Help Net Security
SEO techniques used to distribute rogue anti-virus software
Finjan’s Malicious Code Research Center (MCRC) managed to research one of the rogueware affiliate networks, where members make $10,800 a day. In the first issue of its …
Modular open source platform for creating network security tools
Netifera is a new modular open source platform for creating network security tools. This project provides many advantages for both security developers and researchers who want …
Record numbers of crimeware besiege desktops
The APWG, the global independent coalition combating electronic crime, reported that rates of crimeware-spreading sites and rogue anti-malware programs used for a number of …
New book: “97 Things Every Software Architect Should Know”
Software architects occupy a unique space in the world of IT. They are expected to know the technologies and software platforms on which their organizations run as well as the …
The Interceptor: a free network tap
The Interceptor is a wired network tap which passes network data out over a wireless network so it can be sniffed on a network device on a remote machine. First the the two …
Top 5 pitfalls for securing retail cardholder data
Recognizing the need for stronger protection against security threats, the Payment Card Industry (PCI), a consortium of retail and credit card leaders, published Data Security …
Advances in biometrics remedy the need for increased security
Security concerns in the present world continue to grow in intensity and complexity. This opens the door to many opportunities within the European biometrics market, which is …
Monitoring and theft recovery software for Windows Mobile
Retina-X Studios released RecoveryCop for Windows Mobile devices. When installed, it runs in stealth mode. Anytime thereafter they can monitor every move, action and sound of …
Cybercriminals exploit Natasha Richardson’s death
Users keen to get the latest news on Natasha Richardson’s death should be careful about which news story they read. There are compromised websites hosting content …
Attacking SMM memory via Intel CPU cache poisoning
System Management Mode (SMM) is the most privileged CPU operation mode on x86/x86_64 architectures. It can be thought of as of “Ring -2”, as the code executing in …
Internet Explorer 8 is now available
Microsoft unveiled Windows Internet Explorer 8, which can be downloaded in 25 languages. Microsoft claims IE 8 is easier to use, faster and offers security features in direct …
The most prominent types of Web application vulnerabilities
Cenzic released its report revealing the most prominent types of Web application vulnerabilities for the second half of 2008. The report, which comes in the wake of highly …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage