Tinba Trojan targets major US banks

Posted on 17 September 2014.  |  Tinba, the tiny (20 KB) banking malware with man-in-the-browser and network traffic sniffing capabilities, is back.

XSS bug allows Amazon account hijacking

Posted on 16 September 2014.  |  A recurring XSS bug in Amazon's Kindle Library, i.e. the "Manage your Kindle" web application, can be exploited by attackers.

Researcher creates exploit for compromising scammers' computers

Posted on 15 September 2014.  |  Victims can turn the tables on the scammers.

Securing virtual machines: Considerations for the hybrid cloud

Posted on 12 September 2014.  |  This article looks at several important considerations for assessing a security solution for your hybrid cloud environment.

How a large ISP fights DDoS attacks with a custom solution

Posted on 10 September 2014.  |  How do the big guys tackle these attacks? What weapons can an ISP bring to the battleground?

Spotlight

How to talk infosec with kids

Posted on 17 September 2014.  |  It's never too early to talk infosec with kids: you simply need the right story. In fact, as cyber professionals itís our duty to teach ALL the kids in our life about technology. If we are to make an impact, we must remember that children needed to be taught about technology on their terms.


What's New
Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Sep 19th
Events
Cyber Security EXPO 2014
08 October - 09 October 2014.
McAfee FOCUS 14
27 October - 29 October 2014.

Editor's choice

With iOS 8, Apple won't be able to unlock phones for the police

18 September 2014. | With the release of iOS 8, Apple has also updated its Privacy Policy.

How to talk infosec with kids

17 September 2014. | It's never too early to talk infosec with kids: you simply need the right story.

XSS bug allows Amazon account hijacking

16 September 2014. | A recurring XSS bug in Amazon's Kindle Library, i.e. the "Manage your Kindle" web application, can be exploited by attackers.

Emerging cloud threats and how to address them

15 September 2014. | Public and community clouds can be appealing targets for hackers looking to disrupt or steal information from scores of organizations with one successful strike.

Securing virtual machines: Considerations for the hybrid cloud

12 September 2014. | This article looks at several important considerations for assessing a security solution for your hybrid cloud environment.

Using thermal imaging for security

11 September 2014. | Do you work in counter surveillance or physical penetration testing? The physical security field in general? If yes, have you considered using a thermal imaging camera to help you in your work?

How a large ISP fights DDoS attacks with a custom solution

10 September 2014. | What weapons can an ISP bring to the battleground?


    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //