Help Net Security
Colombian pleads guilty in complex computer fraud scheme
A Colombian citizen pled guilty today to a 16-count indictment involving a complex computer fraud scheme victimizing over 600 people. According to the indictment, Mario …
Information security management still number one concern
Information Security Management will be the most important initiative affecting IT strategy, investment and implementation in business organizations over the next 12-18 …
Trojans that use a new form of attack with rootkits
PandaLabs has detected the appearance of Trojans that include rootkits (MBRtool.A, MBRtool.B, MBRtool.C, etc.) designed to replace the master boot record (MBR), -the first or …
Watch the trailer for “The New Face of Cybercrime” documentary
Security vendor Fortify Software will soon be premiering their documentary “The New Face of Cybercrime”. Follow the link provided above for registering to San …
Removal tool for DNSChanger Mac trojan
DNSChanger Removal Tool detects and removes latest spyware targeting Mac OS X. DNSChanger Trojan (also known as OSX.RSPlug.A Trojan Horse) attacks users attempting to play a …
A logic bomb lends a former systems administrator 30 months in prison
A former computer systems administrator for Medco Health Solutions, Inc. was sentenced to 30 months in federal prison for planting a “logic bomb” in Medco’s …
Microsoft improves Windows Sidebar protection
Microsoft released an update for currently supported editions of Windows Vista that will protect gadget users. Gadgets are mini-applications designed to provide the user with …
Cross Site Printing: Printer Spamming
Many network printers listen on port 9100 for a print job (RAW Printing or Direct IP printing). You can telnet directly to the printer port and enter text. Once you disconnect …
Verizon rolls out unified threat management service
To help companies around the world better defend against the rising number of security threats, Verizon Business will monitor and manage a range of products that combine …
New GateKeeper prevents leap-frogging to unauthorized areas
Xceedium announced the availability of Xceedium GateKeeper 4.0, which delivers patent-pending LeapFrog Prevention technology, FIPS 140-2, Level 2 certification and other new …
Video: Relay attacks on card payment – vulnerabilities and defenses
Relay attacks allow criminals to use credit or debit cards for fraudulent transactions, completely bypassing protections in today’s electronic payment systems. This talk …
Beta version of safeSEARCH v2.0 browser toolbar
CyberDefender’s safeSEARCH Toolbar v2.0 BETA is a free browser plug-in that offers an improved search experience while protecting personal information and ensuring …
Featured news
Resources
Don't miss
- CERT-UA warns against “security audit” requests via AnyDesk
- Decentralization is happening everywhere, so why are crypto wallets “walled gardens”?
- AI-driven insights transform security preparedness and recovery
- NDR’s role in a modern cybersecurity stack
- How Russian hackers went after NGOs’ WhatsApp accounts