Help Net Security
New attack exploits an unpatched Microsoft vulnerability
PandaLabs detected some one hundred Web pages, mainly hosted in China, modified to infect users by exploiting an unpatched Microsoft vulnerability. The vulnerability lies in …
ePKI Lite: Software as a Service PKI solution
GlobalSign launched Enterprise PKI Lite, a Software as a Service (SaaS) PKI solution that allows small to medium sized enterprises to issue Digital Certificates to as few as 5 …
Gartner: Worldwide IT spending to decline 6% in 2009
Worldwide IT spending is on pace to total $3.2 trillion in 2009, a 6 percent decline from 2008 spending of $3.4 trillion, according to Gartner. Continued weak IT spending …
Altor VF 3.0: VMsafe virtual firewall with intrusion detection
Altor Networks announced the Altor VF 3.0 virtual firewall with integrated intrusion detection. The Altor VF is the first product to be integrated with VMware VMsafe network …
Malicious use of Twitter
A worm appeared in April which used a cross-site scripting technique to infect Twitter users when they visited the profiles of other infected users. It then infected the new …
Trojans were 70% of new malware detected between April and June
One of the most notable findings of the PandaLabs report is the 6.25% drop in spyware, which now represents just 6.9% of all new malware. In contrast, adware rose dramatically …
OpenTrust Mobile for iPhone
OpenTrust, a provider of open and secure IT ecosystems announced full support for mobile authentication for smartphones. The OpenTrust IT Trust and Security platform is now …
Top ten e-threats for June 2009
BitDefender released the top ten e-threats for the month of June. Five of the ten worst e-threats are Trojans, making this the best represented e-threat category. In tenth …
New ENISA Quarterly Review available for download
European Network and Information Security Agency (ENISA) Quarterly Review is a publication that is distributed to stakeholders and other interested readers every three months. …
New cryptanalytic attack on AES
Alex Biryukov and Dmitry Khovratovich from University of Luxembourg published a paper titled “Related-key Cryptanalysis of the Full AES-192 and AES-256”. In this …
Ixquick – the search engine that protects your privacy
Every time you use a regular search engine, your search data is recorded. Your search terms, the time of your visit, the links you choose, your IP address and your User ID …
Month of Twitter Bugs: bit.ly multple vulnerabilities
First report in the Month of Twitter Bugs focuses on multiple vulnerabilities in bit.ly URL shortening service. Discovered security issues include:Reflected Cross-Site …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics