Help Net Security
Vendors deliver compromised products
Users should be aware of potential threats created by devices that are already compromised or tampered coming off the shelves. The Trend Micro 2010 Future Threat Report talks …
Week in review: Massive SQL injection attack, botnets, security trends and the Conficker worm
Here’s an overview of some of last week’s most interesting news, interviews and articles: Phishing campaign targets cPanel users Trusteer warned the customers of …
Do new technologies offer greater security?
Many administrators, IT directors, and CSOs are tired of the constant system patch battle and constant security software updates. The Google Chrome OS offers them hope for a …
Network IPS tests uncover appliance weaknesses
NSS Labs released its latest Network Intrusion Prevention System (IPS) Comparative Group Test Report for the fourth quarter of 2009. The report evaluates 15 NIPS products from …
Open source forensic framework
Mobius Forensic Toolkit is an open source forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing …
2009 in threats: Fake security software, search engines and social networks
The latest State of the Internet 2009 report by CA states that the most notable 2009 online threats were rogue/fake security software, major search engines, social networks …
Metasploit Framework 3.3.2 released
The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration …
Securing the foundation of IT systems
Recent studies show that securing the operating system is recognized as a necessary practice in an organization’s overall security policy, but it is not being done on a …
SQL injection attack claims 132,000+
A large scale SQL injection attack has injected a malicious iframe on tens of thousands of susceptible websites. ScanSafe reports that the injected iframe loads malicious …
Snort Alert Monitor 0.6.0 released
Snort Alert Monitor works in conjunction with Snort and provides much better reporting and real-time statistics that aren’t available with Snort alone. New in Snort …
The security nightmare formula
According to the Cisco 2009 Annual Security Report, small errors on the part of computer users or their IT departments may not wreak havoc on their own, but in combination, …
iptables 1.4.6 released
iptables is the userspace command line program used to configure the Linux 2.4.x and 2.6.x IPv4 packet filtering ruleset. It is targeted towards system administrators. …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations