Help Net Security
Web-based stealth attacks on network security will dominate 2011
Viruses will become more subtle and even harder to detect in 2011, and the primary line of attack will continue to be via the internet, according to Redscan. Malware is now …
Cisco IOS penetration testing with Metasploit
The Metasploit Framework and the commercial Metasploit products have always provided features for assessing the security of network devices. With the latest release, we took …
Virus yearbook 2010: Mariposa, Stuxnet and MSNWorm most noteworthy
PandaLabs is closing the year with a look at some of the unique and noteworthy viruses that have appeared over the last twelve months. The list of viruses is vast and varied, …
The world of mobile security fears and escalating compliance
2010 was another year of living dangerously. Companies dealt with huge increases in malware threats, growing mobile security concerns about consumer devices such as iPads, and …
Using social networks to profile, find and own your victims
In this video from DojoCon 2010, Dave Marcus, the Director of Security Research at McAfee Labs, illustrates the dangers of doing unintelligent things online. Dave shows you …
Cisco AnyConnect: Secure network connectivity for Apple iOS
Cisco AnyConnect Secure Mobility Solution, available from the App Store, offers highly secure network connectivity from any Apple iOS 4.1 device, improving the productivity of …
Upsurge of attacks aimed at Facebook, iPad and smartphones
If you thought 2010 was challenging, just wait for 2011. Below are our top five 2011 security predictions for the coming year from Websense: The Stuxnet sequels are coming, …
Free security tool detects vulnerable and outdated software
Secunia released version 2.0 of their Personal Software Inspector (PSI), a popular free security tool for home users that protects their personal and financial information …
Facebook scams soar
Facebook users should be careful about survey scams that are quickly spreading across the social network. Many Facebook users are struggling to clean up their accounts once …
How to keep mobile devices secure while traveling
“Tis the season to be jolly – and to leave sensitive corporate information behind at the airport! According to telephone interviews with the lost property offices …
5 steps to detect and prevent fraud in the public sector
Where there is money, there is the potential for misappropriation or misuse – intentional or otherwise. Nowhere is this more apparent than in governments where funds are …
Week in review: Gawker breach, social engineering and security predictions for 2011
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Gawker Media breach claimed by Gnosis The credit for the breach of …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems