Help Net Security
Zero-hour virus outbreak detection
New 5.0 version of Commtouch Enterprise Anti-Spam Gateway now includes Zero-Hour Virus Outbreak Detection to complement traditional enterprise Anti-Virus solutions and block …
First Response warns customers after data breach
Following a recent break-in at its offices, First Response has admitted the loss of storage discs containing sensitive information of its current and former customers, warning …
Malware uses Hotmail and Gmail as spam hosts
A joint effort between the BitDefender and Yahoo security teams appears to have stymied the criminals behind Trojan.Spammer.HotLan to generate and use Yahoo accounts to send …
Financial services institutions battle with data loss
New research from TowerGroup finds that businesses are not doing nearly enough to prevent the loss or theft of customers’ personal information. The pace of data loss is …
Practical tips for information protection
The new school year means new friends, new classes, and often a new computer to help get schoolwork done. Mobile computers in particular can also contribute to problems …
Compliance, IT Security and a Clear Conscience
Never has the need to prove compliance with external regulations and internal policies been more acute than it is today. The likely consequences of failing to prove that your …
Security is broken: the past, present and future
Our computer security model is broken. Worse yet, it never really has worked at all well, and is even less suitable for today’s uses. This talk explores the history …
The insecurity of Widgets
Iftach Ian Amit from Finjan explains why widgets and gadgets on various websites and platforms are inherently insecure, despite the fact that standards exist to create secure …
Step-by-step Guide to Online Amazon S3 Backups with Jungle Disk
Jungle Disk is an application that lets you store files and backup data securely to Amazon.com’s S3 Storage Service. Amazon S3 provides a simple web services interface …
Bumping the Medeco Lock at DEFCON 2007
Lock bumping became big news at last year’s Defcon when 11-year-old Jennalynn showed an exceptional talent for being able to bump almost any lock set in front of her. …
What every engineer needs to know about security
This talk discusses recent trends in security, and what every engineer needs to know to prevent the most significant emerging threats such as cross-site scripting and SQL …
Noteworthy presentations at HITBSecConf2007
HITBSecConf2007 is taking place between September 3rd and 6th 2007 in Kuala Lumpur. Here’s a list of interesting presentations: Injecting RDS-TMC Traffic Information …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act