Help Net Security
Blind SQL Injection Discovery And Exploitation Technique
This paper describes a technique to deal with blind SQL injection spot with ASP/ASP.NET applications running with access to XP_CMDSHELL. It is possible to perform a pen test …
New security service bundles to compete with Google
MX Logic today began offering three new managed security service bundles. Each bundle includes a unique combination of email defense with message continuity, Web defense and …
New multi-gigabit IDS/IPS analyzes VoIP traffic
Enterasys Networks announced a new Dragon Multi-Gigabit Intrusion Detection & Prevention System which joins the existing Gigabit and 10 Gigabit advanced security systems. …
Network Box E-Series consolidates network defenses
Network Box USA announced the new E-Series, a product line that enables companies to consolidate their network security through one solution and greatly reduce the strain on …
Manage e-mail with ArcMail Defender U3160
ArcMail Technology announced the release of ArcMail Defender U3160, a stand-alone network appliance offering 16 TB of storage and data integrity technology. The ArcMail …
Crimeware: Understanding New Attacks and Defenses
Even as the security industry celebrates solid sales thanks to compliance laws, the last few years have not been characterized by a state of growing security. In fact, …
Phishing attacks down in May
The percentage of phishing attacks decreased in May relative to other malware, according to threat statistics analysed by managed security company, Network Box. Phishing …
22 suspected computer hackers arrested in France
According to French media reports, the 22 alleged hackers were arrested in Paris, southern and central France following a four month investigation involving over 90 members of …
Malware report: AdvancedXPFixer adware and Tixcet worm
PandaLabs reports this week about the adware AdvancedXPFixer, the Banbra.FTI Trojan and the Tixcet.A worm. AdvancedXPFixer is adware (a program designed to display adverts) …
The critical importance of Enterprise Rights Management
Anyone wondering why Enterprise Rights Management (ERM) is growing in importance need only review the news stories of the past few years. A US government consultant accesses …
Internet scheme used to steal micro-deposits
Michael Largent, 22, was arraigned on an indictment charging him with multiple counts of computer fraud, wire fraud, and mail fraud. This case is the product of an extensive …
Hardware encryption-secured flash drive
EDGE Tech Corp introduced its rough-and-tough, hardware encryption-secured flash drive, the DiskGO Secure GUARDIAN. Utilizing mandatory 256-bit AES hardware encryption, the …
Featured news
Resources
Don't miss
- When trusted AI connections turn hostile
- Identifying risky candidates: Practical steps for security leaders
- Humanoid robot found vulnerable to Bluetooth hack, data leaks to China
- F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info
- Microsoft patches three zero-days actively exploited by attackers