Help Net Security
How to choose a web vulnerability scanner
Robert Abela is a Technical Manager at Acunetix and in this interview he discusses the process of choosing a web vulnerability scanner and underlines several factors that …
NetBSD 5.1 released, security fixes abound
NetBSD 5.1 represents a selected subset of fixes deemed critical for security or stability reasons, as well as new features and enhancements. Security advisory fixes: …
Agnitio: Security code review tool
Agnitio is an application security tool developed by David Rook to help further the adoption of the Principles of Secure Development and to bring more repeatability and …
Week in review: Cybercrime victims, PayPal phishing and Moxie Marlinspike
Here’s an overview of some of last week’s most interesting news and interviews: Top 10 security threats for 2011 Imperva announced their predictions for the top …
Security tips for safer online shopping from mobile devices
47% of employees shopping online will use their company-issued mobile devices: notebook computers, tablets or smart phones. “Digital natives”—ages 18-34, the …
Free tool prevents AutoRun-based malware
Endpoint Protector launched the free AutoRun Disable tool, a solution designed to prevent malware infections spread through USB ports and other computer interfaces and which …
You can do everything right and still be a security attack victim
More organizations now rate information security an upper level priority compared to two years ago, according to a study by CompTIA. But that good news is offset by bad news. …
Most common malware detected on Macs
Recently Sophos launched its free Mac anti-virus for home users which now has 150,000 active users and Sophos has analyzed the most commonly encountered malware that Mac users …
Online backup Mozy 2.0 for Mac released
Mozy 2.0 for Mac is now available. With improved features and a native-Mac experience, it makes it easier and faster for Mac users to run and monitor backups and restores …
Cloud-based crack of SHA-1 passwords is a taste of things to come
Reports that a German hacker has successfully cracked a secure hashing algorithm (SHA-1) password using a pay-as-you-use cloud computing based parallel processing environment …
Vast majority of organizations continue to adopt encryption
For the first time regulatory compliance has surpassed data breach mitigation as the top reason why organizations deploy encryption technologies, according to Ponemon …
Dell releases endpoint encryption solution
Dell today announced Data Protection | Encryption, a flexible, manageable and auditable endpoint encryption solution. The solution is designed to help companies protect …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)