Help Net Security
Cisco ACS unauthorized password change vulnerability
A vulnerability exists in some Cisco Secure Access Control System (ACS) versions that could allow a remote, unauthenticated attacker to change the password of any user account …
ICSA Labs reveals electronic health record testing program
ICSA Labs unveiled a new certification program for electronic health record systems and has certified the first three products in two domains under the program. ICSA Labs …
Harvest geolocation user info with Creepy
Creepy is an application that allows you to gather geolocation related information about users from social networking platforms and image hosting services. The information is …
The need for data encryption in the cloud
Recent Microsoft research shows that almost two-fifths of companies will start paying for cloud services within three years. Cloud-using firms need to revisit their encryption …
Lifecycle model for managing unknown vulnerabilities
Codenomicon released its Unknown Vulnerability Management (UVM) Lifecycle model, a security assurance process, which focuses on unreported vulnerabilities. The UVM model helps …
Siemens FactoryLink multiple vulnerabilities
Multiple vulnerabilities in Siemens FactoryLink can be exploited by malicious people to disclose potentially sensitive information, cause a Denial of Service, and compromise a …
Qualys partners with StopBadware
Qualys is partnering with the non-profit anti-malware organization StopBadware. The two organizations will leverage one another’s strengths to bolster the Web’s …
Global spam drops by a third as Rustock botnet is dismantled
Symantec analysis reveals that in March, prior to its takedown, the Rustock botnet had been sending as many as 13.82 billion spam emails daily, accounting for an average of …
Cisco to acquire newScale
Cisco today announced its intent to acquire privately-held newScale, a provider of software that delivers a service catalog and self-service portal for IT organizations to …
The most challenging compliance regulation? HIPAA
From an IT standpoint, the Health Insurance Portability and Accountability Act (HIPAA) is the most challenging regulation to businesses today, according to Ipswitch. HIPAA, …
The smartphone: A real bug in your bed
The rise of the smartphone over the past few years has been a technology success story. An almost perfect storm of advancing materials science, chip set development, software …
VPN client suite for Mac OS X
NCP engineering released its centrally managed IPsec VPN client for Mac OS X 10.5 (Intel) and 10.6. Mobile employees using Mac OS X are now able to access the company network …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware