Help Net Security
TYPO3 multiple vulnerabilities
Multiple vulnerabilities have been reported in TYPO3, according to Secunia. These can be exploited by malicious users to bypass certain security restrictions, conduct script …
Thor’s Microsoft Security Bible
Thor’s Microsoft Security Bible provides a “one-stop-shop” for Microsoft-related security techniques and procedures as applied to the typical deployment of a …
Annual cost of cybercrime highlights need for governance
ISACA commends the Ponemon Institute’s latest “Cost of cybercrime” report for the detail it provides on the indirect costs of IT security attacks, as well as …
The privacy officer’s agenda according to Gartner
Data breaches, cloud computing, location-based services and regulatory changes will force virtually all organizations to review, and at least half of all organizations to also …
Assessing the security of cloud providers
The Cloud Security Alliance announced the launch of a new initiative to encourage transparency of security practices within cloud providers. The CSA Security, Trust & …
Week in review: Mobile drive-bys, Facebook bug bounty and Operation Shady RAT
Here’s an overview of some of last week’s most interesting news and articles: Facebook introduces bug bounty program Facebook has decided to follow in …
July 2011 threat landscape
July has been a hot month for SEO poisoning, and its popularity is expected to continue in August, says GFI. Users to be cautious of likely search term targets for scammers, …
Drive-by attacks targeting smartphones are in our future
A new study that has analyzed the behavior of 10,000 applications downloaded from the Android Market, shows that many mobile applications leak personal information and that …
Hacktivists are “villains”, say IT security pros
The majority of IT security professionals have – unsurprisingly – a negative opinion of “hacktivists”, say the results of a survey of 211 attendees at …
Amazon extends cloud access, enables “identity federation” for accessing it
Amazon Web Services has extended Amazon Virtual Private Cloud (Amazon VPC) to all AWS Regions, allowing enterprises to launch their Amazon VPC environments in the US East and …
Scanning thousands of Web apps in days, not months
Faced with the reality that exploiting a single SQL Injection vulnerability or cross-site scripting (XSS) error in any web application could take down an organization’s …
Penetration testing for mobile phones
Core Security announced the Core Impact Pro v12 penetration testing software, a commercial-grade solution that pinpoints security exposures in Android, BlackBerry and iPhone …
Featured news
Resources
Don't miss
- SoundCloud breached, hit by DoS attacks
- The messy data trails of telehealth are becoming a security nightmare
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements