Help Net Security
New book “Virtual Honeypots: From Botnet Tracking to Intrusion Detection”
Honeypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. Now, …
HTTPS/SSL content filtering for SMB and education
Cymphonix announced the upcoming availability of Network Composer Version 8, the latest release of its award-winning secure web gateway appliance. The latest firmware …
DNS forgery pharming attack information
Trusteer announced today that its CTO and security researcher Amit Klein has cracked BIND’s random number generator and demonstrated a new attack affecting most Internet …
Top 5 Security and Networking Widgets for Mac OS X
This article presents 5 widgets that that enable you to perform various tasks quickly, straight off the Dashboard. AirTrafficControl AirTrafficControl is the most advanced …
A study into corporate end user awareness of Web threats
Trend Micro announced the results of its study into corporate end users’ awareness of Web threats. The study tracked responses from 1600 corporate computer end users …
AT&T offers new security alerting and notification service
AT&T Inc. recently announced the availability of My Internet Protect, a security knowledge mining, alerting and notification service for identified threats that enter a …
SAIC addresses possible data compromise
Personal information of certain uniformed service members, family members and others was placed at risk for potential compromise while being processed by SAIC under several …
Video: Exploiting the iPhone
This is the demonstration of an iPhone exploit developed by the software security group at Independent Security Evaluators.
New Excel spam hits the airwaves
Microsoft Excel is the newest packaging spammers have created for their stock pump-and-dump scams, Commtouch reported today, based on the Company’s analysis of billions …
Lock the Door and Make Sure Your Data is Protected
You would think that at some point in time your children will reach the age at which you can reason with them, I’m hoping it’s a year older than the oldest one is …
Microsoft Excel virus and a ransomware trojan
It is very easy to know when Pahooka.A has infected a computer. Once run, it replaces the computer’s desktop wallpaper with a multicolored star on a blue background and …
Peer-to-peer software leaks confidential police data
IT security and control firm Sophos is reminding companies of the importance of enforcing stringent IT security policies after it was revealed that a Japanese policeman has …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month