Help Net Security
CORE Security updates its vulnerability assessment software
CORE Security released the latest version of CORE Impact Professional vulnerability assessment and penetration testing software, that allows organizations to proactively test …
Tridium enhances Niagara Framework
Tridium released the latest update to its core software, NiagaraAX Framework 3.7. This release includes built-in mobile support, updated graphics, enhanced security features, …
OS X Mountain Lion Pocket Guide
Get the concise information you need to start using OS X Mountain Lion, the latest version of the Mac operating system. This handy guide goes right to the heart of the OS, …
Win a free ticket to RSA Conference Europe 2012
RSA Conference Europe 2012 is scheduled to be held in London on October 9-11, and Help Net Security is offering a free ticket to the event for one lucky reader. RSA Conference …
RSA and Guidance Software partner on incident response
Guidance Software announced an interoperability partnership with RSA to interconnect Guidance’s EnCase Cybersecurity and the RSA enVision SIEM platform to enable …
Prenus: The pretty Nessus
Prenus is a hacked together Ruby script that can consume Nessus 2 files – with the help of an updated ruby-nessus gem. Prenus allows the output of a few different …
Limited seats remain for SANS Forensics Summit in Prague
Organisers have made a “last call” for attendees to register for SANS first dedicated Digital Forensics event in Prague this October. The weeklong event begins on …
Secure Android tablet with NFC
INSIDE Secure and TazTag introduced the TazPad V2, a fully featured seven-inch Android 4.0 tablet that gives solution providers a solution for use in mobile banking, stock …
Open source Web server scanner Nikto 2.1.5 released
Nikto is an open source web server scanner which performs comprehensive tests against web servers for multiple items, including over 6500 potentially dangerous files/CGIs, …
OS X Mountain Lion: The Missing Manual
OS X 10.8 Mountain Lion comes with 200 new features like dictation, Notification Center, and Reminders—but not a single page of instructions. Fortunately, David Pogue is …
Week in review: Blackhole 2.0 is out, Windows 8 users open to Flash exploits, and botnet C&Cs hidden in the Tor network
Here’s an overview of some of last week’s most interesting news and articles: Apache HTTP Server set to ignore IE10’s Do Not Track request Microsoft’s …
Android malware threats analysis
Bitdefender released its August 2012 Android malware threats report. While in August the percentage of adware-bundled apps dropped to 55.15 per cent, from July’s 77.34 …
Featured news
Resources
Don't miss
- RCE flaw in tool for building AI agents exploited by attackers (CVE-2025-3248)
- Exploited: Vulnerability in software for managing Samsung digital displays (CVE-2024-7399)
- What a future without CVEs means for cyber defense
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks