Help Net Security
RSA Conference Europe keynote line-up
The complete line-up of keynote speakers for the 10th annual RSA Conference Europe has been announced. The conference, taking place from 20th-22nd October 2009 at the Hilton …
Video: Damn Vulnerable Web App installation
This video shows the installation process of Damn Vulnerable Web App (DVWA).
VMware Fusion DoS and privilege escalation vulnerabilities
Two vulnerabilities have been reported in VMware Fusion, which can be exploited by malicious, local users to cause a Denial of Service or gain escalated privileges. Kernel …
NitroSecurity adds configuration and change management to its SIEM platform
NitroSecurity announced the integration of configuration and change management features into its NitroView information security management platform. The ability to manage …
Companies make little headway in securing data
The Independent Oracle Users Group (IOUG) released its database security study, “IOUG Data Security 2009: Budget Pressures Lead to Increased Risks”. The study …
Experts teach cyber safety to school kids
(ISC)2 launched its Safe and Secure Online volunteer program in the U.S., offering cyber security professionals from business and government to teach cyber safety in …
Red Hat addresses Supreme Court on software patents
Red Hat has filed an amicus brief with the United States Supreme Court. In the brief, Red Hat explains the practical problems of software patents to software developers. The …
Unlimited storage online backup service from McAfee
McAfee Online Backup is a new secure online service for consumers that stores and encrypts digital assets. It is a completely automated service that offers unlimited storage …
Ubuntu 9.10 beta released
The Ubuntu team announced the beta release of Ubuntu 9.10 Desktop and Server editions, and the Ubuntu Netbook Remix codenamed “Karmic Koala.” Ubuntu 9.10 Desktop …
Open source privacy enhancer BleachBit 0.6.5 released
BleachBit frees disk space, removes hidden junk, and guards your privacy. Erase cache, delete cookies, clear Internet history, remove unused localizations, shred logs, and …
Video: Tools for exploiting Web applications
In the video below, the authors of the Samurai Web Testing Framework talk about injectable exploits which focus on the exploitation of major web flaws during penetration …
VeriSign’s strong authentication now available on new devices
VeriSign’s latest release of VIP Access for Mobile is now available for Apple iPod touch, additional BlackBerry smartphones, and devices running the Windows Mobile …
Featured news
Resources
Don't miss
- How nations build and defend their cyberspace capabilities
 - Uncovering the risks of unmanaged identities
 - Deepfakes, fraud, and the fight for trust online
 - Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military