Help Net Security
The secure coding practices quick reference guide
In the video below, Keith Turpin talks about the secure coding practices quick reference guide. It’s a technology agnostic set of general software security coding …
Multiple vulnerabilities in IBM Lotus Mobile Connect
A weakness and two vulnerabilities have been reported in IBM Lotus Mobile Connect, according to Secunia. These can be exploited by malicious people with physical access to …
The criminal in your browser is real
Evidence is everywhere that cyber criminals exist, and they’re able to make a substantial living from their illegal activities. While it is true that many are focusing …
The security landscape from 2010 to 2011
Vendor-neutral testing and certification firm ICSA Labs offers its thoughts on the security landscape spanning 2010 and 2011. Mobile security 1. While most hackers heavily …
Week in review: DDoS attacks, anti-Facebook worm and identity in the digital age
Here’s an overview of some of last week’s most interesting news, interviews, videos, reviews and articles: How to keep mobile devices secure while traveling …
Oracle VM VirtualBox 4.0 released
Oracle VM VirtualBox enables desktop or laptop computers to run multiple operating systems simultaneously, and supports a variety of host operating systems, including Windows, …
Hacker recovers stolen computer and gets criminal caught
In this video recorded at DEFCON, a hacker has his computer stolen, and tells the story of how he recovered it and got the criminal caught. Although the story is quite …
All versions of Internet Explorer under threat
Today Microsoft released a new security advisory to help protect users from a vulnerability affecting Internet Explorer versions 6, 7, and 8. Exploiting this vulnerability …
Steganos Privacy Suite 12 released
The latest version of the all-in-one data protection software, Steganos Privacy Suite 12, combines eight tools for optimizing user privacy protection, including: data …
Win a copy of Practical Lock Picking!
We are giving away two copies of “Practical Lock Picking“. For the first time, Deviant Ollam, one of the security industry’s best-known lockpicking teachers, …
Tips for creating a strong password
To ensure consumers stay safe online and enjoy this holiday season, Check Point outlines practical tips for creating a strong password. Choose a password that is at least 8 to …
Threat modeling best practices
In the video below, Robert Zigweid, senior security consultant at IOActive, talks about threat modeling best practices. The video was recorded at the OWASP AppSec USA 2010 …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?