Help Net Security
Latest Twitter hack highlights TwitPic weakness
The account of pop star Britney Spears was compromised by an attack via third party website, TwitPic. In a tasteless stunt that was seen by her two million followers, someone …
Infonetics Research says NAC market is down but not out
Market research firm Infonetics Research released the first edition of its biannual NAC Enforcement Appliances report. Jeff Wilson, Infonetics Research’s Principal …
IT security wrap-up for the second quarter of 2009
F-Secure today released its IT Security Wrap-Up Report for the second quarter of 2009. Key highlights include: President Obama puts spotlight on cybersecurity “So …
New book: “International Electronic Evidence”
An increasing number of civil and criminal proceedings involve the use of digital evidence across jurisdictional boundaries. Digital evidence now affects every aspect of law, …
New anti-analysis technique for script malware
Jonathan San Jose wrote an interesting blog post on new anti-analysis technique found in a malware object: Recently, we came across JS_VIRTOOL which uses certain Javascript …
Internet security expert Rod Beckstrom named as the ICANN CEO
Internet founders and leaders are joining industry executives and government officials in praising the selection of Rod Beckstrom as the new Chief Executive Officer and …
Scare tactics malware
Red Condor recently detected and blocked a new email virus campaign designed to scare email users with bogus legal action for activities, including illegal music downloads. …
The evolution of Qualys
Qualys CEO Philippe Courtot discusses the evolution of Qualys, from the early days to current projects and future ideas.
Monitor and maintain enterprise content governance
Vamosa unveiled Check & Fix, the first web site content monitoring service that checks and automatically fixes errors. It addresses key compliance issues faced by …
Spammers want to profit on Michael Jackson’s death
Sophos is warning users to be wary of spam messages using the untimely death of music legend Michael Jackson to harvest unsuspecting computer users’ email addresses for …
Simple steps to keep your identity safe online
June is Internet Safety Month, and simple identity theft protection steps such as shredding your mail and keeping careful tabs on your bank accounts and credit cards are …
Survey: 40% expect IT budgets to stay the same in 2009
According to Arrow Enterprise Computing Solutions’ second-annual survey, 40 percent of respondents indicated that they expect their IT budgets to stay the same in 2009. …
Featured news
Resources
Don't miss
- Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)
- FAPI 2.0: How the OpenID Foundation is enabling scalable interoperability in global healthcare
- pqcscan: Open-source post-quantum cryptography scanner
- Bitdefender PHASR: Proactive hardening demo overview
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)