Help Net Security
Dell to acquire SecureWorks
Dell has signed a definitive agreement to acquire SecureWorks, a provider of information security services. SecureWorks protects information assets, improves compliance and …
Secure your iMac with a lock
MacLocks is making iMac theft prevention possible, following up their successful iPad lock. The all new Maximum Security iMac lock makes it easier than ever to lock down an …
Mobile users more vulnerable to phishing attacks
Trusteer recently gained access to the log files of several web servers that were hosting phishing websites. Analyzing these log files provided visibility into how many users …
Assessing, testing and validating Flash content
In this video, Peleus Uhley, the Platform Security Strategist at Adobe, talks about assessing, testing and validating Flash content. He discusses cross-site scripting, code …
Tips to securely shred unnecessary files
Organizations often hold on to records that are no longer needed. These records take up valuable storage space and cost money that could otherwise be saved. Adhering to a …
Week in review: less spam, a new Android Trojan and the dark side of Twitter
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: The security landscape from 2010 to 2011 Vendor-neutral testing and …
The significant decline of spam
In October Commtouch reported an 18% drop in global spam levels (comparing September and October). This was largely attributed to the closure of Spamit around the end of …
WordPress 3.0.4 critical security update
Version 3.0.4 of WordPress is a very important update to apply to your sites as soon as possible because it fixes a core security bug in our HTML sanitation library, called …
The dark side of Twitter
In this video, Paul Judge, chief research officer for Barracuda Networks, talks about measuring and analyzing malicious activity on Twitter. He talks about identifying the bad …
45TB of storage in a Linux NAS
Synology released the DS1511+, a five-bay NAS will accept up to two DX510 expansion units for a total of up to 15 drives. Using 3TB drives yields up to 45TB of storage. The …
Execution flow-based web application testing
In this video, Rafal Los, the Security Evangelist at HP, talks about web application security testing and offers a variety of practical tips. The video was recorded at the …
Geolocation, mobile devices and Apple top the list of emerging threats
McAfee unveiled its 2011 Threat Predictions report, outlining the top threats that researchers at McAfee Labs foresee for the coming year. The list comprises 2010’s most …
Featured news
Resources
Don't miss
- RCE flaw in tool for building AI agents exploited by attackers (CVE-2025-3248)
- Exploited: Vulnerability in software for managing Samsung digital displays (CVE-2024-7399)
- What a future without CVEs means for cyber defense
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks