Help Net Security
Splunk 4.0.10 released
Splunk released version 4.0.10 of the Splunk IT search and analysis engine. The following issues have been resolved in this release: As of Splunk version 4.0.10, summary index …
European banks lack document security
Financial services companies across Europe are unintentionally putting their confidential information at risk, according to research from Ricoh. At the heart of the issue is …
Brandjacking: Online brand abuse soars
Online brand abuse rose across major industries in 2009 according to the MarkMonitor Brandjacking Index. The report reveals the total number of phishing attacks was at an …
Rogue software details: Smart Security
Smart Security is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Does Web 2.0 need Web security 2.0?
Web 2.0 is thriving, and so too are applications that take advantage of this technology. Interactive sites like LinkedIn, Twitter and even company websites are becoming ever …
Collection of security checks for Linux
Buck Security is a collection of security checks for Linux. It was designed for Debian and Ubuntu servers, but can be useful for any Linux system. The aim of Buck Security is, …
Introducing the Cyber Defence conference
Cyber warfare has become a major concern for international governments, military and civil agencies over the past few years. A recent wave of cyber attacks against NATO member …
Week in review: Compromised hardware, AV failures and published IE 0-day exploit
Here’s an overview of some of last week’s most interesting news, articles and interviews: Zuckerberg hacked into journalists’ email? The Facebook co-founder …
Apple Safari 4.0.5 patches critical vulnerabilities
Safari 4.0.5 includes improvements to performance, stability, and security. ColorSync An integer overflow that could result in a heap buffer overflow exists in the handling of …
PeerSec MatrixSSL: Embedded SSL and TLS implementation
MatrixSSL is an embedded SSL implementation designed for small footprint applications and devices. It allows secure management of remote devices. PeerSec Networks offers a …
New Federal IT security certification program
A new certification program specifically designed and tailored to help secure the nation’s Federal information technology systems was unveiled today. The certification …
Koobface worm doubles its number of command and control servers
The shut down and recovery of the Troyak-as command and control center (C&C) for the active Zeus botnet was good news for the whole IT security community. Unfortunately, …
Featured news
Resources
Don't miss
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations
- How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”
- Google strengthens secure enterprise access from BYOD Android devices