Help Net Security
10 steps to fortify the security of your MySQL installation
For those who wish to enhance or fortify the security of the MySQL installation the following technical 10 steps are a good start. Step 1: Run MySQL in a chroot jail Chroot …
Weekly Report on Viruses and Intruders – Oscarbot.KD worm and the Nabload.JC and Banker.EEA Trojans
Oskarbot.KD is the first malicious code to infect systems by exploiting the Microsoft MS06-040 vulnerability. According to information from PandaLabs, Oscarbot.KD searches for …
Miami man accused of creating hurricane Katrina phishing website
IT security firm, Sophos, is reminding computer users of the dangers of identity theft as a 20-year-old man is charged in relation to a phishing website which claimed to …
Popcorn.net replaces MoviePass, costs victims as much as $359.88
A new variant of an old spyware infection was discovered this morning by the Schrock Innovations research department called Popcorn.net. Popcorn.net replaces the well known …
Vulnerability of Passmark Sitekey at Bank of America reported
Sestus Data Corporation announced today the discovery of a vulnerability of the Passmark Sitekey login approach at Bank of America that could permit an attacker to remotely …
Fake BBC report spreads Berlusconi death claim and malicious trojan
IT security firm Sophos is warning users about a new Trojan horse that has been spammed out to email addresses disguised as a breaking BBC news report claiming the death of …
Panda Software launches GateDefender Integra
Panda Software presents the new Panda GateDefender Integra, an all-in-one appliance for protecting against all types of threats. It offers excellent performance, a low cost of …
Assessing Java Clients with the BeanShell
Assessing the security of Java applications, and particularly client-server applications, can be a tedious process of modifying the code, compiling, deploying, testing and …
What Should Businesses Require of Data Protection Solutions?
Data protection today is one of the most innovative and fast-moving areas of Information Technology. Data protection technology developers have, in recent years, engaged in …
DOJ Deploys AppSecInc’s vulnerability assessment technology
Application Security announced that the United States Department of Justice (DOJ) is utilizing the company’s vulnerability assessment scanner, AppDetective to reduce and …
Sensitive information can still be found on second hand disks
BT, the University of Glamorgan in Wales and Edith Cowan University in Australia today issued a report based on research to determine whether second hand computer disks that …
Worms exploit critical Microsoft security vulnerability
Sophos is warning computer users of malware that is exploiting a critical security vulnerability in Microsoft software, and urging companies to roll-out security patches as a …
Featured news
Resources
Don't miss
- Microsoft fixes actively exploited Windows Hyper-V zero-day flaws
- Fortinet fixes FortiOS zero-day exploited by attackers for months (CVE-2024-55591)
- Malicious actors’ GenAI use has yet to match the hype
- This is the year CISOs unlock AI’s full potential
- How AI and ML are transforming digital banking security