Help Net Security
Security, is there an app for that?
Smartphones are now an essential tool across all sections of society, from top government officials to businesses and consumers. If you are one of the hundreds of millions of …
Underground toolkits will make cyber espionage easy
With the growing diversity of operating systems among companies, as well as the growing use of mobile devices, cybercriminals should have a very profitable 2011. Their tactic …
Advanced iPhone spy application
Mobistealth launched an advanced iPhone spy application which can be installed on any iPhone and runs completely in the background. The application is virtually undetectable …
Firefox 3.6.13 fixes many security issues
Mozilla released Firefox 3.6.13 that fixes several security issues. Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16) Mozilla developers identified and fixed several …
Deploy and remotely execute programs on Windows networks
RemoteExec for Windows is an agentless, encrypted software solution that allows IT pros to: Quickly and easily deploy MSI packages, Service Packs, patches, hotfixes, etc. …
New book: Troubleshooting Windows 7 Inside Out
You’re beyond the basics, so dive right into troubleshooting Windows 7 and really put your PC to work! Troubleshooting Windows 7 Inside Out describes hundreds of …
Increased illicit behavior on Internet pharmacies
Of the nearly 7,000 sites reviewed by the National Association of Boards of Pharmacy, only 4% of those online sites appear to be in compliance with pharmacy laws and practice …
Trojans dominate the threat landscape
As in recent months, Trojans dominated the threat landscape in November, according to GFI Software. Their data revealed that seven of the top 10 malware threats were …
Run Nmap on Android
Droidmap is an Android application for root users that implements some functions of Nmap in a GUI. This program comes with installer scripts for the installation of the …
Scammers preying on those wanting to adopt
The IC3 received information from law enforcement and complaints filed with the IC3 concerning an adoption scam. The scam is an attempt to collect personal information and …
Learn Cisco networking while playing a game
The Cisco CCENT Mind Share Game is a multimedia PC game that helps users acquire knowledge necessary for success on CCENT and CCNA exams. Featuring more than 75 stages, the …
Nessus in the cloud
The Nessus vulnerability scanner features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of an …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)