Help Net Security
How secure is our personal healthcare information?
Forty-seven percent of IT security professionals believe their personal healthcare information is less secure than it was 12 months ago according to a survey by nCircle. The …
Highly critical vulnerability in Safari for Windows
A vulnerability has been discovered in Apple Safari 4.0.5 for Windows, which can be exploited to compromise a system. The vulnerability is caused due to an error in the …
BackTrack 4 R1 Dev public release
BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to …
SQLninja 0.2.5 released
SQLninja is a tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end. Its main goal is to provide a remote …
Week in review: Money mules, community anti-virus and Facebook bugs and privacy issues
Here’s an overview of some of last week’s most interesting news, articles, interviews and reviews: Mobilizing a community to fight malware The word about …
Botnets battling for digital real estate
April saw high activity from multiple botnets, namely Gumblar and Sasfis, according to a report by Fortinet. While Gumblar remained in the No. 1 position in Fortinet’s …
Rogue software details: RST Antivirus 2010
RST Antivirus 2010 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Wireshark 1.2.8 released
Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. The following bugs have been fixed: HTTP parser limits …
Suricata: Network intrusion detection and prevention engine
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded …
Firewall Builder 4.0 released
Firewall Builder helps you write and manage configuration for your firewalls. It writes iptables commands, pf.conf file, Cisco router access lists or PIX configuration for …
Security risks of web application programming languages
A new WhiteHat report examined the security of specific programming languages. Until now, no other website security study has provided detailed research on how programming …
Freeware detects performance loss across the network
Disk Performance Analyzer for Networks 3.0 (DPAN) is a free utility that detects and reports severe fragmentation-related performance loss across the network, all from one …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems