Help Net Security
4,500 USBs left at dry cleaners
A survey reveals that in the last year, 4500 memory sticks have been forgotten in people’s pockets as they take their clothes to be washed at the local dry cleaners. …
FBI Director to chronicle the evolution of cyber threats at RSA Conference 2010
Robert Mueller, Director of the Federal Bureau of Investigation, will deliver a keynote address at RSA Conference 2010. Mueller’s keynote will detail cyber threats …
Rogue software details: ArmorDefender
ArmorDefender is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Three-factor authentication using voice biometrics
PhoneFactor announced biometric verification for its phone-based authentication platform. By leveraging an existing voice channel, the new offering simultaneously verifies …
Serious Mac OS X vulnerabilities patched
Apple released Security Update 2010-001 which improves the security of Mac OS X. CoreAudio A buffer overflow exists in the handling of mp4 audio files. Playing a maliciously …
81% of organizations lack visibility into network traffic
According to a new research report by Enterprise Management Associates, insufficient network monitoring coverage is a pervasive and growing problem among enterprises, …
Scammers aggressively targeting Haiti donations
A week after the devastating Haiti quake, scammers are working harder than ever to exploit the good will of people that want to help the victims by giving donations. The FBI …
Data security for Mac users
PGP announced the latest version of PGP Desktop for Mac which now also supports Boot Camp, so users can have complete protection for machines running dual Mac OS X and Windows …
Worldwide infrastructure security
Arbor Networks, in cooperation with the Internet security operations community, has completed the fifth edition of an ongoing series of annual operational security surveys. …
Patch management simplified
Patching of vulnerable software, in particular third party software, which isn’t supported by Microsoft WSUS, has been a cumbersome and resource demanding process, …
Rogue software details: Win Security 360
Win Security 360 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\Win …
IT budgets in 2010 to be at 2005 levels
IT budgets will essentially be flat in 2010, increasing by a weighted global average of 1.3 percent in nominal terms, compared with 2009 levels where IT budgets declined 8.1 …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground