Help Net Security
Accelerating wireless network security audits
ElcomSoft announced the availability of GPU-accelerated version of Elcomsoft Wireless Security Auditor 1.0, a product to audit wireless network security by attempting to …
USB encryption drive defense against autorun malware attacks with Hydra PC
SPYRUS announced the Hydra Privacy Card (Hydra PC) family of USB encrypting devices is immune from USB autorun malware attacks. Hydra PC, which utilizes the most advanced …
Details on the Downadup worm that is causing new outbreaks
Win32.Worm.Downadup worm made its first appearance late November 2008, exploiting the MS08-067 vulnerability to spread unhindered in local area networks. Its purpose was to …
Video: Barbara Hershey, Blogspot and fake anti-virus software
In the video below, Paul Baccas of SophosLabs explores how fake anti-virus software designed to scare the unwary out of money is being planted into Google Search results …
Gartner survey shows IT spending to be flat in 2009
As enterprises face a challenging economic environment, IT spending budgets will be essentially flat with a planned increase of 0.16 percent in 2009, according to results from …
2009 to see more malware on virtualization platforms and mobile devices
AppRiver published of its year-end spam report, State of Security 2008, and the Threat and Spamscape Forecast for 2009. According to report author, AppRiver Senior Security …
IBM unveils Rational AppScan Standard Edition 7.8
IBM Rational AppScan Standard Edition is a Web application security testing tool that automates vulnerability assessments. Here’s a short list of the interesting new …
Tackling the authentication nightmare
In the new edition of the HNS podcast, Jonathan Craymer, chairman of GrIDsure talks about tackling the authentication nightmare by getting the right balance between security …
Anonymous proxies a major security concern for IT managers
Web filtering specialist Bloxx announced the results of its independent Anonymous Proxy Survey, which reveals that an alarming 90% of IT Managers in the educational sector …
IT security standards planetarium
atsec information security today published the “IT security standard planetarium”, which depicts the relationships among many IT security standards. You can choose …
New Deep Security server and application protection software
Third Brigade announced the availability of Third Brigade Deep Security 6, the next generation in server and application protection for dynamic datacenters. It is the first …
Less than six weeks till SCALE 7X
Southern California Linux Expo (SCALE 7x) is one of the conferences we are media sponsoring via our publications. The event starts in just over a month and here is the latest …
Featured news
Resources
Don't miss
- Southwest Airlines CISO on tackling cyber risks in the aviation industry
- Insider risk management needs a human strategy
- Cerbos: Open-source, scalable authorization solution
- Patch Tuesday: Microsoft fixes 5 actively exploited zero-days
- Zero-day exploited to compromise Fortinet FortiVoice systems (CVE-2025-32756)