Help Net Security
OMA DRM 1.0 Client for Android
Cloakware announced a new Open Mobile Alliance compliant Digital Rights Management solution for the secure delivery of digital content across the Android open source platform. …
SSH client MindTerm 3.3 released
MindTerm is a secure shell client that implements the SSH1 and SSH2 protocols. It is written in Java and is available as a stand-alone application and as a library component …
Web applications: Easy prey for hackers
Web applications are usually exposed on the Internet and offer an easier prey for attackers, who can develop tools that mimic legitimate users behavior in order to scan the …
International action day against mass-surveillance and mass-data retention
Saturday, 12th September, is scheduled to be an international action day against excessive surveillance: Freedom Not Fear 2009. In as many European capital cities as possible …
New book: “Programming Scala”
If you program in Java, you’re spending a lot of effort working for the language. But with Scala, the language works for you. Scala is a modern, multi-paradigm language …
Apple unveils Snow Leopard 10.6.1 update
The 10.6.1 update is recommended for Mac OS X 10.6 Snow Leopard users and includes general operating system fixes that enhance the stability, compatibility, and security of …
Registration opens for cyber war games in NY
With cyber security fraud costing businesses millions worldwide and enforcement agencies facing shortages that can delay forensics investigations for years, the graduate …
Photos from the FRHACK security conference
FRHACK is an international IT security conference that took place this week in France. The photos below are a courtesy of Xavier Mertens. And here are some promotional …
Linux 2.6.31 released
The Linux 2.6.31 kernel adds USB 3.0 support, memory management changes that improve interactivity in desktops, readahead improvements, support for Intel’s Wireless …
Tenable launches hardware and virtual appliance
Tenable Network Security unveiled the Tenable Appliance to expand the deployment options for its security and compliance management software and Nessus vulnerability scanner. …
Companies should examine all security issues
Companies are protecting themselves from high-profile threats such as malware attacks, but leaving themselves vulnerable to a variety of other issues, according to Network …
Western Digital external HDs with hardware-based encryption
WD introduced its new My Book Essential and My Book for Mac desktop external hard drives equipped with the new WD SmartWare software and hardware-based encryption. When the …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations