CRISC certification: Reacting to a radically changing IT landscape
The number of IT professionals seeking the CRISC (Certified in Risk and Information Systems Control) certification continues to rise rapidly. More than 16,000 professionals …
Viral Facebook spam campaign delivers malware
If you spot a Facebook friend of yours worrying about and linking to news about the US attacking Iran and Saudi Arabia, curb your curiosity and don’t follow the link if …
Compromised DreamHost-hosted websites lead to scams
Hundreds of websites hosted by DreamHost have been compromised and are used to redirect users to a Russian scam page, warns Zscaler. Whether or not this is the result of the …
Week in review: Reactions to VeriSign hack, Anonymous leaks FBI conference call, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: The F-BOMB: A tiny $50 spying computer for DARPA As …
Anonymous leaks FBI conference call on hacking investigations
Anonymous resumed today its F**k FBI Friday campaign by publishing a 16-minute-long mp3 recoding of a confidential conference call between representatives of the FBI and the …
Server-side polymorphic Android apps
Server-side polymorphism as a technique to serve unique malware versions that evade signature-based detection to Windows users is used by many malware peddlers on a regular …
Attackers use fake friends to blend into Facebook
A new Barracuda Labs study provides an example of an increasing number of attackers move to social networks to carry out their wares. The study analyzes a random sampling of …
Kelihos botnet rises up again
Kelihos – the botnet whose operation was disrupted last September by Microsoft and Kaspersky Lab by shutting down its C&C servers and making its bots contact a …
Concerned about online privacy? FBI says you might be a terrorist
Being concerned about your online privacy might be a sign that you’re up to no good, says the FBI and the US Department of Justice, via a collection of 25 fliers to be …
Google reveals it is already scanning Android apps for malware
Even though most malicious Android apps are served from third-party app markets, cyber crooks occasionally manage to disseminate some via Google’s official Android …
VeriSign hack: Reactions from the security community
VeriSign admitted it was hacked in 2010 and cannot identify what data was stolen. Below are comments on the situation that Help Net Security received from industry veterans. …
The fusion of hardware encryption, PIN access and USB 3.0
Apricorn expanded their Aegis Secure Drives to the desktop environment with a new desktop edition, the Aegis Padlock. Sporting a spacious capacity of up to 3 TB with a Super …
Featured news
Resources
Don't miss
- CERT UEFI Parser: Open-source tool exposes UEFI architecture to uncover vulnerabilities
- Why prevention-first secrets security will define enterprise scale: Learnings from a leading telecom
- Fortinet starts patching exploited FortiCloud SSO zero-day (CVE-2026-24858)
- Attackers use Windows App-V scripts to slip infostealer past enterprise defenses
- Microsoft reveals actively exploited Office zero-day, provides emergency fix (CVE-2026-21509)