Help Net Security
22 suspected computer hackers arrested in France
According to French media reports, the 22 alleged hackers were arrested in Paris, southern and central France following a four month investigation involving over 90 members of …
Malware report: AdvancedXPFixer adware and Tixcet worm
PandaLabs reports this week about the adware AdvancedXPFixer, the Banbra.FTI Trojan and the Tixcet.A worm. AdvancedXPFixer is adware (a program designed to display adverts) …
The critical importance of Enterprise Rights Management
Anyone wondering why Enterprise Rights Management (ERM) is growing in importance need only review the news stories of the past few years. A US government consultant accesses …
Internet scheme used to steal micro-deposits
Michael Largent, 22, was arraigned on an indictment charging him with multiple counts of computer fraud, wire fraud, and mail fraud. This case is the product of an extensive …
Hardware encryption-secured flash drive
EDGE Tech Corp introduced its rough-and-tough, hardware encryption-secured flash drive, the DiskGO Secure GUARDIAN. Utilizing mandatory 256-bit AES hardware encryption, the …
Web application security landscape and trends
In the latest issue of the HNS Podcast, Mandeep Khera from Cenzic shares web application security trends observed by his company in the first quarter of 2008. Mr. Khera also …
Apple updates security with Mac OS X 10.5.3
The Mac OS X 10.5.3 Update is recommended for Mac OS X 10.5, 10.5.1, and 10.5.2 Leopard. It includes general operating system improvements that enhance the stability, …
Adobe Flash Player remote code execution vulnerability roundup – update #2
Adobe Flash Player contains an code execution vulnerability. An attacker may be able to trigger this overflow by convincing a user to open a specially crafted SWF file. The …
HNS Book giveaway: “The Future of Reputation: Gossip, Rumor, and Privacy on the Internet”
June 05 2008: The winner is Jeffry B. ———————————- We are giving one of our readers a copy of “The …
Insider threats keep IT directors awake at night
Secure Computing announced the results of an IT Director survey that uncovers a rising concern of insider threats and widespread acknowledgement of being unprepared for …
Preparations for secure collaboration in a de-perimeterized business world
Jericho Forum released the results of a spot survey of 22 IT security vendors that responded to questions about vendor preparedness to deliver security for today’s …
Full disk encryption for the Mac platform
Check Point announced the release of Check Point Full Disk Encryption for Mac OS X, the industry’s first full-disk encryption solution with pre-boot authentication to …
Featured news
Resources
Don't miss
- How to map and manage your cyber attack surface with EASM
- Google is making sending end-to-end encrypted emails easy
- North Korean IT workers set their sights on European organizations
- Balancing data protection and clinical usability in healthcare
- BlueToolkit: Open-source Bluetooth Classic vulnerability testing framework