Help Net Security
Managed DNS Service integrate DNS, DHCP and IPAM
BlueCat Networks launched Proteus Cloud Services, a managed DNS service that provides control and central management of external DNS as well as enabling organizations to …
Fighting illegal content on the Internet
Detective Sergeant Michael Moran specializes in the domain of online child exploitation and in his address to the Institute, he focused on Interpol’s role in the fight …
How can I know if my computer is infected? 10 signs of infection
Users are often advised to use an antivirus to check if their systems are infected, but with the current cyber-crime scenario, this is simply not enough. Frequently, it takes …
Remote monitoring tool for social networking activity
Awareness Technologies has expanded its WebWatcher monitoring tool for the social media platforms Facebook and MySpace. WebWatcher allows users to install the software and …
Top 5 undiscovered vulnerabilities found on enterprise networks
A report by Lumeta highlights the five most prevalent undiscovered or unknown vulnerabilities commonly found on enterprise networks. 1. Incorrect or incomplete deployments of …
Win a copy of “Nmap Network Scanning” or “Hacking Exposed: Windows Forensics”
If you win, we will e-mail you on August 13. Our weekly newsletter is packed with information security news. You will receive it every Monday morning.
IP-based control over enterprise networks
Cloud Systems announced the release of atmospherics 2.3 which executes control of any networked infrastructure from any device with a web browser. Atmospherics 2.3 allows …
Six arrested for compromising 10,000 online bank accounts
Six people have been arrested on suspicion of stealing credit cards, personal information and banking details as part of a suspected online banking fraud. On Tuesday 3 and …
AV vendors detect on average 19% of malware attacks
Traditional AV vendors continue to lag behind online criminals when it comes to detecting and protecting against new and quickly evolving threats on the Internet, according to …
Paranoid workers access corporate data on vacation
With bags packed, flights booked and foreign currency in their pockets the workforce might be jetting off but they’re definitely not leaving the daily grind behind. …
How Web frameworks kill traditional security scanning
In this video from OWASP AppSec Research 2010, Christian Hang discusses how web frameworks kill your static security scans.
Zero day initiative program updated
HP announced an enhancement to the HP TippingPoint Zero Day Initiative (ZDI) that calls for the publishing of vulnerability advisories no later than six months after flaws are …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains