Help Net Security
Cyberfraudsters detained in Spain
A large group involved in cybercrime and online fraud has been dismantled in Spain by the National Police last week. The authorities detained a total of 23 people all across …
Using Pict Encrypt for steganography purposes on Mac OS X
Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. Pict Encrypt …
Trojan bot exploits windows vulnerability, drops rootkit
A network creeping Trojan itself is insidious in nature and what if it uses a Rootkit to evade detection as well? Security Experts at MicroWorld Technologies inform that a …
Weekly Report on Viruses and Intruders – BarcPhish phishing attack, the Spamta.X and Microsoft vulnerabilities
This week’s report from Panda Software looks at the BarcPhish phishing attack, the Spamta.X worm and the MS06-052, MS06-053 and MS06-054 vulnerabilities affecting some …
SMobile unveils new version of mobile security product suite
SMobile Systems, delivering the industry’s only comprehensive, cross-platform mobile security solution for wireless carriers and device manufacturers, has unveiled a …
Grisoft launches beta program for AVG Internet Security 7.5
GRISOFT announced the availability of a public beta version of AVG Internet Security 7.5, its new comprehensive anti-malware security suite. In addition to the new security …
Eight new variants of Barclays Bank phishing attack
The phishing attack against clients of Barclays Bank is not letting up. According to PandaLabs, those responsible for this threat have launched at least eight new variants of …
Technology Pathways releases ProDiscover version 4.8
Technology Pathways announced today that it has begun shipping ProDiscover version 4.8 with several groundbreaking features including BIOS imaging capability, support for …
SELinux gets easier with a new beta version of Tresys Brickwall enterprise client
Tresys Technology, a primary contributor to Security Enhanced Linux (SELinux), today released a beta version of its Tresys Brickwall Enterprise Client for Red Hat Enterprise …
Olympic torch hoax burns a hole in productivity, again
The Olympic Torch Virus Hoax is back in circulation in a big way. This time it’s seen doing rounds predominantly among Orkut Online Community members, informs Security …
New trick adopted by spammers to harvest email addresses
IT security firm Sophos has warned computer users to think before forwarding chain letters after discovering a new scam being used by spammers to collect email addresses. A …
VIP Defense announces VIP Privacy
VIP Defense announces today the release of VIP Privacy, an ultimate program for user’s privacy protection. In the age of ever-growing alert for cyber-frauds, the …
Don't miss
- Contextal Platform: Open-source threat detection and intelligence
- Using cognitive diversity for stronger, smarter cyber defense
- Microsoft fixes actively exploited Windows Hyper-V zero-day flaws
- Fortinet fixes FortiOS zero-day exploited by attackers for months (CVE-2024-55591)
- Malicious actors’ GenAI use has yet to match the hype