Help Net Security
Cisco Press titles for new CCNP certification exams
Cisco Press, the official publisher to the CCNP exams, brings a portfolio of learning and preparation products to the new 2009 CCNP certification exams launched recently by …
Apache SpamAssassin 3.3.0 released
Apache SpamAssassin 3.3.0 is a mature, wide-spectrum, extensible email filtering package deployed by hundreds of thousands of organizations worldwide. Apache SpamAssassin …
Virus writers produce hardware damaging code?
BitDefender identified a new e-threat that combines the destructive behavior of a virus with the spreading mechanisms of a worm. There are two known variants of this virus, …
Devious ransom trojan takes data hostage
Taking data hostage is not a new invention in the world of cybercrime but a trojan currently infecting computers does it in a way that can leave the victim unaware that he has …
TechCrunch compromised by security exploit
Popular technology blog TechCrunch was compromised earlier today and their site was replaced by a message that links to a website offering assorted links to pirated material: …
Collection of penetration testing tools
Complemento is a collection of tools for penetration testing that has been included in BackTrack 4 Final LetDown is a TCP flooder that has an (experimental) userland TCP/IP …
Cybercrime increasing faster than company defenses
Cybercrime threats posed to targeted organizations are increasing faster than many organizations can combat them. Moreover, a new survey suggests the threat of cybercrime is …
Are online profiles a danger to privacy?
The rapid proliferation of the use of social networking sites among adults 45 and older increases the need for awareness and education surrounding identity theft stemming from …
New books: Beautiful Testing, Core Data, RESTful Java with JAX-RS
Beautiful Testing offers 23 essays from 27 leading testers and developers that illustrate the qualities and techniques that make testing an art. Through personal anecdotes, …
Data breach costs increase
The 2009 Ponemon Institute benchmark study examines the costs incurred by 45 organizations after experiencing a data breach. Results were not hypothetical responses; they …
Cloud computing brings changing security risks
Cloud-based services are fast becoming established as a credible alternative to existing server-based IT solutions but organizations are failing to recognize the new security …
Rogue software details: LiveProtection
LiveProtection is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption