Help Net Security
According to a new report enterprises lack effective risk management
The currently popular silo approach to managing enterprise risk is inadequate because it leaves too many gaps and provides no reliable way to evaluate an enterprise’s …
New Nokia high-end IP Security appliance
Nokia expanded its portfolio of high-performance IP Security appliances with the Nokia IP2450 security platform for firewall/VPN. Benefiting from shared innovations between …
Increased crimeware usage in August
Finjan SecureBrowsing (browser plug-in that adds safety ratings to URLs of search results) has uncovered a growing number of specific cases of crimeware toolkits used by …
Guide to Online Antivirus Solutions Part 6: ESET Online Scanner
Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …
Info on the Smart Card Alliance Annual Conference 2007
Expanding interest in technologies that can enable fast, secure transactions of all types are driving smart card applications into many market sectors and opening up …
Almost 90% of mail received by companies in August was spam
According to data compiled by TrustLayer Mail, the managed security service from Panda Security, 87.49 percent of email that reached companies in August was spam. This data …
Increasing use of encryption and growing need for centralized automated key management
The greatly increased adoption of the use of encryption is driving the need for centralized and automated key management solutions – this is the finding of a new survey …
Free cross site scripting security scanner
Acunetix today launched a free edition of its popular web vulnerability scanner, which allows companies to check for cross site scripting vulnerabilities in their websites at …
Practical 10 Minutes Security Audit: Oracle Case
This paper will show an extremely simple technique to quickly audit a software product in order to infer how trustworthy and secure it is. It will show you step by step how to …
Exploit auction company WabiSabiLabi speaks out at HITBSecConf2007
Roberto Preatoni, WabiSabiLabi’s Strategic Director (and founder of Zone-H defacement mirror) will hold a presentation entitled “WabiSabiLabi – The Exploit …
Video – how to build a laser espionage microphone
Update (February 2016): Multimedia file removed, as it was using Adobe Flash.
August a dead season for virus epidemics
August once again turned out to be “dead season” for virus epidemics in 2007. Since August 2003, when the Lovesan worm caused the biggest epidemic in history, the …
Featured news
Resources
Don't miss
- When trusted AI connections turn hostile
- Identifying risky candidates: Practical steps for security leaders
- Humanoid robot found vulnerable to Bluetooth hack, data leaks to China
- F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info
- Microsoft patches three zero-days actively exploited by attackers