Help Net Security
Rogue software details: VirusOut
VirusOut is a rogue security application. In order to remove it, find out what folders and registry entries to look for below. Known system changes: Folders …
OWASP releases list of top 10 web application risks
Since 2003, application security researchers and experts from all over the world at the Open Web Application Security Project (OWASP) have carefully monitored the state of web …
Week in review: Apache.org hacked, Facebook ups defenses, Adobe and Microsoft patches
Here’s an overview of some of last week’s most interesting news, articles, and podcasts: Endpoint data leak prevention still a major headache More than one in …
Open authentication standards and OATH
In this podcast, Siddharth Bajaj, Principal at Verisign Labs and Chair of the Joint Coordination Committee which leads the Initiative for OATH (Open AuTHentication), talks …
GFI Backup 2010 – Business Edition released
GFI Software released GFI Backup 2010 – Business Edition, suited for IT administrators who want to create a single backup/restore task and apply it across the entire …
Nessus 4.2.2 released
The Nessus vulnerability scanner is the world-leader in active scanners, featuring high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and …
5 ways to protect against cloud security threats
Stonesoft has identified five ways that organizations can improve cloud computing security. This announcement comes on the heels of recent research from Gartner citing that 60 …
Fireshark: Linking the malicious web
Fireshark is a tool, made up of a Firefox plugin and a set of postprocessing scripts that allows you to capture web traffic from the core of your web browser, enabling you to …
Spammers use the familiar to inspire action
Spammers have become adept at using the most familiar Internet names to give deceptive legitimacy to the billions of emails that they send. For example, between five to ten …
Apple releases MobileMe Backup 3.2
The Backup 3.2 update improves the overall reliability of Backup and uses space more efficiently on your iDisk or local storage by automatically recycling older backup data. …
How prepared are federal agencies to deal with security threats?
There are distinct gaps among United States federal agency IT executives and IT professional staff when it comes to their opinion on how prepared their agencies are to deal …
Many teenagers hack and rarely get caught
A survey revealed the hacking habits of 1000 New York City teenagers. Exactly half (50%) of kids sampled revealed they’d had their Facebook or email account hacked, …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)