Help Net Security
Apple patches plenty of vulnerabilities in Mac OS X
Apple released Security Update 2010-002 which improves the security of Mac OS X. AppKit A buffer overflow exists in the spell checking feature used by Cocoa applications. …
Distributed test lab monitoring and network troubleshooting
Codenomicon launched a Network Analyzer that records test behavior and automatically visualizes network traffic. It provides testers with a clear picture of actual network …
90% of critical Windows 7 vulnerabilities are mitigated by eliminating admin rights
The removal of administrator rights from Windows users is a mitigating factor for 90% of critical Windows 7 vulnerabilities, according to research by BeyondTrust. The results …
Week in review: Mafia-like cyber crime syndicates, Pwn2Own contest and cloud computing risks
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Law firms are the new banks The new favorite targets of cyber …
Is it safe to file your taxes online?
Tax season. It’s not a favorite time of year for most people, but the deadline for filing income taxes for many countries is quickly approaching. And, especially in …
On the origin of spam
So you received another spam e-mail message. On the surface it seems rather ordinary. It’s an advertisement for a handful of brand-name prescription drugs. When viewed …
Rogue software details: Home Personal Antivirus
Home Personal Antivirus is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Millions continue to click on spam
Even though over 80% of email users are aware of the existence of bots, tens of millions respond to spam in ways that could leave them vulnerable to a malware infection, …
First dual biometric reader
ZK Software ntroduced the world’s first dual biometric reader. Just the touch of a finger, a one second facial scan or flash of an ID card is all it takes for the iFace …
Checklist to accelerate your software security efforts
In recent years, Software-as-a-Service (SaaS) has emerged as a viable application delivery method, and most enterprises are now including some SaaS software in their …
Symantec web security monitoring against pervasive threats
Symantec announced Web Security Monitoring, a new managed security service which monitors organizations’ proxy and gateway security devices for connections from hosts …
Turning point for security decision making
According to IBM and The Ponemon Institute research, 77 percent of C-level executives report that their organization has experienced a data breach at some point, while all …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?