Help Net Security
10 Gb intelligent bypass introduced by Interface Masters
Interface Masters Technologies unveiled the Niagara 2812 whose state-of-the-art active bypass capabilities ensure maximum uptime on any network-critical link. During normal …
What the Heartland Data Breach Tells Us
The recent data breach at Heartland Payment Systems should make one thing clear: the standards for security around credit card numbers still aren’t good enough. New …
Damn Vulnerable Linux 1.5 is now available
Damn Vulnerable Linux (DVL) is meant to be used by both novice and professional security personnel and is even ideal for the Linux uninitiated. You can start learning IT …
Only 8.4% of email that reached companies in 2008 was non-malicious
PandaLabs revealed the results from its analysis on 430 million email messages from 2008 and discovered that only 8.4 percent of messages that reached companies were …
PayPal joins OpenID foundation board
The OpenID Foundation announced the addition of PayPal as a sustaining corporate member of the board. PayPal selected Andrew Nash, Sr. Director of Information Risk Management …
New version of iServices Trojan now in pirated Adobe Photoshop CS4
Intego has discovered a new variant of the iServices Trojan horse that the company discovered on January 22, 2009. This new Trojan horse, OSX.Trojan.iServices.B, like the …
Code Review or WAFs? PCI 6.6
Short answer: both. Compliance with requirement 6.6 of the PCI DSS cites the use of either a web application firewall (WAF) or code review. It’s far more effective to …
Fraud costs rise, challenging online businesses
Fraud is taking a bigger bite out of UK online revenues according to the figures come from a survey of 150 online merchants undertaken by CyberSource. One in eight businesses …
Fujitsu develops HDD security technology based on Opal SSC standards
Fujitsu announced the development of new security technology to make its 2.5-inch encrypted hard disk drives support the Opal Security Subsystem Class (Opal SSC). Opal SSC is …
2008 spam lessons learned: “Stop the guns, not just the bullets”
Marshal8e6, a provider of web and email security products, released its TRACE report for the second half of 2008 which finds that while global spam volumes continued to …
NetMRI 3.0 introduces impact analysis to Network Configuration and Change Management
NetMRI 3.0 solves the number-one challenge that undermines network performance and policy compliance – internal changes to the network, whether malicious or inadvertent …
Mac theft recovery application Undercover now with location tracking
Orbicule announced the integration of Wi-Fi Positioning software from Skyhook Wireless into Undercover, a theft-recovery application that can track any stolen Mac. Undercover …
Featured news
Resources
Don't miss
- Southwest Airlines CISO on tackling cyber risks in the aviation industry
- Insider risk management needs a human strategy
- Cerbos: Open-source, scalable authorization solution
- Patch Tuesday: Microsoft fixes 5 actively exploited zero-days
- Zero-day exploited to compromise Fortinet FortiVoice systems (CVE-2025-32756)