Help Net Security
Cloud security spotlight at Black Hat
The Cloud Security Alliance will be hosting the second “Cloud Security Alliance Summit at Black Hat”. The CSA Summit at Black Hat will be presented as a half-day …
Employees bypass security roadblocks to engage in social networking
Even though more workplaces are regulating social networking sites, employees are finding ways around security roadblocks, making social networking a way of office-life around …
Metasploit Framework 3.4.1 released
The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration …
Increased safety for young Facebook users
Young Facebook users across the UK are the focus of a new initiative being launched today by the UK’s national centre for child protection – the Child Exploitation …
Microsoft unveils Windows Azure platform appliance
Microsoft announced the limited production release of the Windows Azure platform appliance, a turnkey cloud platform for large service providers and enterprises to run in …
Week in review: YouTube, iTunes, The Pirate bay hacked, Facebook scams and Twitter kits
Here’s an overview of some of last week’s most interesting news, interviews and articles: Most cyber attacks target the U.S. SecureWorks announced the findings of …
Technical support – they’re not always the good guys
Recently, we’ve noticed that the rogue AVs being spread are all equipped with an “Online Support” button. See the top right corner: Pressing Support takes …
Black Hat USA 2010 presents over 30 new vulnerabilities
Black Hat USA 2010, taking place later this month in Las Vegas, will spotlight new vulnerabilities, tools, programs and big names, including a Cyber War discussion by General …
Phone-based authentication for IBM Tivoli Access Manager
PhoneFactor has added support for IBM Tivoli Access Manager to its suite of authentication solutions and can now seamlessly enable phone-based two-factor authentication to …
Web safety score checklist
Are you sure your most sensitive financial and personal information is safe when you’re banking or shopping online? The Web Safety Score checklist by SafeCentral helps …
Critical infrastructure security booming in the EU
New analysis from Frost & Sullivan finds that market growth is fueled by government funds and private investments. EU security regulation compliance requirements and the …
Cloud-based security through Amazon Web Services
Sourcefire is delivering cloud-based Intrusion Prevention services, based on its open source Snort technology. Snort and Sourcefire Vulnerability Research Team (VRT) rules are …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware