Help Net Security
Security concerns hinder cloud computing adoption
Concerns about the security of cloud computing environments top the list of reasons for firms not being interested in the pay-per-use hosting model of virtual servers, …
Internet worms record rapid global growth
Major security developments in 2009 included Conficker, the most damaging networking worm for years. Conficker spread fast in computers using the Windows XP operating system …
Most dangerous web domains
Africa’s Cameroon (.cm) has overthrown Hong Kong (.hk) as the Web’s riskiest domain, according to McAfee’s third annual Mapping the Mal Web report, released …
Freeware version of GFI EndPointSecurity
Endpoint security threats are constantly evolving and critical data is lost due to non-existent or ineffective security practices. The proliferation of high capacity thumb …
Break Microsoft BitLocker encryption
Passware created the first commercially available software to break Microsoft BitLocker hard drive encryption. BitLocker is an advanced, full-disk protection feature available …
DNS rebinding exploit how to
The DNS rebinding exploit has caused much confusion. In this video, Robert “RSnake” Hansen explains how hackers can take advantage of this attack and why the …
Rogue security software database
Rogue security applications, often referred to as scareware, are rising at a rapid rate, posing one of today’s greatest security challenges to computer users. Taking the …
Kaspersky releases Password Manager
Every day an active user will encounter a large number of online services and programs which require authorization. In order to access email, instant messaging services, …
Wireless network detector Kismet 2009-11-R1 released
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) …
Microsoft’s security patches year in review: A malware researcher’s perspective
It’s no secret that Microsoft has had the lion’s share of security vulnerabilities. Its success as a company has made it the most obvious and profitable target for …
Nessus 4.2 released
Nessus is a vulnerability scanner which in version 4.2 includes several enhancements including a new Flash-based interface. With this interface, scan results and policies are …
Top 10 holiday threats
As the holidays bring an increase in online shopping, charitable giving and social interaction, consumers and businesses should be on guard against some common scams that …
Featured news
Resources
Don't miss
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform
- Connected homes: Is bystander privacy anyone’s responsibility?
- Google says 2026 will be the year AI supercharges cybercrime