Help Net Security
Week in review: Epsilon breach, MITM attacks and the execution of the RSA hack
Here’s an overview of some of last week’s most interesting news, reviews, videos and articles: The execution of the RSA hack More than two weeks have passed since …
Cain & Abel 4.9.40 released
Cain & Abel is a password recovery tool for Microsoft operating systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted …
Hacking Unified Communications security
A fundamental shift in the IT security world has taken place. It is the common thread running through these real-world case studies: 1. An enterprise telecoms manager at a …
Uptick in rogue Facebook applications
GFI Software announced the top 10 most prevalent malware threats for the month of March 2011. GFI researchers found that the Japanese tsunami, earthquake and subsequent …
Smartphone users feel more secure than PC users
Many users feel more secure using smartphones to surf the Internet than PCs, and a majority consider the risk of losing personal data higher on computers than on smartphones, …
AVG unveils secure cloud-based storage
AVG Technologies launched AVG LiveKive, a cloud-based storage, sync and share solution. It offers consumers a way to access their personal information, data, files and digital …
Multiple vulnerabilities in Moonlight
Some vulnerabilities have been reported in Moonlight, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security …
Most global energy organizations suffered a breach
More than 75 percent of global energy organizations surveyed admit to having suffered at least one data breach over the last 12 months. Furthermore, 69 percent of …
The true scale of the insider threat
UK employees are likely to either maliciously or accidentally disclose confidential information about their employers to unauthorized personnel. A LogRhythm survey of 3000 UK …
Interpol chief calls for global electronic identity card system
The head of INTERPOL has emphasized the need for a globally verifiable electronic identity card (e-ID) system for migrant workers at an international forum on citizen ID …
Security solutions for intelligent risk mitigation
Cisco announced a series of safety and security product innovations powered by a medianet architecture to help cities, enterprises, small businesses and partners transform the …
Feedback loops in the fight against spam
Nearly everybody gets spam. But do you ever wonder what happens when you click that ‘Report Spam’ button on your mail reader? Does it do anything useful, or is it …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware