Help Net Security
Spoof P2P applications distribute the Lop adware
Two spoof P2P application installers, BitRoll-5.0.0.0 and Torrent101-4.5.0.0, are being used to install the Lop adware on users’ systems. These programs are used to …
Threat Spy: tracking malware across the globe
ScanSafe launched Threat Spy, the first virtual map to show the increasingly dangerous Web threat landscape. Threat Spy displays malware as it is identified and blocked by …
Automated assessment solution for Requirement 1 of the PCI DSS
RedSeal Systems released RedSeal Security Risk Manager (SRM) 3.0 which enables users to automate their assessment of Requirement 1 within the Payment Card Industry’s …
New solution to combat piracy problems
V.i. Laboratories announced a new anti-piracy strategy that gives software makers multiple options to track, reduce and recover lost revenue due to piracy. CodeArmor …
Reverse Engineering: Smashing the Signature
Many antivirus and antispyware solutions identify malicious programs by looking for known unique signatures contained inside them. Those signatures are stored inside a …
APWG and IEEE partner for Electronic Crime Research Conference
Anti-Phishing Working Group and IEEE will join forces for the development of the APWG e-Crime Researchers Summit (eCRS), the world’s only peer-reviewed technical …
Internal network security threats online encyclopedia
Promisec has released an online encyclopedia of internal network security threats. The encyclopedia, which can be viewed by anyone for free, is continually updated with …
Confidential school records made available online
Recent media reports state that more than 100,000 student records were accidentally made available online. The security blunder by The Princeton Review, an educational …
Code signing certificates for Adobe AIR applications
VeriSign today released VeriSign Code Signing Certificates for an application on Adobe AIR. Adobe AIR is a cross-operating system runtime that enables rich Internet …
Deep packet inspection testing methodology videos and documentation
BreakingPoint Systems released a detailed test methodology and video series that enables network engineers to test the deep packet inspection (DPI) features of content-aware …
Internet Terrorist: Does Such A Thing Really Exist?
Recently, I have experienced an increase in organizations questioning how real is the threat of Internet terrorism and what they can do to protect themselves. As a former …
New version of SifoML e-mail gateway appliance
O2Security released the newest version of its email gateway appliance. SifoML v3.9 provides new features and enhancements, including the ability to prevent attacks on networks …
Featured news
Resources
Don't miss
- Juniper enterprise routers backdoored via “magic packet” malware
- Cisco fixes ClamAV vulnerability with available PoC and critical Meeting Management flaw
- SonicWall SMA appliances exploited in zero-day attacks (CVE-2025-23006)
- Defense strategies to counter escalating hybrid attacks
- Web Cache Vulnerability Scanner: Open-source tool for detecting web cache poisoning