Help Net Security
Prenus: The pretty Nessus
Prenus is a hacked together Ruby script that can consume Nessus 2 files – with the help of an updated ruby-nessus gem. Prenus allows the output of a few different …
Limited seats remain for SANS Forensics Summit in Prague
Organisers have made a “last call” for attendees to register for SANS first dedicated Digital Forensics event in Prague this October. The weeklong event begins on …
Secure Android tablet with NFC
INSIDE Secure and TazTag introduced the TazPad V2, a fully featured seven-inch Android 4.0 tablet that gives solution providers a solution for use in mobile banking, stock …
Open source Web server scanner Nikto 2.1.5 released
Nikto is an open source web server scanner which performs comprehensive tests against web servers for multiple items, including over 6500 potentially dangerous files/CGIs, …
OS X Mountain Lion: The Missing Manual
OS X 10.8 Mountain Lion comes with 200 new features like dictation, Notification Center, and Reminders—but not a single page of instructions. Fortunately, David Pogue is …
Week in review: Blackhole 2.0 is out, Windows 8 users open to Flash exploits, and botnet C&Cs hidden in the Tor network
Here’s an overview of some of last week’s most interesting news and articles: Apache HTTP Server set to ignore IE10’s Do Not Track request Microsoft’s …
Android malware threats analysis
Bitdefender released its August 2012 Android malware threats report. While in August the percentage of adware-bundled apps dropped to 55.15 per cent, from July’s 77.34 …
Best practices for mobile software developers
The PCI Security Standards Council (PCI SSC), a global, open industry standards body providing management of the Payment Card Industry Data Security Standard (PCI DSS), …
Worldwide security infrastructure market will grow 8.4%
While the global economic slowdown has been putting pressure on IT budgets, security is expected to remain a priority through 2016, according to Gartner. Worldwide spending on …
Messaging security platform for mobile network operators
Cloudmark announced Cloudmark Mobile Platform 3.0, a solution that provides real-time visibility and control of mobile messaging threats originating from internal or external …
RSA unifies identity and access management
RSA announced new solutions within its Identity and Access Management (IAM) suite designed to address security challenges that require new ways to manage and protect the …
Mobile device data visualization for field investigators
Cellebrite introduced UFED Link Analysis, a new product that allows field investigators to visualize key relationships between suspects and identify important behavior by …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems