Help Net Security
Secunia joins Microsoft System Center Alliance program
Secunia joined the Microsoft System Center Alliance to further support interoperability with System Center Configuration Manager. The Secunia Corporate Software Inspector …
Mac OS X 10.6.7 fixes security vulnerabilities
Apple today released Mac OS X 10.6.7 which increases the stability, compatibility, and security of your Mac. AirPort A divide by zero issue existed in the handling of Wi-Fi …
Tips to keep information secure when filing taxes online
As the IRS tax filing deadline quickly approaches, Identity Finder released tips to help individuals protect private and personally identifiable information. The IRS reports …
The expanding role of digital certificates… in more places than you think
A scribbled signature may have been enough to verify your identity 20 years ago, but today’s online world requires more advanced — and authenticated or encrypted — …
Five security secrets your IT administrators don’t want you to know
As valued members of your organization, IT administrators work every day to keep your infrastructure up and available. But in today’s rush to contain operational costs, …
Week in review: Rustock botnet shutdown, Etsy’s privacy snafu and the RSA hack
Here’s an overview of some of last week’s most interesting news and articles: Anti-phishing tool detects fraudulent sites by analyzing their elements A Hong Kong …
EMC Avamar information disclosure weakness
EMC Avamar is a backup and recovery solution that utilizes data deduplication technology to identify redundant data at the source, minimizing backup data before it is sent …
PHP 5.3.6 fixes security issues
PHP 5.3.6 focuses on improving the stability of the PHP 5.3.x branch with over 60 bug fixes, some of which are security related. Security enhancements and fixes Enforce …
The crucial role of crypto technologies
Crypto technologies play a crucial role in data protection and compliance activities across a wide range of industry sectors, in both private and public organizations, …
5 tips to avoid Japan earthquake and tsunami scams
Unfortunately many cyber crooks are exploiting the tragedy in Japan to get money for unsuspecting surfers. Here are tips from Enigma Software to make sure you don’t …
Battling with manual firewall analysis
In a survey by Skybox Security, 42% of respondents had more than 100 firewalls to manage, and 67% said they have firewalls from multiple vendors. In fact, 54% said their firm …
GFI WebMonitor 2011 released
GFI Software launched GFI WebMonitor 2011, a web filtering and Internet monitoring software that helps to boost employee productivity by giving administrators the ability to …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)