Help Net Security
Waledac botmasters use Virut malware to build a new botnet
Despite having been swooped down on by security companies and law enforcement a couple of times, the botmasters of the Waledac (Kelihos) botnet refuse to give up and are using …
Wombat unveils social engineering security training module
Wombat released its social engineering training module to defend against social engineering threats, including spear phishing and social media-based attacks. Commonly defined …
Free virtual machine management tool
vOPS Server Explorer is a suite of five free utilities for VM administrators. The included tools are: Storage Explorer – Storage performance and capacity views across …
Cyber-espionage campaign targeting diplomatic and government institutions
Kaspersky Lab identified an elusive cyber-espionage campaign targeting diplomatic, governmental and scientific research organizations in several countries for at least five …
Vulnerability of oil and gas infrastructure drives security investments
Security of critical facilities remains the topmost priority for the global oil and gas industry. Escalating demand for oil and gas, the construction of new facilities, and …
Compliance auditing: The first step to cyber security
Assuring that your company complies with industry standards is imperative. Being compliant not only heightens your reputation and allows you to trade in some industries, it …
High volume biometric fingerprint and iris identification
Neurotechnology released MegaMatcher Accelerator 5.0, a multi-biometric software and hardware solution designed for large-scale projects that require high-volume, high-speed …
Automating security for developers with Minion
Minion is a security testing framework built by Mozilla to brdige the gap between developers and security testers. To do so, it enables developers to scan their projects using …
Browser Exploitation Framework LiveCD
The Browser Exploitation Framework (BeEF) is a penetration testing tool that focuses on the web browser. BeEF allows penetration testers to assess the actual security posture …
Tokenless authentication comes to the cloud
SecurEnvoy has partnered with PasswordBank to bring the leading tokenless two-factor authentication capabilities to the PasswordBank identity management offering. Customers …
Increase in targeted spam and phishing attacks via e-mail
The threat level in the field of e-mail security increased in 2012 and will continue to do so in 2013 – despite the fact that spam levels decreased by 53% in 2012 as …
Automotive black box protects cyber data
The U.S. government rulemaking proposal seeks to mandate an automotive black box / Event Data Recorder (EDR) that you cannot turn-off, disable, or remove. You vehicle may …
Featured news
Resources
Don't miss
- How nations build and defend their cyberspace capabilities
 - Uncovering the risks of unmanaged identities
 - Deepfakes, fraud, and the fight for trust online
 - Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military