Help Net Security
Apple updates Java for Mac OS X 10.5 and 10.6
The latest Java updates from Apple deliver improved reliability, security, and compatibility for Java SE 6 and J2SE 5.0. Java for Mac OS X 10.5 Update 6 supersedes all …
Google Public DNS released
Today Google launched their own public Domain Name System (DNS) resolver called Google Public DNS that you can use as an alternative to your current DNS provider. Google …
12 tips for safe online shopping
Approximately ten million Americans have their identity stolen each year according to the Federal Trade Commission (FTC). As more business is conducted online and sensitive …
Changes coming to the OWASP Top 10 in 2010
In the spirit of improving Web application security worldwide the folks at OWASP have released the OWASP Top 10 2010 “release candidate”. It’s currently open …
The Zeus botnet strikes again
The Zeus botnet is hitting inboxes worldwide this week. Capitalizing on the public concern over the flu and the recent swine flu outbreak, a spate of malicious emails have …
Security incidents at an all-time high
The Computer Security Institute (CSI) pre-released selected findings from its 2009 Computer Crime and Security Survey. The survey, now in its 14th year, found that average …
Security concerns hinder cloud computing adoption
Concerns about the security of cloud computing environments top the list of reasons for firms not being interested in the pay-per-use hosting model of virtual servers, …
Internet worms record rapid global growth
Major security developments in 2009 included Conficker, the most damaging networking worm for years. Conficker spread fast in computers using the Windows XP operating system …
Most dangerous web domains
Africa’s Cameroon (.cm) has overthrown Hong Kong (.hk) as the Web’s riskiest domain, according to McAfee’s third annual Mapping the Mal Web report, released …
Freeware version of GFI EndPointSecurity
Endpoint security threats are constantly evolving and critical data is lost due to non-existent or ineffective security practices. The proliferation of high capacity thumb …
Break Microsoft BitLocker encryption
Passware created the first commercially available software to break Microsoft BitLocker hard drive encryption. BitLocker is an advanced, full-disk protection feature available …
DNS rebinding exploit how to
The DNS rebinding exploit has caused much confusion. In this video, Robert “RSnake” Hansen explains how hackers can take advantage of this attack and why the …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations