Help Net Security
New book: “Intellectual Property and Open Source”
Intellectual Property and Open Source is for anyone who wants to understand how the law views intellectual property rights in code and other content. As an attorney and a …
How to avoid falling victim to fake antivirus products?
PandaLabs has noted an increase in cyber-crooks’ use of malware under the guise of fake antivirus products to defraud users. These applications, classified as adware by …
Backup and disk upgrade utility for computer technicians
Future Systems Solutions announced Casper 5.0 Tech Edition, a new version of its hard disk backup and disk upgrade utility. Designed especially for computer technicians, …
Virtual IPS for granular protection of virtual environments
Stonesoft introduced the StoneGate Virtual IPS (Intrusion Prevention System) to protect internal networks from malicious traffic. The release of this solution brings the …
Compliance with protection against data loss
In time to help financial services companies meet exceedingly rigid “Red Flag Rules” for protection against data loss, Utimaco unveiled SafeGuard PortProtector …
Top 10 network security threats to businesses
Unlike large enterprise organizations, small-to-medium sized businesses (SMBs) face multiple security threats with often limited resources to protect assets, data and customer …
75% of consumers want mobile banking services
Consumer interest in mobile banking and payments services offered by their financial institution has increased significantly in the past two years, according to new findings …
Secure single sign-on for SaaS users
Ping Identity released PingFederate 5.2, the most complete Internet single sign-on software solution for SaaS users and SaaS vendors. It incorporates key technologies from …
95% of financial institutions vulnerable to data theft
TraceSecurity revealed today its five-year statistics on social engineering and penetration testing. The statistics show that 95% of U.S. financial institutions’ …
Google takes another step to protect user privacy
Google announced a new logs retention policy. They pledge to anonymize IP addresses on their server logs after 9 months. That’s a significant shortening of their …
Types of Web-Based Client-Side Attacks
While my research is primarily concerned with drive-by-download attacks, I thought I try to summarize other web-based client-side attacks that are out there, many of which are …
Doubling of the number of crimeware-spreading URLs
The APWG announced today that its first quarter survey reveals a near doubling of the number of crimeware-spreading URLs at the end of the period, up from the previous record …
Featured news
Resources
Don't miss
- GUI frontends for GnuPG, the free implementation of the OpenPGP standard
- Juniper enterprise routers backdoored via “magic packet” malware
- Cisco fixes ClamAV vulnerability with available PoC and critical Meeting Management flaw
- SonicWall SMA appliances exploited in zero-day attacks (CVE-2025-23006)
- Defense strategies to counter escalating hybrid attacks