Help Net Security
2010: A good year for fighting cybercrime?
McAfee Labs believes cybercriminals will target social networking sites and third-party applications, use more complex Trojans and botnets to build and execute attacks, and …
Phishers prefer Paypal, Visa, eBay and Amex
Compared to the first half of 2009, the amount of phishing messages has remained relatively unchanged, although phishers have switched their focus to institutions that could …
E-threats shifting with current events
Malware writers have preserved their focus on web-based attacks while actively looking for new methods to disseminate their products. BitDefender released the results of its …
Twitter bans obvious passwords
An applause for Twitter which has recently made it so that when you sign up for an account you can’t use one of those very obvious passwords. Here is a list of these …
Rogue software details: KeepCop
KeepCop is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\ProgramFiles\KeepCop …
Greatest security threats to education
With education-related cyber-security threats expected to rise in 2010, WatchGuard is predicting the top threats facing schools, colleges and universities. Top threats …
Metasploit Framework 3.3.3 comes with exploit rankings
The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration …
Credit card provider suffers breach, personal data lost
MBNA, the UK’s largest credit card provider, has confirmed that a laptop containing the personal details of its customers has been stolen from one of its third party …
Is code auditing of open source apps necessary before deployment?
Following Sun Microsystems’ decision to release a raft of open source applications to support its secure cloud computing strategy, companies may be wondering if they …
FBI estimates losses of over $150 million to rogue anti-virus
Tthe Internet Crime Complaint Center, a partnership between the FBI and the National White Collar Crime Center (NW3C), reported that “the FBI is aware of an estimated …
Rogue software details: DataDoctor2010
DataDoctor2010 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
2010 data security trends: External attacks from the inside
Sentrigo announced its top data security trends to watch for in 2010. A new type of threat: External attacks from the inside Generally, companies have viewed attacks as either …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)