Help Net Security
New voice identification technology
Neurotechnology introduced VeriSpeak, a new voice identification technology, available in the VeriSpeak SDK and as a new voice identification. VeriSpeak combines voiceprint …
CentOS 6.0 released
CentOS 6.0 for i386 and x86_64 architectures is now available. It is based on the upstream release EL 6.0 and includes packages from all variants. All upstream repositories …
Metasploit: The Penetration Tester’s Guide
The free and open source Metasploit Framework is the most popular suite of penetration testing tools in the world, with more than one million downloads yearly. Metasploit: The …
Week in review: Washington Post Jobs site and Fox News Politics Twitter account breached
Here’s an overview of some of last week’s most interesting news, reviews and articles: Breached Fox News Politics Twitter account announces Obama’s death A …
Speaker line-up for B-Sides Las Vegas 2011
Security B-Sides announced the event details and speaker lineup for B-Sides Las Vegas 2011, being held August 3-4, 2011 at The Artisan Hotel Boutique from 9 a.m. – 6 …
Syringe: Windows injection utility
SecureState released Syringe, a general purpose injection utility for the windows platform. It supports injection of DLLs, and shellcode into remote processes as well as …
Security threats: Unwrapping 2011
2011 has been a busy year so far for cyber criminals. No one can say IT security incidents went under reported, they have certainly been prominent in the headlines. HBGary …
Facebook Forensics
Facebook activities have grown in popularity along with its social networking site. However, many cases involve potential grooming offences in which the use of Facebook …
The Washington Post Jobs site breached
The Washington Post Jobs web site was breached and roughly 1.27 million user IDs and e-mail addresses were impacted by the hack. The attacks occurred on June 27th and 28th. As …
What’s your online reputation?
A new survey found that an almost equal number of respondents claim no negative information exists about them on the Internet while the other half has no idea if damaging info …
CSA to use CloudTrust Protocol
Cloud Security Alliance (CSA) announced that it has received a no‑cost license for the CloudTrust Protocol (CTP) from CSC. The CTP is being integrated as the fourth …
Highlights of recent phishing attacks
GFI Software announced the top 10 most prevalent malware threats for June 2011. Highlights for the month included continued phishing attacks, notably one affecting …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)