Help Net Security
Powerpuff Girls DVD Struck Down By Funlove
Sophos has learnt that a DVD from Warner Bros featuring new cartoon stars, the Powerpuff Girls, is infected by the FunLove virus. If the disc – called ‘Meet the …
F-Secure warns about Nimda.E network worm
F-Secure Corporation (HEX:FSC) is alerting computer users worldwide about a new version of the infamous Nimda worm. Nimda.E has been modified probably by the original author …
Sophos- Virus Top Ten for October 2001
This is the latest in a series of monthly charts counting down the ten most frequently occurring viruses as compiled by Sophos, a world leader in corporate anti-virus …
Console IOCTLs Under Linux
Console IOCTLs can be very useful and powerful. These are the IOCTls that involve the console. They are the user interface to manipulation of the console. I am going to go …
Which hat are you?
It was inevitable that the hacking scene be split into new sub categories with new terminology to represent the mentality of the world’s brightest hackers. A decade ago …
How can you spot a Hacker?
What defines a Hacker? What motivates a Hacker? A majority of people seem to have a vague understanding of what being a Hacker is all about. Is there an underground Hacker …
ATTRITION: Evolution
Definition Attrition.org is a non-profit hobby site run by a handful of volunteers in their free time. Each staff member at Attrition has a day job that takes a considerable …
Your Opinion: “What are the current privacy threats?”
In 2001 we held a survey on HNS regarding the current privacy threats. Many visitors decided to share their opinions with us, thank you. Listed below are some of the most …
Privacy, is it real?
In our daily lives a persons privacy is violated countless times. So many in fact, we tend to catch less and less of them as we become more desensitized. In the making of this …
The History Of Hacking
Nowadays, different people have different views on the hacking scene. Often times people of similar skill level have similar opinions. There is no official definition of a …
Social Engineering
The purpose of this text is to introduce or better explain the art of social engineering. This is one of the most difficult things to explain but I found a rather easy method …
Legislating the Internet – The nightmare has arrived
THE REGULATION OF INVESTIGATORY POWERS BILL, 2000 “Government is too secretive. Too many decisions are taken behind closed doors without proper consultation with the …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments