Help Net Security
Rogue software details: SafetyAntiSpyware
SafetyAntiSpyware is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Companies use insecure technology for critical information transfers
With global organizations depending on the sharing of sensitive information to support everything from financial transactions to patient care records, many believe they are …
Firefox 3.5.6 fixes several security issues
Mozilla released Firefox 3.5.6 that fixes several security issues. Privilege escalation via chrome window.opener Security researcher David James reported that a content window …
New book: “Hacking: The Next Generation”
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers …
High-performing DNS caching software
Secure64 Software released Secure64 DNS Cache, a high-performing DNS caching solution that offers the protection against cache poisoning attacks. “Continually rising …
Top 10 security predictions for 2010
Michael Sutton, VP of security research at Zscaler outlined the following security predictions for 2010. Apple is forced to climb the security learning curve Apple has for …
Rogue software details: InternetSecurity2010
InternetSecurity2010 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
The future of spam: 2010 and beyond
The economics behind spam dictate that 2010 will be another active year for spammers. The distribution of spam emails is set to continue as long as distribution channels …
Interactive packet manipulation tool
Scapy is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match …
Threat alert: Fake Flash greeting card
Cisco Security Intelligence Operations has detected serious activity related to spam e-mail messages that claim to contain a greeting card. The text in the spam message …
Malware in rich media and content
Cybercriminals most commonly used PDF and Shockwave Flash rich-media formats during the first half of 2009. In their State of the Internet 2009 report, CA discusses how …
Facebook privacy and security guide
This is a video created by Tom Eston from SocialMediaSecurity walking you through the new Facebook privacy settings. It also covers notifications, Facebook Ads and hiding your …
Featured news
Resources
Don't miss
- Edge computing’s biggest lie: “We’ll patch it later”
- Cyber risk is becoming a hold-period problem for private equity firms
- Windows Notepad Markdown feature opens door to RCE (CVE-2026-20841)
- 1Password open sources a benchmark to stop AI agents from leaking credentials
- Apple fixes zero-day flaw exploited in targeted attacks (CVE-2026-20700)