Help Net Security
Which hat are you?
It was inevitable that the hacking scene be split into new sub categories with new terminology to represent the mentality of the world’s brightest hackers. A decade ago …
How can you spot a Hacker?
What defines a Hacker? What motivates a Hacker? A majority of people seem to have a vague understanding of what being a Hacker is all about. Is there an underground Hacker …
ATTRITION: Evolution
Definition Attrition.org is a non-profit hobby site run by a handful of volunteers in their free time. Each staff member at Attrition has a day job that takes a considerable …
Your Opinion: “What are the current privacy threats?”
In 2001 we held a survey on HNS regarding the current privacy threats. Many visitors decided to share their opinions with us, thank you. Listed below are some of the most …
Privacy, is it real?
In our daily lives a persons privacy is violated countless times. So many in fact, we tend to catch less and less of them as we become more desensitized. In the making of this …
The History Of Hacking
Nowadays, different people have different views on the hacking scene. Often times people of similar skill level have similar opinions. There is no official definition of a …
Social Engineering
The purpose of this text is to introduce or better explain the art of social engineering. This is one of the most difficult things to explain but I found a rather easy method …
Legislating the Internet – The nightmare has arrived
THE REGULATION OF INVESTIGATORY POWERS BILL, 2000 “Government is too secretive. Too many decisions are taken behind closed doors without proper consultation with the …
Internet privacy: What are the issues?
It’s Saturday morning and you hop on the Net looking for some info on smoking related illnesses ‘cuz your best friend’s been thinking of quitting lately and …
Spam: The problems with junk e-mail
We all get junk mail at home. It’s an accepted fact of life, at least in the U.S. So why is Unsolicited Commercial Email (UCE) – a/k/a “spam” or …
Web-based Training Accelerates Spread of Sidewinder High-Assurance Security Expertise Worldwide
SAN JOSE, Calif., Oct. 30, 2001 – Secure Computing Corporation (NASDAQ: SCUR), a leading provider of enterprise access control solutions, today announced the …
Kaspersky Labs : “Nimda” Is Breeding
5 modifications of the worm have already been detected Since “Nimda” was discovered on September 18, 2001 Kaspersky Labs has detected 5 more modifications of this …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act