Help Net Security
First embedded Linux OS to be accepted for EAL4+ certification
Wind River Linux Secure, a secure embedded Linux, is in evaluation by the National Information Assurance Partnership (NIAP) to be certified to Common Criteria Evaluation …
Cloud security spotlight at Black Hat
The Cloud Security Alliance will be hosting the second “Cloud Security Alliance Summit at Black Hat”. The CSA Summit at Black Hat will be presented as a half-day …
Employees bypass security roadblocks to engage in social networking
Even though more workplaces are regulating social networking sites, employees are finding ways around security roadblocks, making social networking a way of office-life around …
Metasploit Framework 3.4.1 released
The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration …
Increased safety for young Facebook users
Young Facebook users across the UK are the focus of a new initiative being launched today by the UK’s national centre for child protection – the Child Exploitation …
Microsoft unveils Windows Azure platform appliance
Microsoft announced the limited production release of the Windows Azure platform appliance, a turnkey cloud platform for large service providers and enterprises to run in …
Week in review: YouTube, iTunes, The Pirate bay hacked, Facebook scams and Twitter kits
Here’s an overview of some of last week’s most interesting news, interviews and articles: Most cyber attacks target the U.S. SecureWorks announced the findings of …
Technical support – they’re not always the good guys
Recently, we’ve noticed that the rogue AVs being spread are all equipped with an “Online Support” button. See the top right corner: Pressing Support takes …
Black Hat USA 2010 presents over 30 new vulnerabilities
Black Hat USA 2010, taking place later this month in Las Vegas, will spotlight new vulnerabilities, tools, programs and big names, including a Cyber War discussion by General …
Phone-based authentication for IBM Tivoli Access Manager
PhoneFactor has added support for IBM Tivoli Access Manager to its suite of authentication solutions and can now seamlessly enable phone-based two-factor authentication to …
Web safety score checklist
Are you sure your most sensitive financial and personal information is safe when you’re banking or shopping online? The Web Safety Score checklist by SafeCentral helps …
Critical infrastructure security booming in the EU
New analysis from Frost & Sullivan finds that market growth is fueled by government funds and private investments. EU security regulation compliance requirements and the …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains