Help Net Security
Critical IE security issues to be detailed at Black Hat DC 2010
At the Black Hat DC 2010 conference Core SCS Security Consultant Jorge Luis Alvarez Medina will demonstrate cutting-edge browser manipulation techniques that can allow for …
RSA Conference 2010 keynote lineup
RSA Conference 2010 announced its keynote speaker lineup for the March event in San Francisco. As interest continues to swirl around cloud computing and the popularity of …
The age of cyberwar
McAfee revealed the staggering cost and impact of cyberattacks on critical infrastructure such as electrical grids, oil and gas production, telecommunications and …
Rogue software details: PcSecureNet
PcSecureNet is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Phishing attacks account for more than one in two viruses
More than half (55.59 per cent) of all malware sent on email is an attempted phishing attack, according to analysis of malware in January 2010 by Network Box. Phishing attacks …
Information security guidelines for the healthcare industry
SecureWorks recommends the guidelines outlined below. Security risk assessments Performing regular security risk assessments will give your organization a much better …
Splunk 4.0.9 released
Splunk released version 4.0.9 of the Splunk IT search and analysis engine. The following issues have been resolved in this release: Some issues related to high memory …
EFF researches Web browser tracking
Do you ever wonder what fingerprints your browser leaves behind as you surf the web? Peter Eckersley from the EFF comments: “Traditionally, people assume they can …
IronKey delivers mobile data security to government
IronKey and Carahsoft Technology announced that Carashsoft will distribute IronKey’s managed portable storage, authentication and trusted virtual computing solutions for …
Scientology attacker to serve one-year prison sentence
A Nebraska man agreed today to plead guilty to participating in an attack on Church of Scientology websites in January 2008 that shut down the group’s websites. Brian …
Top 10 tips for protecting business data
According to the Federal Trade Commission, approximately nine million Americans have their identities stolen each year. Data theft is a growing issue that can cost consumers …
Rogue software details: Live Enterprise Suite
Live Enterprise Suite is a rogue security application. In order to remove it, find out what files to look for below. Known system changes: Files c:\CommonDesktop\Internet …
Featured news
Resources
Don't miss
- Building the missing layers for an internet of agents
- What security leaders should watch for when companies buy or sell a business
- Malicious Rust packages targeted Web3 developers
- Max-severity vulnerability in React, Node.js patched, update ASAP (CVE-2025-55182)
- Smart grids are trying to modernize and attackers are treating it like an invitation