Help Net Security
Netsky.q returns to top of virus chart
NetSky.q, the all-time leader for 2004 and 2005, has returned to head the virus Top 20 for June, according to information security software vendor, Kaspersky Lab. Hot on its …
Financially motivated threats still the most frequent malware in June
According to PandaLabs, Trojans and adware accounted for 49.6% of infections detected by Panda ActiveScan in June. Trojans, which increased by 0.75% this month, caused 26.89% …
The Evolution of Self-Defense Technologies in Malware
This article explores how malware has developed self-defense techniques and how these techniques have evolved as it has become more difficult for viruses to survive. It also …
Watch out new iPhone users – anyone can listen to your voicemail
Altough this problem was found out more than a year ago, new users that are buying iPhones and migrating to AT&T/Cingular should know that their voicemails can be …
New malware exploits iPhone craze
Secure Computing warns that email spam, indicating that the recipient has won a new iPhone, is directing users to a malware hosting website. The have discovered a website that …
Apache Prefork MPM Vulnerabilities
This case study is a result of source code analysis of Apache httpd server MPM modules. The main goal of this document is to show what may be done by an attacker who has the …
Authentication and encryption solution for Seagate 5400 Momentus FDE.2 drives
After two years of development SECUDE is pleased to announce the official release of FinallySecure 1.0 which provides total Data-at-Rest security for new hardware based Full …
Viruses that start music in Windows Media Player and read the infected text
This week’s PandaLabs malware report looks at three new malicious codes designed to compromise the security of computers: two worms and a Trojan. Gronev.A is a worm with …
New addition to the FlowThrough security processor family
Hifn announced the full availability and production of the 8450, the newest member to the company’s FlowThrough security processor family. Hifn’s FlowThrough …
Taking Ownership of the Trusted Platform Module Chip on Intel Macs
I have been following the works of Trusted Computing Group (TCG) since their inception. The body, successor to the Trusted Computing Platform Alliance started by such giants …
Relaxation of PCI DSS is no surprise
The recent ease in requirements for UK retailers attempting to comply with the Payment Card Industry Data Security Standards (PCI DSS) did not surprise application security …
Why PCI isn’t enough to ensure data security today?
Ounce Labs thinks it’s critical for consumers to know that, in many instances, their credit card data is still not secure:  ” Compliance statistics are …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month