Help Net Security
Nessus 4.2.2 released
The Nessus vulnerability scanner is the world-leader in active scanners, featuring high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and …
5 ways to protect against cloud security threats
Stonesoft has identified five ways that organizations can improve cloud computing security. This announcement comes on the heels of recent research from Gartner citing that 60 …
Fireshark: Linking the malicious web
Fireshark is a tool, made up of a Firefox plugin and a set of postprocessing scripts that allows you to capture web traffic from the core of your web browser, enabling you to …
Spammers use the familiar to inspire action
Spammers have become adept at using the most familiar Internet names to give deceptive legitimacy to the billions of emails that they send. For example, between five to ten …
Apple releases MobileMe Backup 3.2
The Backup 3.2 update improves the overall reliability of Backup and uses space more efficiently on your iDisk or local storage by automatically recycling older backup data. …
How prepared are federal agencies to deal with security threats?
There are distinct gaps among United States federal agency IT executives and IT professional staff when it comes to their opinion on how prepared their agencies are to deal …
Many teenagers hack and rarely get caught
A survey revealed the hacking habits of 1000 New York City teenagers. Exactly half (50%) of kids sampled revealed they’d had their Facebook or email account hacked, …
Facebook revamps its Safety Center
Facebook launched a completely redesigned Safety Center with new resources designed to inform parents, educators, teens, and members of the law enforcement community about …
Secure card reader authentication for iPhone
MagTek launched iDynamo, a secure card reader authenticator, specifically designed to interface with card present payment applications made for the iPad, iPhone 3G and 3GS, …
Microsoft patches 25 vulnerabilities
In today’s Patch Tuesday, Microsoft delivers 11 security bulletins to address 25 vulnerabilities affecting Windows, Office and Exchange. Five bulletins are rated …
15 vulnerabilities patched in Adobe Reader and Acrobat
Critical vulnerabilities have been identified in Adobe Reader 9.3.1 (and earlier versions) for Windows, Macintosh, and UNIX, Adobe Acrobat 9.3.1 (and earlier versions) for …
The lazy programmer’s guide to secure computing
This presentation starts with a simple block of code written by the Lazy Programmer, to observe how laziness made the code more compact and simpler. We then define the …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems