Help Net Security
Coding for Penetration Testers
Tools used for penetration testing are often purchased off-the-shelf. Each tool is based on a programming language like Perl, JavaScript, Python, etc. If a penetration tester …
RSA proactively blocks malware threats
RSA announced updates to its CyberCrime Intelligence Service designed to help enterprises monitor and harden their infrastructure against malware infection and data loss. This …
RealPlayer multiple vulnerabilities
Some vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user’s system, according to Secunia. 1. A …
Human Compromise: The Art of Social Engineering
This book teaches you the “how-to” of social engineering. Taking a hands-on approach, you will learn everything from the field-tested methods for reading body …
StealthWatch 6.1 adds internal and external monitoring capabilities
Lancope released a new version of its monitoring platform, the StealthWatch System 6.1. This version increases both the amount and types of flow data that can be processed by …
Integrated content-aware SIEM and firewall
NitroSecurity and Palo Alto Networks have integrated content-aware SIEM and next-generation firewall technology into a complete enterprise security solution designed to …
Researchers identify first flaws in the Advanced Encryption Standard
Researchers have found a weakness in the AES algorithm. They managed to come up with a clever new attack that can recover the secret key four times easier than anticipated by …
Mac OS X Lion 10.7.1 released
Apple unveiled the Mac OS X Lion 10.7.1 Update which is recommended for all users running OS X Lion. The update is only 17.4 MB for an iMac and requires you to reboot after …
Improvements to Google’s privacy policies
Following an audit at Google’s London office, the Information Commissioner’s Office (ICO) believes Google has taken reasonable steps to improve its privacy …
Internet bad neighborhoods
A significant part of current attacks on the Internet comes from compromised hosts that, usually, take part in botnets. Even though bots themselves can be distributed all over …
Digital Forensics for Legal Professionals
Digital Forensics for Legal Professionals provides you with a guide to digital technology forensics in plain English. In the authors’ years of experience in working with …
New module for Metasploit Framework
SecureState released a new auxiliary module for the Metasploit Framework that can reduce the amount of time that it takes to visually fingerprint large amounts of web servers. …
Featured news
Resources
Don't miss
- How CISOs can talk cybersecurity so it makes sense to executives
- How OSINT supports financial crime investigations
- Review: Effective Vulnerability Management
- Vuls: Open-source agentless vulnerability scanner
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)