Help Net Security
Fake dislike button Facebook scam
Facebook users should be wary of the latest survey scam spreading virally across the network. There are a number of variations of this scam, which sees users unwillingly …
Security software market to grow 11% this year
Worldwide security software revenue is forecast to surpass $16.5 billion in 2010, an 11.3 percent increase from 2009 revenue of $14.8 billion, according to Gartner. Although …
Security information and event management platform
LogLogic 5 was released today. This is a product suite for centralizing and structuring IT data and its features are outlined below. Universal Collection Framework (UCF): The …
Security toolbox for .NET development and testing
In this video from OWASP AppSec Research 2010, Johan Lindfors and Dag K?¶nig from Microsoft talk about a security toolbox for .NET development and testing.
Week in review: Breaking SSL, geotagging risks and the first SMS Android Trojan
Here’s an overview of some of last week’s most interesting news, articles and videos: How to render SSL useless In this video from OWASP AppSec Research 2010, Ivan …
Cisco IOS Software TCP DoS vulnerability
Cisco IOS Software Release, 15.1(2)T is affected by a DoS vulnerability during the TCP establishment phase. The vulnerability could cause embryonic TCP connections to remain …
PCI standard changes ahead
The PCI Security Standards Council (PCI SSC) published documentation highlighting the expected changes to be introduced with version 2.0 of the PCI DSS and PA-DSS in October …
Real-time iPhone tracking app
Life360 launched its iPhone application, Family & Offender GPS Tracker. By leveraging the real-time location capabilities of iOS4, the product enables parents to …
Regulating for the cloud
This videos focus on the regulatory issues on the topic of cloud computing, in terms of the EU Data Protection Framework. The topic is of particular interest from both a …
New QuickTime for Windows fixes security vulnerability
Apple released QuickTime 7.6.7 which addresses a security vulnerability affecting the software running on Windows 7, Vista, XP SP2 or later. A stack buffer overflow exists in …
Source of recent malicious malware campaigns
The Red Condor security team today issued a warning of a new sophisticated email malware threat that is disguised as misdirected personal emails with executable attachments. …
New certification for convergence technologies professionals
CompTIA is collaborating with Certification Partners, owners of the Convergence Technologies Professional (CTP) certification, on a new credential that validates skills and …
Featured news
Resources
Don't miss
- Meta open-sources AI tool to automatically classify sensitive documents
- Why SAP security updates are a struggle for large enterprises
- Attackers fake IT support calls to steal Salesforce data
- Google fixes Chrome zero-day with in-the-wild exploit (CVE-2025-5419)
- How to manage your cyber risk in a modern attack surface