Help Net Security
PDFResurrect: PDF analysis and scrubbing utility
PDFResurrect is a tool aimed at analyzing PDF documents. The PDF format allows for previous document changes to be retained in a more recent version of the document, thereby …
RBS Worldpay website problems down to lack of code auditing
News that RBS Worldpay’s various web portals are “riddled with holes” according to a hacker have been met with the expected public relations spin that you …
Radware unveils DefensePro 5.0
Radware released DefensePro 5.0, the intrusion prevention system (IPS) which offers a way to guard against vulnerabilities in the network. Leveraging a ‘booster …
New book: “Cloud Computing: Implementation, Management, and Security”
Cloud Computing: Implementation, Management, and Security provides an understanding of what cloud computing really means, explores how disruptive it may become in the future, …
Apple Xsan 2.2 released
Apple today released version 2.2 of Xsan, its 64-bit cluster file system specifically designed for small and large computing environments. The problem fixed in Xsan 2.2 was …
PhoneCrypt now available for the iPhone
PhoneCrypt is a solution based in military grade encryption (RSA 4096 bits and AES 256 bits). It works in real time, without interfering in the functions of the mobile phone, …
Intrusion prevention for small and medium enterprises
TippingPoint introduced two new intrusion prevention systems designed to secure network traffic for small and medium enterprises. The TippingPoint 110 and TippingPoint 330 …
Enterprise Wi-Fi BlackBerry client
iPass launched Blackberry iPassConnect Client, an enterprise Wi-Fi client. The application works in conjunction with the BlackBerry Enterprise Server, giving IT administrators …
Video: Man busted installing ‘skimming’ device to ATM
Below is CCTV footage form Brazil.
Draft eSecurity code for improved net security
Australia’s Internet Industry Association (IIA) has released a draft eSecurity code to ISPs throughout the continent, to serve as a guide for improving net security. …
Cross Widget DOM access: Spy on the page
Widgets, Gadgets or Modules are very common and powerful feature of Web 2.0 applications. They convert a single loaded page in the browser to multi-threaded application. They …
Tor for Android mobile devices
TorProxy is an Android application that makes it possible to use Internet sites and services anonymously from a mobile device. This is possible thanks to the Tor network and …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?