Help Net Security
Free antispam for Linux mail servers
BitDefender released Free Antispam for Linux Mail Servers, aimed at small businesses and individuals who run mail servers in environments other than Windows but are …
Panda Cloud Internet Protection 3.2 released
Panda Cloud Internet Protection 3.2 includes monitoring and control of P2P protocols, even when encrypted, and protection for exploitable browser vulnerabilities. It also …
Nessus vulnerability scanner 4.4.0 released
The Nessus vulnerability scanner features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security …
Security concerns make 1 in 3 users avoid online banking
According to a survey by Avira, 1 in 3 people don’t use online banking because they’re concerned with safety and almost 50 percent are at least wary of online …
Red Hat Enterprise Linux 6 released
Red Hat announced the general availability of Red Hat Enterprise Linux 6 which delivers extensive new features. Enhancements range from kernel improvements for resource …
First credit card with password generator
Gemalto launched the first credit card to combine one-time password security capabilities with standard payment. This innovation allows banks to provide a single card that …
Mac OS X 10.6.5 upgrades security
Apple released Mac OS X 10.6.5 and Security Update 2010-007 which increases the stability, compatibility, and security of your Mac. AFP Server A null pointer dereference …
ElcomSoft breaks Firefox, Safari, Opera, and Chrome passwords
Elcomsoft Internet Password Breaker now retrieves cached passwords stored in a variety of email clients and Web browsers. The new update adds Mozilla Firefox, Apple Safari, …
Targeted attacks focus on nationalistic and economic cyberterrorism
When it comes to dangerous Web threats, the only constant is change and gone are the days of predictable attack vectors. Instead, modern blended threats such as Aurora, …
Security vendor launches bug bounty
Barracuda Networks announced their Security Bug Bounty Program, an initiative that rewards researchers who identify and report security vulnerabilities in the company’s …
Real time phishing attacks increase
30% of attacks against websites that use two-factor authentication are now utilizing real-time man-in-the-middle techniques to bypass this trusted security mechanism, …
Microsoft November Patch Tuesday bottom line
In the video below, Amol Sarwate, vulnerability labs manager at Qualys discusses this month’s Microsoft Patch Tuesday release. To learn more about patching challenges …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)