Help Net Security
Statistics show that spammers are not giving up
While antispam filters have become more sophisticated in the last year, and spam threats have emerged and dissipated, it is clear that spammers are not giving up the spam …
Hacked personal email accounts used for personalized 419 scam
At first glance, the email below looks like a typical 419 scam: The twist is that the email came from a user’s hacked webmail account and was sent to his personal list …
Encryption key management for Oracle Database 11g
nCipher announced its nShield and netHSM key management solutions are now integrated with Transparent Data Encryption, part of Oracle Database 11g Advanced Security option. …
New malware dominated by Trojans
Panda Security announced the findings from its second quarterly report of 2008 which revealed that Trojans comprised over 63 percent of all new malicious codes. Adware …
Q&A: Software-as-a-Service and Threat Management
Misha Govshteyn is the CTO and responsible for security strategy, security research and operations at Alert Logic. In this interview he discusses Software-as-a-Service (SaaS), …
Cybercriminals reinvent methods of malicious attacks
Cybercriminals are not only leveraging new technologies to propagate cybercrime, but are also reinventing forms of social engineering to cleverly ensnare both consumers and …
Mounting privacy laws have companies struggling to keep compliant
When it comes to shredding sensitive business documents, leaders of some of America’s largest companies are devoting more attention and more money to keeping information …
Data leaks are a top concern
Trend Micro reported that data leaks are becoming a leading source of headaches for U.S., U.K., German and Japanese companies, according to the results of a study that …
Digital DNA secures online identities
Torotech has introduced what it claims is the first digital DNA mapping technology to protect the identities and security of users accessing bank accounts or shopping online. …
Independence Day brings down attack on computer users
Sophos is warning computer users of a widespread email spam campaign that poses as a video of American Independence Day fireworks, but is really an attempt to lure innocent …
Google Apps Hacks
Practically everyone on the Internet uses Google for one of its many services. Once a search engine only, today offers a variety of online tools and software titles that …
Rise in SQL injection attacks exploiting unverified user data input
Microsoft is aware of a recent escalation in a class of attacks targeting Web sites that use Microsoft ASP and ASP.NET technologies but do not follow best practices for secure …
Featured news
Resources
Don't miss
- SonicWall SMA appliances exploited in zero-day attacks (CVE-2025-23006)
- Defense strategies to counter escalating hybrid attacks
- Web Cache Vulnerability Scanner: Open-source tool for detecting web cache poisoning
- Funding soars in a milestone year for Israeli cybersecurity
- Stratoshark: Wireshark for the cloud – now available!