Help Net Security
Active Directory Change Reporter 7.0 released
NetWrix released Active Directory Change Reporter 7.0 which automates auditing of who changed what, when and where in Active Directory, Group Policy and MS Exchange, for …
Week in review: Booz Allen Hamilton breach, Google+ related scams and malware ecosystems
Here’s an overview of some of last week’s most interesting news and articles: “Casey Anthony confession video” scam spreads The verdict in the …
Verizon takes on issue of stolen credentials
Unauthorized access to corporate networks through stolen user names and passwords topped 45 percent in 2010, making credentials the second most compromised data type, …
Secure mobile device access on single authentication platform
SafeNet announced its new mobile device credentialing solution that enables the secure use of consumer mobile devices on corporate networks. SafeNet’s Authentication …
Mitigating software vulnerabilities
Microsoft released a new whitepaper that describes how exploit mitigation technologies can help reduce or eliminate risk, prevent attacks and minimize operational disruption …
Practical steps to improve your corporate security posture
Sony, Lockheed Martin, Nintendo, Groupon – In fact we could go on and on. Financial services, government agencies, health care records – It doesn’t matter. …
Trend Micro expands SecureCloud
Trend Micro SecureCloud, the encryption service with policy-based key management, has been expanded with a new offering designed for cloud service providers, as well as …
Apache Tomcat security bypass vulnerability
A security issue and a vulnerability have been reported in Apache Tomcat, which can be exploited by malicious, local users to bypass certain security restrictions or cause a …
Analyzing and dissecting Android applications for security defects and vulnerabilities
In March 2011, 58 malicious applications were found in the Android Market. Before Google could remove the applications from the Android Market they were downloaded to around …
Trend Micro Control Manager file disclosure vulnerability
A vulnerability in Trend Micro Control Manager can be exploited by malicious users to disclose sensitive information, according to Secunia. Input passed via the …
SSH client PuTTY 0.61 released
After four long years, here comes a new version of PuTTY, the popular free telnet/SSH client for Windows and Unix platforms. PuTTY 0.61 brings new features, bug fixes, and …
A look at Booz Allen leaked passwords
The recent attack against Booz Allen led to 90,000 leaked passwords. Unlike previous breaches where the passwords weren’t encrypted, it looks like in this case some care …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?