Help Net Security
Week in review: Assange arrested, 2011 threat landscape and first VoIP call from space
Here’s an overview of some of last week’s most interesting news and articles: McAfee’s Secure Short URL Service not so secure M86 Security Labs’ …
Security, is there an app for that?
Smartphones are now an essential tool across all sections of society, from top government officials to businesses and consumers. If you are one of the hundreds of millions of …
Underground toolkits will make cyber espionage easy
With the growing diversity of operating systems among companies, as well as the growing use of mobile devices, cybercriminals should have a very profitable 2011. Their tactic …
Advanced iPhone spy application
Mobistealth launched an advanced iPhone spy application which can be installed on any iPhone and runs completely in the background. The application is virtually undetectable …
Firefox 3.6.13 fixes many security issues
Mozilla released Firefox 3.6.13 that fixes several security issues. Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16) Mozilla developers identified and fixed several …
Deploy and remotely execute programs on Windows networks
RemoteExec for Windows is an agentless, encrypted software solution that allows IT pros to: Quickly and easily deploy MSI packages, Service Packs, patches, hotfixes, etc. …
New book: Troubleshooting Windows 7 Inside Out
You’re beyond the basics, so dive right into troubleshooting Windows 7 and really put your PC to work! Troubleshooting Windows 7 Inside Out describes hundreds of …
Increased illicit behavior on Internet pharmacies
Of the nearly 7,000 sites reviewed by the National Association of Boards of Pharmacy, only 4% of those online sites appear to be in compliance with pharmacy laws and practice …
Trojans dominate the threat landscape
As in recent months, Trojans dominated the threat landscape in November, according to GFI Software. Their data revealed that seven of the top 10 malware threats were …
Run Nmap on Android
Droidmap is an Android application for root users that implements some functions of Nmap in a GUI. This program comes with installer scripts for the installation of the …
Scammers preying on those wanting to adopt
The IC3 received information from law enforcement and complaints filed with the IC3 concerning an adoption scam. The scam is an attempt to collect personal information and …
Learn Cisco networking while playing a game
The Cisco CCENT Mind Share Game is a multimedia PC game that helps users acquire knowledge necessary for success on CCENT and CCNA exams. Featuring more than 75 stages, the …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware