Help Net Security
Apache Prefork MPM Vulnerabilities
This case study is a result of source code analysis of Apache httpd server MPM modules. The main goal of this document is to show what may be done by an attacker who has the …
Authentication and encryption solution for Seagate 5400 Momentus FDE.2 drives
After two years of development SECUDE is pleased to announce the official release of FinallySecure 1.0 which provides total Data-at-Rest security for new hardware based Full …
Viruses that start music in Windows Media Player and read the infected text
This week’s PandaLabs malware report looks at three new malicious codes designed to compromise the security of computers: two worms and a Trojan. Gronev.A is a worm with …
New addition to the FlowThrough security processor family
Hifn announced the full availability and production of the 8450, the newest member to the company’s FlowThrough security processor family. Hifn’s FlowThrough …
Taking Ownership of the Trusted Platform Module Chip on Intel Macs
I have been following the works of Trusted Computing Group (TCG) since their inception. The body, successor to the Trusted Computing Platform Alliance started by such giants …
Relaxation of PCI DSS is no surprise
The recent ease in requirements for UK retailers attempting to comply with the Payment Card Industry Data Security Standards (PCI DSS) did not surprise application security …
Why PCI isn’t enough to ensure data security today?
Ounce Labs thinks it’s critical for consumers to know that, in many instances, their credit card data is still not secure:  ” Compliance statistics are …
Elcomsoft System Recovery helps when you get locked out of Windows
Elcomsoft has released the Basic version of Elcomsoft System Recovery, an easy-to-use boot-disk application that makes it simple to access your Windows computer if …
New crimeware targeting companies
The new variant, “Prg”, researched by Finjan’s Malicious Code Research Center (MCRC) and also noted by Don Jackson of managed security specialist …
Cisco IOS Exploitation Techniques
It’s been almost two years since Michael Lynn first demonstrated a reliable code execution exploit on Cisco IOS at Black Hat 2005. Although his presentation received a …
MPack mass hacking tool – work in progress video
This video demonstrates how a system is compromised by a malicious IFRAME and how the MPack gang has accomplished this on literally thousands of websites (mostly Italian) …
Utimaco releases SafeGuard Enterprise 5.1
This cross-platform security suite for 360-degree data protection of confidential data integrates multiple new functions including flexible policy management for hard disk …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits