Help Net Security
Trojans target Lineage online game players
PandaLabs has detected the appearance of four new variants of the Lineage Trojan over the last two days. These new variants are Lineage.GNH, Lineage.GNE, Lineage.GMT and …
New security book – “The Craft of System Security”
Whether you’re a security practitioner, developer, manager, administrator, or user, this book will give you the deep understanding necessary to meet today’s …
FBI “Operation Bot Roast II” may underestimate global botnet threat
Yesterday the FBI reported it had obtained three new indictments and successfully secured key convictions of botnet cyber criminals.  In June 2007, part one of the FBI …
Teenager allegedly headed international hacking ring
Sophos reports that a teenager from New Zealand, believed to be the brains behind an international cyber gang, has been arrested. The gang was allegedly responsible for …
New Zealand botnet crackdown dangerous despite 2007 bots drop
The botnet crackdown in New Zealand is only tip of the iceberg. The majority of people with compromised computers do not even know their computers are being used for criminal …
WordPress Security Plugins
WordPress is a powerful publishing platform that is easy to use and offers anyone the possibility to start a blog in no time. Because of its versatility and a large quantity …
Free security scan available for the new SANS Top 20
Qualys announced the availability of a free network scanning service to help companies find and eliminate vulnerabilities listed in the annual SANS Top 20 update for 2007 that …
VirusScan now available on Mac OS X Leopard
VirusScan for Mac v8.6 is one of the first anti-virus solutions for Apple’s newest operating system, Mac OS X version 10.5 Leopard. With the release of McAfee VirusScan …
Majority companies feel they are secure against the risk of data leaks
The email survey, conducted during the week of the HMRC data loss, showed that the majority of respondents feel their companies are secure against the risk of data leaks. …
Trojan directs computers to porn sites and drugs stores
Half part pesky and half part sleazy. That’s how you can describe this malware that takes over your browser and redirects it to pornography and diverts online searches …
The Case for Automated Log Management in Meeting HIPAA Compliance
The Impact of HIPAA The Health Insurance Portability Accountability Act, better known as HIPAA, was passed in 1996 by the US Department of Health and Human Standards (HHS) to …
New SANS Top 20 list points to two major transformations in attacker targets
This year’s SANS Top 20 illuminates two new attack targets that criminals have chosen to exploit, and the older targets where attackers have significantly raised the …
Featured news
Resources
Don't miss
- CERT-UA warns against “security audit” requests via AnyDesk
- Decentralization is happening everywhere, so why are crypto wallets “walled gardens”?
- AI-driven insights transform security preparedness and recovery
- NDR’s role in a modern cybersecurity stack
- How Russian hackers went after NGOs’ WhatsApp accounts