Help Net Security
How To Recover Forgotten Microsoft Word Passwords
Microsoft Office applications have an option for setting up different levels of passwords. They can be used for specific actions such as preventing reading, writing or adding …
The Simpsons used by cybercriminals to harvest email addresses
Sophos is reminding computer users of the importance of not responding to unsolicited email surveys following the discovery of a spam campaign that is exploiting interest in …
Euro six nations match the US in spam stakes
SophosLabs scanned all spam messages received in the company’s global network of spam traps, and have revealed that the US continues to relay more spam than any other …
Information on Pinch tool for creating custom Trojans
PandaLabs has uncovered Pinch, a tool sold on several online forums and designed to create Trojans. The tool lets cyber-crooks define a series of malicious actions that the …
Spam mails in PDF format flood the web
If you thought emails carrying embedded images are the current trend in spam town, it’s time to move on. According AntiVirus, AntiSpam and Content Security solution …
List of vulnerabilities fixed in the new 2.0.0.5 version of Firefox
Mozilla Firefox 2.0.0.5 web browser was just released. Here is a list of security vulnerabilities it fixes: MFSA 2007-25 XPCNativeWrapper pollution shutdown and moz_bug_r_a4 …
Oracle critical patch update – July 2007
Critical Patch Update is a collection of patches for multiple security vulnerabilities. It also includes non-security fixes that are required (because of interdependencies) by …
Web Vulnerabilities in the Age of the iPhone
I’ve read lots of articles about hacking the iPhone lately. They’re mostly focused on exploring the hardware, circumventing the intended activation process, or …
Certifying Information Security Management Systems
An information security management system (ISMS) is focused on managing information security within an organization, a topic that is of growing concern to many organizations …
Report on email threats: massive botnets spread PDF and malware
Commtouch released its Email Threats Trend Report for the second quarter of 2007, based on the company’s real-time analysis of billions of email messages globally each …
Ransomware Trojan demands $300 for giving returning user data
PandaLabs has uncovered a new ransomware strain: Sinowal.FY. This malicious code encrypts users’ files so that they cannot access them, and demands a ransom for giving …
Next-generation 10 Gigabit enterprise threat management solution
Sourcefire has announced the upcoming release of the Sourcefire 3D9800 Sensor, which will enable users to protect their highest-performing network segments with a single …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)