 2010-001 which improves the security of Mac OS X. CoreAudio A buffer overflow exists in the handling of mp4 audio files. Playing a maliciously …
Featured news
Resources
Don't miss
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities
- Why logs aren’t enough: Enhancing SIEM with AI-driven NDR
- Aim for crypto-agility, prepare for the long haul