Healthcare vulnerability to data breach
Business associates, those who handle private patient information for healthcare organizations – including everyone from billing, credit bureaus, benefits management, …
India’s largest security conference opened its doors
Today was the first day of India’s largest security conference – Securitybyte & OWASP AppSec Asia Conference 2009. Help Net Security is attending the event …
Metasploit Framework 3.3 released
The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration …
Secure advanced Web server for Unix
Hiawatha is a secure and advanced Web server for Unix. It features a rootjail, the ability to run CGIs under any UID/GID you want, prevention of SQL injection and cross-site …
First Windows 7 zero-day bug confirmed by Microsoft
The first Windows 7 vulnerability has been confirmed by Microsoft – a denial of service vulnerability in the Server Message Block (SMB) protocol that cannot be used to …
Malicious “Balance Checker Tool”
TrendLabs warns about spam messages with the subject “Your credit balance is over its limits” professing to be from Vodafone and Verizon Wireless. The email states …
(IN)SECURE Magazine issue 23 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 23 has been released today. Table of contents …
Most security products fail to perform
Nearly 80 percent of security products fail to perform as intended when first tested and generally require two or more cycles of testing before achieving certification, …
Safe online shopping tips
Cyber Monday, one of the busiest days of the year for online shopping, is quickly approaching (Nov. 30), and a new national survey from ISACA shows employees plan to spend the …
Week in review: cyber war, SQL injection, spam evolution, Apple and Microsoft patches
Here’s an overview of some of last week’s most interesting news, interviews and articles: Cyber war is coming, the impact could be huge Admiral Mike McConnell, …
Serious Adobe Flash vulnerability
Foreground Security discovered a critical vulnerability in Adobe Flash. This vulnerability allows the same-origin policy of Adobe Flash to be exploited to allow nearly any …
WordPress 2.8.6 security release
WordPress 2.8.6 fixes two security problems that can be exploited by registered, logged in users who have posting privileges. If you have untrusted authors on your blog, …
Featured news
Sponsored
Don't miss
- How much does cloud-based identity expand your attack surface?
- Finding software flaws early in the development process provides ROI
- Zero-day exploitation surged in 2023, Google finds
- NHS Scotland confirms ransomware attackers leaked patients’ data
- Patch actively exploited Microsoft SharePoint bug, CISA orders federal agencies (CVE-2023-24955)