Help Net Security
Advanced cloud security tools
Sun Microsystems unveiled open source cloud security capabilities and announced support for the latest security guidance from the Cloud Security Alliance. The open source …
New book: “The Executive MBA in Information Security”
Supplying a complete overview of the concepts executives need to know, The Executive MBA in Information Security provides the tools needed to ensure your organization has an …
Wireshark 1.2.5 fixes security vulnerabilities
Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. Wireshark 1.2.5 fixes the following vulnerabilities: …
VoIP vulnerability trends
McAfee Labs released a very interesting white paper about VoIP vulnerability trends and targets, and about protocol- and application-level attacks. They first observed an …
Secure cloud computing adoption guidance
The Cloud Security Alliance (CSA) issued the second version of its “Guidance for Critical Areas of Focus in Cloud Computing” whitepaper which outlines key issues …
Rogue software details: VaccineSystem
VaccineSystem is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Top 5 trends that will dominate the security landscape
Lavasoft’s list of security predictions for 2010 anticipates the top threats that Internet users should be aware of this coming year as cyber criminals adapt their …
Monetary and reputation threats
In a recent survey about identity theft, Americans said their number one fear was having bank account, credit card or other personal information stolen from their computers. …
New book: “Cloud Security and Privacy”
Cloud computing has emerged as a popular way for corporations to save money that would otherwise go into their IT infrastructure. However, along with the promise of cloud …
Free crime mapping iPhone app
The new CrimeReports iPhone app features official, up-to-date crime data directly from more than 600 law enforcement agencies across North America. The app is free to download …
Top vulnerable applications in 2009
Bit9 unveiled its annual report on the top popular consumer applications with known vulnerabilities. The list, published in the research brief is created for IT professionals, …
Migrating to Windows 7: A three step plan
With the release of Microsoft’s new Windows 7 operating system, many IT managers will be thinking about when to make the move to the new OS and how to make the process …
Featured news
Resources
Don't miss
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform
- Connected homes: Is bystander privacy anyone’s responsibility?
- Google says 2026 will be the year AI supercharges cybercrime