Help Net Security
Massive ZeuS compromise discovered
NetWitness analysts have discovered a dangerous new ZeuS botnet affecting 75,000 systems in 2,500 organizations around the world. The newly-discovered infestation, dubbed the …
Policing your IT police: Proactive security
When the global economy is in slowdown, there’s one sector that remains buoyant: crime. Illegal and illicit activities invariably rise as legitimate business falls, so …
Man gets 309 years in prison for identity theft
Robert Thompson, the leader of a massive identity theft and bribery scheme, was sentenced to 309 years in prison based on charges of conspiracy, wire fraud, mail fraud, bank …
Video: Cyber attack simulation
In the video below you can watch CNN’s Jeanne Meserve reports on the results a staged cyber attack.
Finalists announced for the “Most Innovative Company at RSA Conference 2010” contest
RSA Conference announced the top 10 finalists for its “Most Innovative Company at RSA Conference 2010” contest. This half-day interactive program is devoted to …
12 tips to ensure company data is kept private
Companies must consider the implications of using free communications services (such as email and data hosting) on their data privacy. Network Box offers IT managers steps to …
Exploring the boundaries of IT security
As Niels Bohr once said, prediction is difficult, especially about the future. Nevertheless, almost all network security companies try to assess risk and the potential impact …
Permanent Stakeholders’ Group of top security advisors appointed
As of today, a new composition of 30 top security experts start their term of office as members of the Permanent Stakeholders’ Group (PSG), giving advice to the …
Security updates for Adobe Reader and Acrobat
A critical vulnerability has been identified in Adobe Reader 9.3 for Windows, Macintosh and UNIX, Adobe Acrobat 9.3 for Windows and Macintosh, and Adobe Reader 8.2 and Acrobat …
Top 25 most dangerous programming errors
Based primarily on the CWE List and leveraging the SANS Top 20 attack vectors, the main goal of the Top 25 list is to stop vulnerabilities at the source by educating …
CORE IMPACT Pro integrates with Metasploit Project
Core Security Technologies has created a fully supported technical integration between CORE IMPACT Pro and the Metasploit open-source exploit framework. Through the …
Secure Internet browser: Comodo Dragon
Comodo released its new Internet browser, the free Comodo Dragon which is constructed on the open source Chromium Project browser. Dragon’s enhancements increase …
Featured news
Resources
Don't miss
- F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info
- Microsoft patches three zero-days actively exploited by attackers
- U.S. seizes $15 billion in Bitcoin linked to massive forced-labor crypto scam
- A safer way to break industrial systems (on purpose)
- Maltrail: Open-source malicious traffic detection system