Help Net Security
Criminals try to tarnish name of anti-money laundering website
Sophos has identified an attempt by internet fraudsters to damage the reputation of a website designed to fight online money laundering. Bobbear is a British website set up to …
Massive consumer mistrust of businesses over identity fraud
Only half (52%) of consumers in Great Britain trust their high street bank or building society to protect their personal details from identity thieves, a new …
Application Security partners with the Cyber Security Industry Association
In partnership with the Cyber Security Industry Association (CSIA), Application Security, Inc. is participating in a grassroots campaign to drive data security legislation …
Video: Q&A with Bruce Schneier at DEFCON 15
In this 49 minute video, Bruce Schneier covers various topics.
VueKIT: Surveillance Video over Powerline
VisualGate Systems launched VueKIT, a complete digital surveillance video solution that uses the existing AC wiring in a building to transmit a professional quality video …
Analysis of Microsoft’s October security bulletins
Each month, Microsoft releases new security patches that may impact devices on your network. Many organizations struggle to understand and prioritize these patches and …
Guide to Online Antivirus Solutions Part 8: CA Online Virus Scanner
Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …
Kaspersky Lab uses anti-phishing databases by the PhishTank service
The PhishTank service, run byOpenDNS, offers a consolidated database of known fishing websites which is continually updated by the Open Source community and ordinary users. …
86 per cent of all emails are spam
The weekly Spam Report shows 86 per cent of all emails are spam, according to research carried out by Irish independent consulting and technical services company IT Force. …
E-mail interception a real risk for UK law firms
Interception of email poses a real threat to UK law firms, placing the integrity of their communications at risk, according to an industry survey. The survey, commissioned by …
Removing credit card data seen as key to real security
The consensus of speakers at the just-concluded Real Security Summit is that the future of credit card payments depends on systems that remove useable card data stored …
CryptoMemory prevents cloning and counterfeiting
CryptoMemory devices provide low-cost, secure means of preventing product counterfeiting and/or piracy of Intellectual Property (IP) and OEM parts. CryptoMemory uses a 64-bit …
Featured news
Resources
Don't miss
- CERT-UA warns against “security audit” requests via AnyDesk
- Decentralization is happening everywhere, so why are crypto wallets “walled gardens”?
- AI-driven insights transform security preparedness and recovery
- NDR’s role in a modern cybersecurity stack
- How Russian hackers went after NGOs’ WhatsApp accounts