Help Net Security
How to prevent identity theft
Identity thieves use low-tech methods (stealing your wallet or even eavesdropping at key moments) as well as sophisticated Internet scams to rob people of their sensitive …
Rogue software details: XPPoliceAntivirus
XPPoliceAntivirus is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\XP …
Modification risks from portable devices
Software crackers are likely to continue modifying relatively low-cost specific-application devices, such as e-readers, but that the potential security risks to companies are …
Splunk 4.0.8 released
Splunk released version 4.0.8 of the Splunk IT search and analysis engine. General issues When you save a top or rare search with the argument showperc, the showperc argument …
Top 10 application security trends
The Denim Group has announced its guidance on the top application security trends for 2010. 1. Web mashup applications will result in new attack vectors Web applications …
Secure encrypted ruggedized mobile hard drive
Rocstore announced its new line of Rocsecure Commander 2 encrypted external hard drives. The first of its kind in ruggedized design, the Commander 2 series pocket drives are …
25 million new malware strains in one year
The outstanding trend of the last 12 months has been the prolific production of new malware: 25 million new strains were created in just one year, compared to a combined total …
iPhone network sniffer
Pirni is the worlds first native network sniffer for iPhone. The iPhone’s Wi-Fi has some major drawbacks in its hardware design, thus we can not properly set the device …
F-Secure protects smartphone data
F-Secure released its new standalone smartphone solution, Anti-Theft for Mobile which provides three useful security features to protect your phone: remote lock, remote wipe …
Automatic analysis of malware behavior
Malheur is a tool for automatic analysis of program behavior recorded from malware. It has been designed to support the regular analysis of malicious software and the …
Rogue software details: SpyEraser
SpyEraser is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Classification of weaknesses and attacks
The Web Application Security Consortium (WASC) released Threat Classification 2.0. The Threat Classification is an effort to classify the weaknesses, and attacks that can lead …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)