Help Net Security
New data breach legislation
In the past two months, there have been two bills introduced in Washington, D.C. that are attempting to set nationwide standards for the security and privacy of …
Disk encryption software Cryptic Disk 3.0 released
Exlade released Cryptic Disk 3.0 which allows users to create virtual encrypted disks as well as encrypt hard disks, drive partitions, USB drives and memory cards. The …
Week in review: Russian hackers’ identikit, DDoS spam and Android spying app
Here’s an overview of some of last week’s most interesting news, videos and articles: Who is the typical Russian hacker? Two security researchers have spent 6 …
Adobe releases Acrobat, Reader security updates
New versions of Adobe Reader (9.3.4) and Acrobat (9.3.4, 8.2.4) have been released today in order to patch critical vulnerabilities in earlier versions of the two programs for …
Intel to acquire McAfee
Intel Corporation has entered into a definitive agreement to acquire McAfee for approximately $7.68 billion. Both boards of directors have unanimously approved the deal, which …
Top 10 most dangerous celebrity searches
Cameron Diaz has replaced Jessica Biel as the most dangerous celebrity to search for on the Web, according to security company McAfee. The company researched popular …
Oracle interrupted: Stealing sessions and credentials
In this video from OWASP AppSec Research 2010, Wendel G. Henrique and Steve Ocepek from Trustwave look at Oracle sessions and credentials, take them apart and take them over.
FGET: Network-capable forensic data acquisition tool
FGET which is short for “Forensic Get” is a network-capable forensic data acquisition tool. It’s primary function is collecting sets of forensically …
Resourceful attackers continue to make the web insecure
Attackers are staying one step ahead of the game and enterprises are struggling to keep up, according to a report by Zscaler. During the second quarter of 2010, attackers once …
Employees admit they would steal data when leaving a job
Employees openly admit they would take company data, including customer data and product plans, when leaving a job, according to Harris Interactive. The online survey probed …
Over 200 websites use Justin Bieber as bait to distribute malware
PandaLabs detected more than 200 spoof Web addresses using the name of Justin Bieber as bait to lure users. By including the name of this popular singer in malicious links, …
WhatWeb: Fingerprint Web servers and applications
WhatWeb allows you to identify content management systems, blogging platforms, stats/analytics packages, javascript libraries, servers and more. When you visit a website in …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware