Help Net Security
PDF exploit takes the lead in amount of infections
BitDefender’s top e-threat for December is Exploit.PDF-JS.Gen, with 12.04 percent of the total amount of infections. This generic detection deals with specially crafted …
Eliminate vulnerabilities with source code analysis tool
CodePeer is a source code analysis tool that detects run-time and logic errors in Ada programs. Serving as an efficient and accurate code reviewer, CodePeer identifies …
Kismet 2009-11-R1 released
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) …
Scholarship for unemployed security pros at RSA Conference 2010
RSA Conference announced the return of a special scholarship program for unemployed information security practitioners. RSA Conference 2010 will award delegate passes to 25 …
BackTrack 4 Final released
BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to …
Heartland to pay up to $60 million after data breach
Heartland Payment Systems and Visa announced a settlement agreement under which issuers of Visa-branded credit and debit cards will have an opportunity to obtain a recovery …
Date breaches: The insanity continues
In 2009, the Identity Theft Resource Center recorded 498 breaches, less than the 657 in 2008, more than the 446 in 2007. Are data breaches increasing or decreasing? That is …
How to use the JavaScript Blacklist Framework from Adobe
The video below shows you how to use the new JavaScript Blacklist Framework from Adobe to blacklist (vulnerable) API functions in JavaScript. For more information on PDF …
Self-encrypting disk drives for desktop and laptop computers
Mobile Armor announced the general availability of DriveArmor 3.0, a solution for access control and managing security on laptop and desktop computers with 2.5-inch …
Rogue software details: RapidAntivirus
RapidAntivirus is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\Rapid …
Pay by password
Verotel, an Internet Payment Service Provider that specializes in processing high-risk credit card payments, announced Verotel QuickCharge – a new tool for Internet …
Week in review: Identity theft, cybersecurity jobs, online fraud
Here’s an overview of some of last week’s most interesting news, interviews, reviews and articles: Privacy issues of data collecting Will 2010 see the beginning of …
Featured news
Resources
Don't miss
- Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703)
- 18 arrested in €300 million global credit card fraud scheme
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform