Help Net Security
Protect your online privacy and identity
While consumers were very aware of the risks associated with being online and engaging in ecommerce, the majority of respondents relied on inadequate measures to protect their …
Comodo Internet Security 2011 released
Comodo released its Internet Security Manager 2011 software which offers malware prevention together with central administration features. New in version 2011 are behavior …
Firefox 3.6.11 fixes several security issues
Mozilla released Firefox 3.6.11 that fixes several security issues as well as stability issues. Insecure Diffie-Hellman key exchange Mozilla cryptographer Nelson Bolyard …
10 tips for protecting against cyber espionage
SecureWorks outlines ten tips to help nations ensure that they are protected against the threat of cyber-espionage. “Since IT has become such a critical component of …
Novell Identity Manager 4 released
Novell released their Identity Manager 4 Advanced Edition which ensures consistent identity, security and compliance policies for an organization’s entire IT ecosystem. …
Metasploit Pro released
Rapid7 released Metasploit Pro which improves the efficiency of penetration testers by providing unrestricted remote network access and enabling teams to collaborate …
Suspected money mule arrested in London
Members of the Police Central e-crime Unit arrested a 34-year-old man suspected of organizing money mules to open drop accounts in order to launder the proceeds of online …
Skimming attacks at European ATMs rise 24%
The latest European ATM Crime Report published by EAST (the European ATM Security Team), shows a 24% increase in card skimming attacks at European ATMs. 5,743 attacks were …
Tool to test regular expressions for DoS vulnerabilities
Regular expression patterns containing certain clauses that execute in exponential time (for example, grouping clauses containing repetition that are themselves repeated) can …
Accelerate patching progress in the enterprise
At RSA Conference 2010 Europe last week, Qualys CTO Wolfgang Kandek gave a presentation on how to accelerate the patching progress in the enterprise. It contains example of …
Private key management: Real world tips
It has always been taken for granted that the entire IT security industry understands that, as part of digital certificate management, it is necessary to manage the private …
Nuclear site’s operation details found on lost USB stick?
Reports are coming in that an unencrypted USB stick – apparently containing details on the Sellafield nuclear site’s operations – was found by a coach driver …
Featured news
Resources
Don't miss
- Cybersecurity essentials for the future: From hype to what works
- How FinTechs are turning GRC into a strategic enabler
- Secretless Broker: Open-source tool connects apps securely without passwords or keys
- Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC
- Microsoft introduces protection against email bombing