Help Net Security
Economic crisis increases Americans’ fears about fraud and ID theft
According to research conducted in late February by Unisys, the vast majority of Americans (nearly 75 percent) believe that the current world financial crisis has increased …
Fortify Software delivers governance to software security
Fortify announced the latest release of its software security suite, Fortify 360, as well as its first-ever hosted software security solution, Fortify Vendor Security …
Unbrowse SNMP reaches version 1.5.1
Unbrowse is a handy tool if you are working with the SNMP (Simple Network Management Protocol). In addition to a powerful MIB compiler, and browser – it also features …
Survey shows teens would spy on people online for money
A survey by Trend Micro suggests that British teens might be tempted by illegal online methods to make money. One in three teens (aged 12 – 18) admitted they would …
Data leakage prevention: From target to integration
The specifics of Data Loss Prevention projects are such that besides improving company’s data system infrastructure and choosing the technical solution it is necessary …
Integrate smart cards and biometrics for Windows
Gemalto introduced an innovative solution which enables organizations to enhance network security and protect online identities by replacing weak, static passwords with strong …
New book: “Advanced Software Testing, Vol. 2”
Advanced Software Testing, Vol. 2 teaches test managers what they need to know to achieve advanced skills in test estimation, test planning, test monitoring, and test control. …
New HP ProLiant G6 server line
HP introduced the new HP ProLiant G6 server line, which delivers double the performance of previous generations. The HP ProLiant G6 line’s advances in energy efficiency, …
Microsoft releases Windows Server 2008 Foundation
Microsoft today released Windows Server 2008 Foundation. Built for small businesses with 15 or fewer users, it can be used with single or multiple workloads, such as file …
Video: Dissecting the Conficker worm
Wolfgang Kandek, CTO of Qualys, talks about the Conficker worm. A Conficker removal tool is available for download here.
How to exploit the SIP Digest Leak vulnerability
The SIP Digest Leak is a vulnerability that affects a large number of SIP Phones, including both hardware and software IP Phones as well as phone adapters (VoIP to analogue). …
Snort Security Platform (SnortSP) 3.0 Beta
This is the first beta release built on the new Snort 3.0 architecture which consists of two primary components: a software platform called the Snort Security Platform …
Featured news
Resources
Don't miss
- How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”
- Google strengthens secure enterprise access from BYOD Android devices
- Southwest Airlines CISO on tackling cyber risks in the aviation industry
- Insider risk management needs a human strategy
- Cerbos: Open-source, scalable authorization solution