Help Net Security
Economic crisis heightens security risks at the world’s largest financial institutions
Tighter budgets, a greater concern over internal security breaches due to lower employee morale and complacency after a decrease in overall attacks over the past year may …
Free fuzzing utility for Oracle database applications from Sentrigo
Sentrigo announced FuzzOr, an open source fuzzing tool for Oracle databases designed to identify vulnerabilities found in software applications written in PL/SQL code. The new …
Identity theft: are your tax records safe?
No single set of documents contains more sensitive data than do our tax returns. Names, addresses, social security numbers, employer and earnings information reside there …
World’s smallest 802.11n range of devices
CSR launched its UniFi UF6000 range of Wi-Fi chips, the world’s smallest and lowest-cost range of 802.11n compatible devices to add to its Connectivity Centre line-up. …
New Firefox 3.0.6 fixes six security issues
Mozilla Corporation released a new version of their popular Firefox web browser. The new release fixes six security vulnerabilities. MFSA 2009-06 Directives to not cache pages …
New McAfee SaaS security business unit
McAfee has created a new business unit to enhance and expand the company’s software as a service offerings. The business unit will be responsible for all products within …
Belkin OmniView Secure DVI KVM Switch with EAL 4+ and TAA compliancy
Belkin today announced its new OmniView Secure DVI KVM Switch, NIAP listed to conform to Common Criteria EAL 4+ and augmented with ALC_FLR.3—important factors for U.S. …
Email security offering that leverages the benefits of cloud computing
Cloudmark introduced its new CloudFilter email security solution, a cloud-based email security offering specifically designed to free Web hosters and service providers from …
First open source virtual desktop client
VMware announced the first open source client for virtual desktop infrastructure, VMware View Open Client which enables IT organizations to safely host user desktops in the …
Applied Binary Code Obfuscation
An obfuscated code is the one that is hard (but not impossible) to read and understand. Sometimes corporate developers, programmers and malware coders for security reasons, …
MSI unveils HoneyPoint Personal Edition 2.00
MSI released HoneyPoint Personal Edition 2.00, a solution that basically serves up “fake” services on systems. These services then lie in wait for attackers and …
Latest study shows data breach costs continue to rise
PGP Corp. and the Ponemon Institute announced results of the fourth annual U.S. Cost of a Data Breach Study. According to the study which examined 43 organizations across …
Featured news
Resources
Don't miss
- Southwest Airlines CISO on tackling cyber risks in the aviation industry
- Insider risk management needs a human strategy
- Cerbos: Open-source, scalable authorization solution
- Patch Tuesday: Microsoft fixes 5 actively exploited zero-days
- Zero-day exploited to compromise Fortinet FortiVoice systems (CVE-2025-32756)