Help Net Security
Rogue software details: Antivirus 7
Antivirus 7 is a rogue security application. In order to remove it, find out what files to look for below. Known system changes: Files c:\Desktop\Antivirus7.lnk …
Enterprise 2.0 privacy concerns in Europe
Transparent access to people and information is Enterprise 2.0’s great promise. It’s tempered, however, by a privacy risk that is especially sensitive in the …
Cloud-based rapid disaster recovery
Unitrends unveiled its Vault2Cloud disaster recovery service, monitored and managed through a simple, easy-to-use Web 2.0-based user interface. Vault2Cloud solves many of the …
Video: Nessus scan through a meterpreter session
Run a Nessus scan through a compromised host:
New release of RSA Data Loss Prevention Suite
With more than 70 new features for scanning, workflow, reporting, and global content processing, version 8.0 of the RSA Data Loss Prevention (DLP) Suite is engineered to allow …
Virtual PC Hypervisor vulnerability remains unpatched
Core Security issued an advisory disclosing a vulnerability that could affect large numbers of organizations and consumers using Microsoft’s Virtual PC virtualization …
FBI: Online fraud loss was $559 million in 2009
Online crime complaints increased substantially once again last year, according to a report about fraudulent activity on the Internet from the Internet Crime Complaint Center …
Intel launches its most secure data center processor
Combining security, performance and energy efficiency, Intel launched the Intel Xeon Processor 5600 series which deliver two new security features — Intel Advanced …
Six common virtualization security risks and how to combat them
Through 2012, 60 percent of virtualized servers will be less secure than the physical servers they replace, according to Gartner. Although they expect this figure to fall to …
Implement the SSH-2 protocol in pure Java
Ganymed SSH-2 for Java is a library which implements the SSH-2 protocol in pure Java (tested on J2SE 1.4.2 and 5.0). It allows one to connect to SSH servers from within Java …
The smart grid, it’s all about security
All too often you read about security breaches that cost firms millions of dollars or hit individuals with loss of personal data or both. But all this pales in comparison when …
Blazing fast password recovery with new ATI cards
ElcomSoft accelerates the recovery of Wi-Fi passwords and password-protected iPhone and iPod backups by using ATI video cards. The support of ATI Radeon 5000 series video …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous