Help Net Security
Threat alert: Fake Flash greeting card
Cisco Security Intelligence Operations has detected serious activity related to spam e-mail messages that claim to contain a greeting card. The text in the spam message …
Malware in rich media and content
Cybercriminals most commonly used PDF and Shockwave Flash rich-media formats during the first half of 2009. In their State of the Internet 2009 report, CA discusses how …
Facebook privacy and security guide
This is a video created by Tom Eston from SocialMediaSecurity walking you through the new Facebook privacy settings. It also covers notifications, Facebook Ads and hiding your …
Identify vulnerabilities with Microsoft’s CAT.NET tool
CAT.NET is a binary code analysis tool that helps identify common variants of certain prevailing vulnerabilities that can give rise to common attack vectors such as Cross-Site …
Attacks on strong authentication factors need new defenses
Fraudsters have started to raid user accounts by beating strong two-factor authentication methods. Gartner analysts said that Trojan-based, man-in-the-browser attacks are …
The 2010 threat landscape
The 2010 threat landscape In conjunction with their State of the Internet 2009 report, CA outlined their online security predictions for 2010. 1. Search engine optimization …
Serious SQL flaw could have compromised millions of Rockyou.com users
Imperva has issued a warning after finding a serious SQL injection flaw with Rockyou.com – a social networking application development web site. The SQL injection flaw …
World of Warcraft phishing scam
World of Warcraft (WoW) players should be on the lookout for phishing sites trying to get their user info. One still operating at time of writing is worldqfwarcraft.com. This …
Vendors deliver compromised products
Users should be aware of potential threats created by devices that are already compromised or tampered coming off the shelves. The Trend Micro 2010 Future Threat Report talks …
Week in review: Massive SQL injection attack, botnets, security trends and the Conficker worm
Here’s an overview of some of last week’s most interesting news, interviews and articles: Phishing campaign targets cPanel users Trusteer warned the customers of …
Do new technologies offer greater security?
Many administrators, IT directors, and CSOs are tired of the constant system patch battle and constant security software updates. The Google Chrome OS offers them hope for a …
Network IPS tests uncover appliance weaknesses
NSS Labs released its latest Network Intrusion Prevention System (IPS) Comparative Group Test Report for the fourth quarter of 2009. The report evaluates 15 NIPS products from …
Featured news
Resources
Don't miss
- Henkel CISO on the messy truth of monitoring factories built across decades
- The hidden dynamics shaping who produces influential cybersecurity research
- UTMStack: Open-source unified threat management platform
- LLMs are everywhere in your stack and every layer brings new risk
- Building SOX compliance through smarter training and stronger password practices