Help Net Security
Wireshark 1.4.0 released
Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. The following features are new (or have been …
Mobile security cloud model
The first mobile security cloud model was introduced by NetQin Mobile today. The model is composed of three parts: A cloud security platform – knowledge repositories …
Rails 3.0 comes with XSS protection
After two years of development and 1600 contributors, Rails 3.0 has been released. The internet is a scary place and Rails 3 is watching out for you by default. Rails had CRSF …
New Netgear ProSecure appliance
Netgear introduced the ProSecure UTM50 Unified Threat Management Appliance (UTM50) which protects businesses from the growing number of virus and malware threats, dangerous …
Building secure web mashups
In this video from OWASP AppSec Research 2010, you can learn more about building secure web mashups.
HP CloudStart: Fast track private clouds
HP CloudStart is an all-in-one solution for deploying an open and flexible private cloud environment within 30 days. Consisting of hardware, software and services, HP …
Too many disclose sensitive information on social networks
Social networking users should be careful when accepting friend requests and to be conscious of the data they share. According to a new study by BitDefender, social network …
Week in review: New data breach legislation, cloud hacking and the return of the Alureon rootkit
Here’s an overview of some of last week’s most interesting news and articles: Trojan simulates MS Security Essentials Alert, peddles fake AV A Trojan imitating a …
Network security challenges faced by universities
Striking a balance between an open yet secure network remains a challenge for university IT departments. While universities are often on the cutting edge of innovation, they …
Private cloud automation platform
Quest Software released Cloud Automation Platform 7.5, its enterprise-class cloud automation and management technology. New features include: Instant cloud insight with the …
Building secure software using fuzzing and static code analysis
The increased complexity of new technologies and faster software release cycles are making traditional reactive security solutions ineffective. Instead, more adaptable, …
25% of new worms are designed to spread through USB devices
In 2010, 25 percent of new worms have been specifically designed to spread through USB storage devices connected to computers, according to PandaLabs. These types of threats …
Featured news
Resources
Don't miss
- Black Friday 2025 cybersecurity deals to explore
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about
- Salesforce Gainsight compromise: Early findings and customer guidance