Help Net Security
Oracle fixes 127 vulnerabilities in its products
The story here is that Oracle has synced up their Java patching with the rest of their patching cycle and, when it comes to vulnerabilities, Java always steals the show. The …
Video: Hacking back and active defense
In this DerbyCon video, John Strand will demonstrate the Active Defense Harbinger Distribution, a DARPA funded, free Active Defense virtual machine. He will debunk many of the …
Top vertical industry predictions for IT organizations for 2014
Gartner has revealed its top industry predictions for IT organizations and users for 2014 and beyond. Most industries are facing accelerating pressure for fundamental …
Social identity theft protection
Riskive unveiled FriendGuard, a free app that leverages advanced math and science to protect individuals and families against social identity theft and malware attacking their …
Barracuda unveils new firewall models
Barracuda Networks announced five new models of the Barracuda NG Firewall F600, which feature multiple port options and hot-swappable power supplies to accommodate varying …
Fraudware virus targeting Android users in China and South East Asia
NQ Mobile has identified, “Copycat App,” a new fraudware virus threat targeting Android users in China and several countries in South East Asia. “Copycat …
WordPress security threats, protection tips and tricks
Robert Abela is a WordPress Security Professional and founder of WP White Security. In this interview he talks about the main WordPress security risks, offers tips for website …
Video: Antivirus evasion techniques
This video from DerbyCon discusses the basics of the AV evasion problem, what techniques work, which ones don’t and why. The talk has a particular focus on AV evasion as …
CipherCloud delivers searchable strong encryption
CipherCloud has delivered techniques to improve the searchability, usability and security of cloud data protected with AES 256-bit encryption. The solution also enables …
Real-time operational risk and compliance monitoring
Corvil announced a real-time general purpose risk and compliance monitoring solution for all kinds of electronic trading businesses. The solution monitors and captures all …
Video: DIY Command & Control for fun and no profit
Many security professionals have heard about Command & Control botnets, even more have been infected by them. Very few have had the opportunity to actually look inside …
Best practices for threat management
With threats of all types on the rise and increasing costs of security breaches growing (analyst approximate $840,000 per breach), enterprises are investing in numerous threat …
Featured news
Resources
Don't miss
- Roundcube RCE: Dark web activity signals imminent attacks (CVE-2025-49113)
- Balancing cybersecurity and client experience for high-net-worth clients
- CISOs, are you ready for cyber threats in biotech?
- fiddleitm: Open-source mitmproxy add-on identifies malicious web traffic
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?