Help Net Security
PC surveillance software for Terminal Servers
Refog announces the release of Refog Terminal Monitor, a centralized software-based employee tracking system for the Terminal Server allowing administrators to track employee …
The impact of structural vulnerabilities on enterprise websites
Dasient released a new research report, “Structural Vulnerabilities on Websites: Why Enterprise Websites Are Vulnerable to Malware Attacks,” which found that, …
Free tool to protect against Windows “.LNK” zero-day flaw
Sophos has released the Sophos Windows Shortcut Exploit Protection Tool, which protects against a vulnerability that allows malicious hackers to exploit a bug in the way that …
Managing your identity, secure access and online storage while protected by the cloud
Webroot announced Webroot Internet Security Complete, the company’s newest consumer offering that integrates cloud-based threat protection with identity management and …
APWG launches offline phishing education program
The Anti-phishing Working Group has contributed its expertise in online fraud to the Internal Revenue Service with the creation of a new consumer fax education initiative to …
Week in review: Adobe Reader sandbox, Stuxnet worm and a new 0-day Windows vulnerability
Here’s an overview of some of last week’s most interesting news, reviews, articles and videos: 10 steps for safe web surfing This is a good time for vacation-goers …
Browser-enforced mitigation against CSRF
This is a video of a talk by Lieven Desmet and Philippe De Ryck at OWASP AppSec Research 2010.
Reporting of security breaches should be included in regular reports
Reports that a leading legal expert has called for the mandatory reporting of all data breaches to the UK Information Commissioner’s Office (ICO) – in order to …
Snort 2.8.6.1 released
Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol …
New book: “Ubuntu for Non-Geeks, 4th Edition”
Ubuntu has been hailed as the Linux distribution for newbies, but getting it up and running isn’t always a walk in the park. Linux is different—but the same unique …
The modern network security landscape
Businesses must change their mindset on security to help ensure that their networks and vital corporate information are protected from evolving security threats, according to …
1.2 million infected by Eleonore exploits toolkit
AVG’s Web security research team has discovered a network of 1.2 million malware-infected computers controlled by cybercriminals who were using the Eleonore exploit …
Featured news
Resources
Don't miss
- Insider risk management needs a human strategy
- Cerbos: Open-source, scalable authorization solution
- Patch Tuesday: Microsoft fixes 5 actively exploited zero-days
- Zero-day exploited to compromise Fortinet FortiVoice systems (CVE-2025-32756)
- Ivanti EPMM vulnerabilities exploited in the wild (CVE-2025-4427, CVE-2025-4428)