Help Net Security
Mobile tracking, remote phone locking and data wiping
Spare Backup launched Spare Mobile Security, a suite of software tools that provide users the means to remotely manage their mobile device. The suite includes five features: …
Facebook is the top source for malware infections
The use of social networking during working hours is common (77% of employees do), and consequently, 33% say they have been infected by malware corporate network that has been …
How bad are the web bad guys?
As the bad guys look for new ways to exploit holes in technology, they have become increasingly financially motivated, with organized crime picking up where the …
Secure file transfer with StuffIt Deluxe 2011
Smith Micro released StuffIt Deluxe 2011 for the Mac, which introduces StuffIt Destinations, a new drag-and-drop toolbar application designed to help users securely transfer …
Apple patches QuickTime for Windows
Apple released QuickTime 7.6.8 that patches two vulnerabilities affecting Windows 7, Vista, XP SP2 or later. An input validation issue exists in the QuickTime ActiveX control. …
Social engineering definitely a massive threat
A report by Social-Engineer.Org reveals some alarming information regarding a DEFCON CTF contest which included targets such as BP, Shell, Apple, Google, Microsoft, Cisco …
Run Nessus on your iPhone
Tenable released an iPhone application for its Nessus Vulnerability Scanner, providing Nessus users the ability to remotely connect to a Nessus server, launch scans and review …
ZBot removal tool
ZBot (also known as Zeus, ZeusBot or WSNPoem) is a Trojan engineered to steal sensitive data from compromised computers. While ZBot focuses mainly on the online banking …
NPF: NetBSD’s new packet filter
The NetBSD Foundation announced NPF, a new packet filter designed for high performance on multiprocessor machines, and for easy extensibility. Highlights of NPF features …
Google fixes security issues in Chrome
Google Chrome 6.0.472.59 has been released to the Stable and Beta channels for Windows, Mac, and Linux. Security fixes: High use-after-free when using document APIs during …
Top security technologies that stem data breaches
Securosis announced the findings of a comprehensive independent data security survey of more than 1100 multinational IT security practitioners. The survey focused on …
F-Secure Internet Security 2011 released
F-Secure Internet Security 2011 has been designed to be non-intrusive. This means the product only asks for the user’s attention when it’s really necessary. The …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)