Help Net Security
Interim findings of first EU cyber exercise
The interim findings and recommendations of EU Member States participants of the 1st Pan-European Cyber Security Exercise indicate that Cyber Europe 2010 was a useful cyber …
Free antispam for Linux mail servers
BitDefender released Free Antispam for Linux Mail Servers, aimed at small businesses and individuals who run mail servers in environments other than Windows but are …
Panda Cloud Internet Protection 3.2 released
Panda Cloud Internet Protection 3.2 includes monitoring and control of P2P protocols, even when encrypted, and protection for exploitable browser vulnerabilities. It also …
Nessus vulnerability scanner 4.4.0 released
The Nessus vulnerability scanner features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security …
Security concerns make 1 in 3 users avoid online banking
According to a survey by Avira, 1 in 3 people don’t use online banking because they’re concerned with safety and almost 50 percent are at least wary of online …
Red Hat Enterprise Linux 6 released
Red Hat announced the general availability of Red Hat Enterprise Linux 6 which delivers extensive new features. Enhancements range from kernel improvements for resource …
First credit card with password generator
Gemalto launched the first credit card to combine one-time password security capabilities with standard payment. This innovation allows banks to provide a single card that …
Mac OS X 10.6.5 upgrades security
Apple released Mac OS X 10.6.5 and Security Update 2010-007 which increases the stability, compatibility, and security of your Mac. AFP Server A null pointer dereference …
ElcomSoft breaks Firefox, Safari, Opera, and Chrome passwords
Elcomsoft Internet Password Breaker now retrieves cached passwords stored in a variety of email clients and Web browsers. The new update adds Mozilla Firefox, Apple Safari, …
Targeted attacks focus on nationalistic and economic cyberterrorism
When it comes to dangerous Web threats, the only constant is change and gone are the days of predictable attack vectors. Instead, modern blended threats such as Aurora, …
Security vendor launches bug bounty
Barracuda Networks announced their Security Bug Bounty Program, an initiative that rewards researchers who identify and report security vulnerabilities in the company’s …
Real time phishing attacks increase
30% of attacks against websites that use two-factor authentication are now utilizing real-time man-in-the-middle techniques to bypass this trusted security mechanism, …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)