Help Net Security
Cyber-espionage campaign targeting diplomatic and government institutions
Kaspersky Lab identified an elusive cyber-espionage campaign targeting diplomatic, governmental and scientific research organizations in several countries for at least five …
Vulnerability of oil and gas infrastructure drives security investments
Security of critical facilities remains the topmost priority for the global oil and gas industry. Escalating demand for oil and gas, the construction of new facilities, and …
Compliance auditing: The first step to cyber security
Assuring that your company complies with industry standards is imperative. Being compliant not only heightens your reputation and allows you to trade in some industries, it …
High volume biometric fingerprint and iris identification
Neurotechnology released MegaMatcher Accelerator 5.0, a multi-biometric software and hardware solution designed for large-scale projects that require high-volume, high-speed …
Automating security for developers with Minion
Minion is a security testing framework built by Mozilla to brdige the gap between developers and security testers. To do so, it enables developers to scan their projects using …
Browser Exploitation Framework LiveCD
The Browser Exploitation Framework (BeEF) is a penetration testing tool that focuses on the web browser. BeEF allows penetration testers to assess the actual security posture …
Tokenless authentication comes to the cloud
SecurEnvoy has partnered with PasswordBank to bring the leading tokenless two-factor authentication capabilities to the PasswordBank identity management offering. Customers …
Increase in targeted spam and phishing attacks via e-mail
The threat level in the field of e-mail security increased in 2012 and will continue to do so in 2013 – despite the fact that spam levels decreased by 53% in 2012 as …
Automotive black box protects cyber data
The U.S. government rulemaking proposal seeks to mandate an automotive black box / Event Data Recorder (EDR) that you cannot turn-off, disable, or remove. You vehicle may …
Mac Kung Fu, 2nd Edition: Tips, Tricks, Hints, and Hacks
Get over 400 quick and easy tips, tricks, hints and hacks in Mac Kung Fu, Second Edition. Exploit secret settings and hidden apps, push built-in tools to the limit, radically …
Week in review: Java 0-day wreaking havoc, hiding messages in Skype silences, Apple prevents popular app scam tactic
Here’s an overview of some of last week’s most interesting news and articles: Hiding secret messages in Skype silences A group of researchers from the Institute of …
IBM tops U.S. patent list for 2012
IBM received a record 6,478 patents in 2012 for inventions that will enable fundamental advancements across key domains including analytics, Big Data, cybersecurity, cloud, …