Help Net Security
Embracing tokenization: Payment without pain
Today, it’s expected that merchants accept electronic payments. It’s more than expected that those payments are secure. No data leaks or breaches of any kind. The …
Discover security flaws in source code with Graudit
Graudit is a simple script and signature sets that allows you to find potential security flaws in source code using the GNU utility grep. Graudit supports scanning code …
Find potential exploit conditions in Microsoft Office documents
OfficeCat is a command line utility developed by the Sourcefire VRT that can be used to process Microsoft Office Documents to determine the presence of potential exploit …
Trojans dominate BitDefender’s top 10 e-threats list
The top spot on BitDefender’s top 10 e-threats list for October is once again Trojan.Clicker.CM, which is mostly present on websites hosting illegal applications such as …
Top causes of identity fraud
Identity fraud increased substantially in 2008, reversing a four-year trend of decreasing incidents. Researchers say identity fraud increased by 22 percent last year and they …
Global security best practices
The latest Microsoft Security Intelligence Report shares security best practices from countries that have consistently exhibited low malware infection. These best practices …
Worm infections in the enterprise rose by nearly 100%
The latest Microsoft Security Intelligence Report (SIRv7), which indicates that worm infections in the enterprise rose by nearly 100 percent during the first half of 2009 over …
Record levels of spam, malware and Web-based threats
The number of new file-sharing sites hosting unauthorized, copyrighted content skyrocketed over the last three months, according to McAfee’s latest report. It also shows …
Week in review: Malicious email attachments, phishing trends, China’s cyber army and Halloween attacks
Here is an overview of some of last week’s most interesting news, interviews and articles: Q&A: Malware threats, Windows 7 and cyber crime Bo Olsen is a malware …
Facebook hit by phishing scam and banking Trojan combo
Facebook users should be on the lookout for an email threat that is posing as a message from Facebook administrators. The message contains both a phishing scam and a notorious …
Network access control system PacketFence 1.8.5 released
PacketFence is a free and open source network access control (NAC) system. PacketFence is actively maintained and has been deployed in numerous large-scale institutions over …
Ubuntu 9.10 Karmic Koala released
Released today, Ubuntu 9.10 Desktop Edition and Server Edition bring a host of new features and further position Ubuntu as a viable competitor to Windows 7. Ubuntu 9.10 …
Featured news
Resources
Don't miss
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades
- The hidden dynamics shaping who produces influential cybersecurity research