Help Net Security
Understanding the risks of cloud computing: Questions to ask your service provider
Cloud computing has changed the audit and risk profile of data systems in most organizations. Whilst the economics of going down the cloud route for data storage are highly …
Controlled access Web portals now prime target of cybercriminals
As news of the Guardian web site hack broke on Sunday, identity information on consumers and companies continues to be a prime target for criminal hackers. “As we …
Video: Online privacy – Industry self-regulation in practice
In this video, Aleecia M. McDonald speaks about industry self-regulation for online privacy. What is the user burden if people read online privacy policies? How long would it …
Nigeria shuts down 800 scam websites
The Nigerian Economic and Financial Crimes Commission has shut down no fewer than 800 scam websites and arrested members of 18 syndicates behind the fraudulent scheme in a …
Snort 2.8.5.1 released
Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol …
96 percent of Americans in favor of video surveillance to counteract terrorism
A recent Harris Poll survey indicates that 96 percent of U.S. citizens feel the federal government and law enforcement agencies should be able to use video surveillance in an …
Botnets dominate click fraud
Click Forensics released advertising audience quality figures for the third quarter 2009. Traffic across more than 300 ad networks is reflected in the data. Key findings for …
CentOS 5.4 released
Enterprise-class Linux distribution CentOS 5.4 for i386 and x86_64 architectures is now available. CentOS has numerous advantages over some of the other clone projects …
Anti-virus programs certified for Windows 7
ICSA Labs, an independent division of Verizon Business, has certified five vendors in detection and cleaning following its first round of testing security software designed …
Learn to avoid identity theft and online scams
Working within highly organized e-fraud cartels, today’s criminals are outwitting even Web-savvy consumers by luring them to phishing sites, clever copies of the real …
Control weaknesses jeopardize NASA’s systems
NASA has been audited by the U.S. Government Accountability Office, and the results are not satisfactory. The audit uncovered multiple weaknesses in the agency’s …
TrueCrypt 6.3 released
Version 6.3 of TrueCrypt, the free open-source disk encryption software for Windows Vista/XP (and now 7), Mac OS X, and Linux has been released. New features: Full support for …