Help Net Security
Does Web 2.0 need Web security 2.0?
Web 2.0 is thriving, and so too are applications that take advantage of this technology. Interactive sites like LinkedIn, Twitter and even company websites are becoming ever …
Collection of security checks for Linux
Buck Security is a collection of security checks for Linux. It was designed for Debian and Ubuntu servers, but can be useful for any Linux system. The aim of Buck Security is, …
Introducing the Cyber Defence conference
Cyber warfare has become a major concern for international governments, military and civil agencies over the past few years. A recent wave of cyber attacks against NATO member …
Week in review: Compromised hardware, AV failures and published IE 0-day exploit
Here’s an overview of some of last week’s most interesting news, articles and interviews: Zuckerberg hacked into journalists’ email? The Facebook co-founder …
Apple Safari 4.0.5 patches critical vulnerabilities
Safari 4.0.5 includes improvements to performance, stability, and security. ColorSync An integer overflow that could result in a heap buffer overflow exists in the handling of …
PeerSec MatrixSSL: Embedded SSL and TLS implementation
MatrixSSL is an embedded SSL implementation designed for small footprint applications and devices. It allows secure management of remote devices. PeerSec Networks offers a …
New Federal IT security certification program
A new certification program specifically designed and tailored to help secure the nation’s Federal information technology systems was unveiled today. The certification …
Koobface worm doubles its number of command and control servers
The shut down and recovery of the Troyak-as command and control center (C&C) for the active Zeus botnet was good news for the whole IT security community. Unfortunately, …
It’s time to embrace the shift to the cloud
The software industry is entering another age of astonishing innovation. It’s a time when not only software is advancing at a fast pace, but so too are hardware devices …
File sharing networks open door to identity theft
According to the Washington Post, in any given second, nearly 22 million people around the globe are on peer-to-peer file-sharing networks downloading and swapping movies, …
Employees continue to put data at risk
According to a Ponemon Institute study, business managers continue to pose the greatest threat to sensitive company information such as customer records, health information …
13m users worldwide affected by Mariposa botnet
Following the worldwide shutdown of the Mariposa botnet last week, Panda Security reported today that the massive botnet had infected 13 million computers in 190 countries and …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online