Help Net Security
Secure, high-performance NAS servers from Synology
Synology launched DiskStation DS110+ and DS210+, high-performance and secure 1-bay and 2-bay NAS servers. Web Station allows the hosting of up to 30 websites on a single …
Attackers use final Lost episode to spread rogueware
PandaLabs detected the proliferation in search engines of numerous Web pages distributing the MySecurityEngine fake anti-virus. The “bait’ used in this case has …
Metasploit Framework 3.4.0 released
The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration …
Sourcefire introduces their SSL Appliance
Sourcefire announced its new SSL Appliance which enables the Sourcefire intrusion prevention system (IPS) to inspect SSL-secured traffic – blocking malicious traffic …
RSA fights man-in-the-browser attacks
RSA Man-in-the-Browser Solutions is a portfolio of anti-fraud services designed to provide defense against theft of online information. It includes newly enhanced transaction …
Combat the malvertising threat
Malicious advertising, also referred to as “malvertising,” is a relatively new attack vector for cyber criminals that is quickly on the rise. With malvertising, …
Entrust SPOC ePassport released
Entrust released the Entrust SPOC ePassport solution. An important protocol developed by the European Union and the Brussels Interoperability Group (BIG), SPOC serves as the …
Malware and spam trends continue to grow
A new McAfee report uncovered that a USB worm has taken the No. 1 spot for top malware worldwide. Spam trends show that email subjects vary greatly from country to country …
Web browsers leave ‘fingerprints’ as you surf
An overwhelming majority of web browsers have unique signatures – creating identifiable “fingerprints” that could be used to track you as you surf the …
Cryptmount: Create and manage secure filing systems on Linux
Cryptmount is a utility for GNU/Linux operating systems which allows an ordinary user to mount an encrypted filing system without requiring superuser privileges. It is aimed …
Rogue software details: CyberSecurity
CyberSecurity is a rogue security application. In order to remove it, find out what files to look for below. Known system changes: Files c:\Desktop\Cyber Security.lnk Folders …
A closer look at Carbon Copy Cloner
If you care about your data, you should consider backups as essential, not just important. Apple did a lot for the average user with the introduction of Time Machine, but …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?